Latest technology could miss Australia due to encryption laws: Telstra

Latest technology could miss Australia due to encryption laws: Telstra

Telstra has warned that device vendors could skip Australia due to the nation’s encryption laws, leaving local companies uncompetitive. With vendors usually sharing technical information…

View More Latest technology could miss Australia due to encryption laws: Telstra
12 dark secrets of encryption

12 dark secrets of encryption

Encryption is fast becoming the developer’s go-to solution for whatever data privacy or security worry ails you. Afraid of putting your credit card into a…

View More 12 dark secrets of encryption
Smart Lock Turns Out to be Not So Smart, or Secure

Smart Lock Turns Out to be Not So Smart, or Secure

Researchers are warning a keyless smart door lock made by U-tec, called Ultraloq, could allow attackers to track down where the device is being used…

View More Smart Lock Turns Out to be Not So Smart, or Secure
Major HSM vulnerabilities impact banks, cloud providers, governments

Major HSM vulnerabilities impact banks, cloud providers, governments

Two security researchers have recently revealed vulnerabilities that can be exploited remotely to retrieve sensitive data stored inside special computer components known as HSMs (Hardware…

View More Major HSM vulnerabilities impact banks, cloud providers, governments
How a quantum computer could break 2048-bit RSA encryption in 8 hours

How a quantum computer could break 2048-bit RSA encryption in 8 hours

Many people worry that quantum computers will be able to crack certain codes used to send secure messages. The codes in question encrypt data using…

View More How a quantum computer could break 2048-bit RSA encryption in 8 hours
Computer Researcher Finds Wallet Vulnerability That Gave Same Key to Multiple Users

Computer Researcher Finds Wallet Vulnerability That Gave Same Key to Multiple Users

Online cryptocurrency paper wallet creator WalletGenerator.net previously ran on code that caused private key/public key pairs to be issued to multiple users. The vulnerability was…

View More Computer Researcher Finds Wallet Vulnerability That Gave Same Key to Multiple Users
Over 90% of data transactions on IoT devices are unencrypted

Over 90% of data transactions on IoT devices are unencrypted

A new report that looked at millions of connections from IoT devices present on enterprise networks found that over 40% of them do not encrypt…

View More Over 90% of data transactions on IoT devices are unencrypted
Attackers Are Messing with Encryption Traffic to Evade Detection

Attackers Are Messing with Encryption Traffic to Evade Detection

Unknown groups have started tampering with Web traffic encryption, causing the number of fingerprints for connections using Transport Layer Security to jump from 19,000 to…

View More Attackers Are Messing with Encryption Traffic to Evade Detection
Practical Ways to Reduce Ransomware Impact: Actions You Can Take Today

Practical Ways to Reduce Ransomware Impact: Actions You Can Take Today

During the past year, Cisco Security Incident Response Services has provided emergency incident response services for many customers dealing with incidents that sometimes become a…

View More Practical Ways to Reduce Ransomware Impact: Actions You Can Take Today