encryption

Wed
10
Jun
John Lister's picture

US to Encrypt All Government Websites

All US government websites accessible by the public must use secure connections by then end of next year. The new rules should protect the public, particularly "whistleblowers." New rules laid down this week mandate the change for all public sites ... that are wholly or partly maintained by the federal government. This applies even if the site is operated by a contractor. The rules apply whether or not the site requires a user to log-in. (Source: cio.gov ) Under the rules, sites must use the most secure protection that is widely available. The initial implementation of the rule ... (view more)

Wed
20
May
John Lister's picture

FBI Wants to Ban Secure Internet using Backdoors

Some of the largest tech firms are urging President Obama to drop plans to make it easier for law enforcement and security agencies to access Internet communications. They say the President should resist any idea for such firms to implement ... mandatory "backdoors." The proposal means that firms are only allowed to use encryption if they also build in a way that makes it possible for law enforcement groups to access the data in an unencrypted form. The "key" to unlock the data would effectively be split into two parts: one held by the Internet firm, and the other by the ... (view more)

Thu
12
Mar
John Lister's picture

Patch To Fix FREAK Bug is a Must-Install

Microsoft has joined Apple and Google in releasing browser security updates to patch a bug dubbed FREAK. The bug could make it easier for hackers to decrypt data that intercept from website users. The vulnerability of FREAK doesn't allow hackers to ... see data in plain sight. Instead, it allows them to remotely change what's meant to be a secure website connection into an unsecure one, meaning that previously encrypted data would then travel without any encryption. To be of any use, a hacker would need to combine the FREAK exploit with another vulnerability that let them intercept data, ... (view more)

Mon
29
Dec
Dennis Faas's picture

How to Remove Encryption Virus?

Infopackets Reader 'Frank' writes: " Dear Dennis, I was wondering if I can hire you to fix a laptop with a ransom virus infection. The reason I'm asking is because as soon as the system boots up, the virus is there [with a message stating the ... computer has been locked down]. There is no desktop, meaning I can't open anything. What can I do? " My response: Unfortunately, if you cannot boot into the Windows desktop, then I cannot dial into the laptop to fix it via remote desktop support . The virus you have may be repairable depending on what you're infected with, and whether or not the virus is ... (view more)

Mon
29
Sep
Brandon Dimmel's picture

FBI: Mobile Phone Encryption Puts Americans at Risk

The Federal Bureau of Investigation's (FBI) director believes encrypting information on smartphones makes Americans less safe from violent criminals. In fact, James Comey suggests that smartphone companies may be marketing the feature in a way that ... actually encourages criminal behavior. Largely in response to the scandal involving the National Security Agency (NSA) and Edward Snowden , the world's largest mobile phone technology companies have introduced encryption systems designed to help users protect their data against government snooping. Last week Google announced it would enable ... (view more)

Wed
12
Mar
Brandon Dimmel's picture

Google CEO Says User Data Safe From NSA

Google's chief executive officer is promising Google users that their data is safe from the prying eyes of National Security Agency (NSA) officials. Eric Schmidt made that claim before a large audience at the South by Southwest Interactive ... conference, which is being held in Austin, Texas. When asked how he felt after it was revealed that the NSA had worked with Britain's top surveillance agency, the GCHQ (Government Communications Headquarters) to infiltrate Google's data centers, Schmidt admitted that he was shocked. "The very fact that they did this was very suspicious to ... (view more)

Mon
09
Sep
Dennis Faas's picture

NSA Can Read Most Encrypted Emails, Texts: Report

After the National Security Agency (NSA) surveillance scandal broke earlier this year, many Internet users have attempted to protect their private data . In some cases this simply involves deleting temporary Internet files. Others, however, have ... gone a step further by using encryption techniques to protect sensitive information stored in emails and text messages. However, a new report from Britain's The Guardian newspaper and non-profit organization ProPublica reveals that the NSA has tools that allow it to read many encrypted messages. NSA Invests Billions in Decryption Research The report ... (view more)

Thu
21
Jun
Dennis Faas's picture

'CTI Text Encryption 3.0', and 'Pixia 4.79d'

CTI Text Encryption 3.0 This is a text encryption and decryption software tool that you can use to encrypt highly sensitive computerized data using more than one 'key.' It's a small, highly portable, very efficient, and easy to use system that ... increases your ability to conveniently and securely keep critical information away from the eyes of others. http://ctiencrypt.codeplex.com Pixia 4.79d Pixia, originally engineered by famed Japanese designer Isao Maruoka, is a popular software tool that's great for creating full-color graphics on your computer. Custom digital art tools allow the user to ... (view more)

Wed
03
Nov
Dennis Faas's picture

New 'WiFi Direct' Makes Wireless Networking Simple

Five portable devices have become the first certified as 'WiFi Direct,' a new system designed to rival Bluetooth in making it easy to connect devices without wires. At the moment, most WiFi-enabled devices can only connect through a router. The ... alternative is to use a tool in Windows known as an ad-hoc network connection, but this is difficult to establish and often unstable. While that's fine for home and office environments, it's of little use to business users on the road. It's also tricky to use with devices such as phones and digital cameras. The main solution to that problem has been ... (view more)

Tue
21
Sep
Dennis Faas's picture

'Cddoc 0.42', and 'Cryptainer LE Encryption Software'

Cddoc 0.42 CDDoc is a program that performs benchmarks on your optical drivers, including your compact disc driver, digital versatile disc driver, and more. It logs useful information about these drives, which can be viewed directly or as a log file ... in your favorite text viewer. http://www.blackoutlamp.com Cryptainer LE Encryption Software Cryptainer LE, free disk encryption software, creates multiple 100 MB files of encrypted and password protected drives and containers. The Cryptainer drive can be loaded and unloaded. Not only can you encrypt files and folders but you can also install ... (view more)

Pages

Subscribe to RSS - encryption