Read more about encryption
Bookmark and Share
  • Researcher tests Tor exit nodes, finds not all operators can be trusted

    26.06.2015

    While the Tor anonymity network conceals (relatively successfully) a user's location and Internet activity from anyone who might want to know about it, users should be aware of the fact that it does not offer end-to-end encryption, and any traffic that is not encrypted before it enters Tor can be seen and perused by those operating exit nodes.

  • Cisco finds, removes more default SSH keys on its software

    26.06.2015

    Cisco has pushed out security updates to address two vulnerabilities in its Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Content Security Management Virtual Appliance (SMAv) software.

  • Many popular Android apps fail to encrypt login credentials

    22.06.2015

    Using encryption to protect mobile traffic and especially the exchange of credentials between the user and company servers should be a must in this day and age.

  • Let's Encrypt CA to issue its first cert

    17.06.2015

    Let's Encrypt, a non-profit certificate authority (CA) set up by the Electronic Frontier Foundation, Mozilla, Cisco, Akamai, IdenTrust, and researchers at the University of Michigan, is finally ready to issue its first certificate, scheduled for the week of July 27, 2015.

  • iOS 9 will use 6-digit passcodes for enhanced protection

    09.06.2015

    Among the improvements that Apple announced for iOS 9 on Monday, there are some security enhancements as well.




Spotlight

How to get better at web application security

Robert Hansen, Vice President of WhiteHat Security Labs, discusses the evolution of web application security, offers advice on how to improve web application security practices, recommends tools, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Thu, Aug 27th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //