Tag: encryption
-
Navigating the Quantum Shift: A Practical Approach to Crypto-Agility with PQC-Enabled PKI
by
in SecurityNewsThe conversation around quantum computing is shifting from theory to reality, especially when it’s centered on security and mounting threats against current encryption algorithms. The UK National Cyber Security Centre’s (NCSC) recent guidance on “PQC Migration Timelines” underscores the urgency for organizations to transition to post-quantum cryptography (PQC). Urgency is being driven by the rising……
-
Happy 21st Birthday, Gmail! Google’s Present to Enterprise Gmail Users: EndEnd Encryption
by
in SecurityNewsThe new feature is more accessible than S/MIME because it eliminates the need for certificate management. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-gmail-end-to-end-encryption/
-
Google rolls out easy endend encryption for Gmail business users
by
in SecurityNewsGoogle has started rolling out a new end-to-end encryption (E2EE) model for Gmail enterprise users, making it easier to send encrypted emails to any recipient. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/google-rolls-out-easy-end-to-end-encryption-for-gmail-business-users/
-
Apple devices are at ‘most risk’ in UK following government ‘backdoor’ order
by
in SecurityNewsHome Office refuses to answer questions from Lords over technical capability notice issued against Apple’s iCloud Advanced Data Protection encryption services First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366621785/Apple-devices-are-at-most-risk-in-UK-following-government-backdoor-order
-
Google to Switch on E2EE for All Gmail Users
by
in SecurityNewsGoogle is set to roll out end-to-end encryption for all Gmail users, boosting security, compliance and data sovereignty efforts First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/google-switch-e2ee-all-gmail-users/
-
7 Wege, Daten (besser) zu verschlüsseln
by
in SecurityNews
Tags: ai, blockchain, business, crypto, dns, encryption, github, healthcare, infrastructure, nist, office, privacy, software, updateVerschlüsseln Sie Ihre Daten zeitgemäß?Das Konzept der Kryptografie existiert schon ein paar Hundert Jahre, wird aber von findigen Wissenschaftlern und Mathematikern immer weiter vorangetrieben. Im Rahmen dieser Entwicklungsarbeit hat sich gezeigt, dass Algorithmen noch viel mehr können, als nur Daten zu schützen: Sie sind auch in der Lage, komplexe Regeln durchzusetzen und die Zusammenarbeit zu…
-
Datenaustausch zwischen Europa und den USA ist nicht mehr sicher
by
in SecurityNewsTrumps Kündigungen beim haben drastische Folgen für die Datensicherheit zahlreicher europäischer Unternehmen. Organisationen, deren Daten auf amerikanischen Servern verarbeitet oder gespeichert werden, sollten schnellstmöglich neue Datenschutzkonzepte einführen. Mit modernen Encryption-Lösungen beispielsweise lassen sich diese Daten schnell und effektiv verschlüsseln und vor unbefugtem Zugriff, wie etwa durch amerikanische Behörden, schützen. […] First seen on netzpalaver.de Jump…
-
SandboxAQ Strengthens Leadership in Post-Quantum Security as NIST Approves HQC Algorithm
by
in SecurityNewsThe National Institute of Standards and Technology (NIST) has officially added HQC (Hamming Quasi-Cyclic), co-invented by SandboxAQ, to its suite of post-quantum cryptographic (PQC) standards, the company announced today. HQC becomes the fifth algorithm selected by NIST in its ongoing effort to develop quantum-resistant encryption standards. Of the five, three will serve digital signature purposes,…
-
7 cutting-edge encryption techniques for reimagining data security
by
in SecurityNews
Tags: ai, computer, cryptography, data, dns, encryption, government, ibm, identity, nist, office, privacy, risk, software, technology, trainingPrivate information retrieval: Securing a database is fairly straightforward. Protecting the privacy of the users, however, is a bit more difficult. Private information retrieval algorithms make it possible for people to search the database for specific blocks of data without revealing too much to the database owner.This extra layer of protection relies on scrambling larger…
-
Die 10 häufigsten IT-Sicherheitsfehler
by
in SecurityNewsVon ungepatchten Sicherheitslücken bis hin zu unzureichenden Backups: Lesen Sie, wie sich die häufigsten IT-Sicherheitsfehler vermeiden lassen. Verschlüsselte Dateien und eine Textdatei mit einer Erpresser-Nachricht zeigen klar und deutlich: Ein Unternehmen ist einer Cyberattacke zum Opfer gefallen. Dabei ist das nur das Ende einer langen Angriffskette. Die Tätergruppe bewegt sich oft seit mehreren Wochen oder Monaten…
-
CoffeeLoader: A Brew of Stealthy Techniques
by
in SecurityNewsIntroductionZscaler ThreatLabz has identified a new sophisticated malware family that we named CoffeeLoader, which originated around September 2024. The purpose of the malware is to download and execute second-stage payloads while evading detection by endpoint-based security products. The malware uses numerous techniques to bypass security solutions, including a specialized packer that utilizes the GPU, call…
-
Securing Canada’s Digital Backbone: Navigating API Compliance
by
in SecurityNews
Tags: api, attack, authentication, best-practice, breach, compliance, cyber, data, detection, encryption, flaw, framework, governance, government, infrastructure, monitoring, regulation, risk, service, strategy, threat, vulnerabilityHighlights: Understanding Canadian API Standards: Key principles for secure government API development. Critical Importance of API Security: Why robust protection is vital for citizen data. Compliance and Trust: How adherence to standards builds public confidence. Key Security Considerations: Essential practices for Canadian organizations. Salt Security’s Alignment: How the Salt API Security Platform supports Canadian government…
-
ETSI Publishes New Quantum-Safe Encryption Standards
by
in SecurityNewsStandards body ETSI has defined a scheme for key encapsulation mechanisms with access control (KEMAC), enabling quantum-secure encryption First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/etsi-quantum-safe-encryption/
-
ETSI launches first post-quantum encryption standard
by
in SecurityNewsEuropean telco standards body launches its first post-quantum cryptography cyber standard, covering the security of critical data and communications First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366621214/ETSI-launches-first-post-quantum-encryption-standard
-
Likely Chinese Hackers Infiltrated Asian Telecom for 4 Years
by
in SecurityNews‘Weaver Ant’ Used Web Shell Tunneling and Hacked Routers to Evade Detection. An apparently Chinese cyber espionage operation lurked inside the network of an Asian telecom for four years, camouflaging its presence through nested encryption and lightweight web shells. Chinese hackers have been uncovered on the inside of telecom networks spanning the globe. First seen…
-
White House’s Operational Security Fail: No Signal Required
by
in SecurityNews‘Encryption Can’t Protect You From Stupid,’ Says Leading Cryptographer We’re all human. Who among us hasn’t lost a thumb drive or added a journalist to a consumer-grade encrypted app group chat devoted to White House war planning and military operations? Still, some accidental data breaches pose a bigger risk than others. First seen on govinfosecurity.com…
-
Colt: Test zur quantengesicherten Verschlüsselung im optischen Netz abgeschlossen
by
in SecurityNews
Tags: encryptionFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/colt-abschluss-test-quantencomputer-verschluesselung
-
Neue VanHelsing-Ransomware breitet sich rasant aus
by
in SecurityNews
Tags: authentication, backup, blockchain, dark-web, encryption, extortion, governance, government, linux, ransomware, service, usa, windowsDas neue Ransomware-Programm VanHelsing zielt auf Windows-, Linux-, BSD-, ARM- und ESXi-Systeme.Das neue RaaS-Projekt namens VanHelsing wurde erstmals am16. März von Forschern von CYFIRMA entdeckt, als Angreifer es für Verschlüsselung und doppelte Erpressung nutzten. Da es für Ziele der Gemeinschaft Unabhängiger Staaten (GUS) verboten ist, gehen die Security-Spezialisten davon aus, dass die Hintermänner aus Russland…
-
New VanHelsing ransomware claims three victims within a month
by
in SecurityNews
Tags: access, authentication, backup, blockchain, control, encryption, government, network, ransom, ransomware, service, windowsSophisticated affiliate program: VanHelsing is a refined ransomware written in C++ and, based on the compilation timestamp observed by Check Point, had claimed its first victim on the same day it got spotted by CYFIRMA.”The ransomware accepts multiple command-line arguments that control the encryption process, such as whether to encrypt network and local drives or…
-
Quantenschlüssel aus der Sicht des CISO
by
in SecurityNewsQuantum Key Distribution (QKD) dient dazu, Verschlüsselungsschlüssel sicher zwischen zwei Parteien zu verteilen.Der sogenannte Q-Day, an welchem Quantencomputer leistungsstark genug sind aktuelle Standardmethoden der Verschlüsselung zu knacken, rückt näher. Eine der Lösungen, welche zum Schutz vor dieser Quantenbedrohung entwickelt wurde, ist die sogenannte Quantum Key Distribution (QKD). Das Potenzial von QKD ist immens, ihr aktueller…
-
Why I am challenging Yvette Cooper’s ‘secret back door’ order against Apple’s encryption
by
in SecurityNewsI took steps to lock down all personal data after I was named as an opponent of Russia. Now I am again worried about my family’s safety after the home secretary issued a secret order against Apple First seen on computerweekly.com Jump to article: www.computerweekly.com/opinion/Why-I-am-challenging-Yvette-Coopers-secret-back-door-order-against-Apples-encryption
-
SHARED INTEL QA: Forrester highlights why companies need to strive for ‘cryptoagility’ today
by
in SecurityNewsQuantum computing’s ability to break today’s encryption may still be years away”, but security leaders can’t afford to wait. Forrester’s The Future of Quantum Security makes it clear: the transition to quantum-safe cryptography must start now. Related: Quantum standards come of “¦ (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/shared-intel-qa-forrester-highlights-why-companies-need-to-strive-for-cryptoagility-today/
-
VanHelsing Ransomware Targets Windows Systems with New Evasion Tactics and File Extension
by
in SecurityNews
Tags: advisory, breach, cyber, cybersecurity, data, encryption, extortion, leak, ransomware, tactics, windowsThe cybersecurity landscape has been recently disrupted by the emergence of the VanHelsing ransomware, a sophisticated strain identified by the CYFIRMA Research and Advisory Team. This ransomware targets Windows systems, employing advanced encryption techniques and appending a unique >>.vanhelsing
-
11 hottest IT security certs for higher pay today
by
in SecurityNews
Tags: access, attack, automation, business, cloud, container, control, corporate, credentials, cyber, cybersecurity, data, defense, encryption, exploit, finance, fortinet, google, governance, incident response, infosec, intelligence, Internet, jobs, linux, malicious, malware, monitoring, network, penetration-testing, remote-code-execution, resilience, reverse-engineering, risk, risk-assessment, risk-management, skills, software, technology, threat, tool, training, vulnerability, windowsOffensive Security Certified Expert (OSCE): OffSec’s Offensive Security Certified Expert consists of three courses: Advanced Web Attacks and Exploitation, Advanced Evasion Techniques and Breaching Defenses, and Windows User Mode Exploit Development. The format for each course exam is the same: Candidates have 48 hours to compromise a given target using various techniques. No formal prerequisites exist for any of the…
-
NCSC proposes three-step plan to move to quantum-safe encryption
by
in SecurityNewsThe NCSC urges service providers, large organisations and critical sectors to start thinking today about how they will migrate to post-quantum cryptography over the next decade First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366621031/NCSC-proposes-three-step-plan-to-move-to-quantum-safe-encryption
-
UK sets timeline for country’s transition to quantum-resistant encryption
by
in SecurityNewsThe U.K. National Cyber Security Centre issued new guidance to help organizations transition to cryptographic algorithms and protocols that can protect data threatened by quantum computing. First seen on therecord.media Jump to article: therecord.media/uk-ncsc-quantum-resistant-algorithms-transition
-
HP Brings Quantum-Safe Encryption to Printers
by
in SecurityNewsHP’s 8000 Series enterprise and commercial printers, which include Color LaserJet Enterprise MFP 8801, Mono MFP 8601, and LaserJet Pro Mono SFP 8501, will feature new quantum ASICs and endpoint controllers to protect them from future quantum attacks. First seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/hp-brings-quantum-safe-encryption-printers