In today's workplace, stealing information doesn't require a covert Special Forces team: It is often done by an employee armed with a 5 GB USB flash drive. And your unsecured, unencrypted network invites a hacker to compromise a server or workstation holding sensitive data.
But you don't have to be vulnerable. There are plenty of options available today for securing/encrypting your data and many of these options are just overlooked.
New research on several commonly used hash algorithms has revealed security weaknesses in e-commerce systems and the internet, according to experts.
Hash algorithms are used by computers to compare data, and are a cornerstone of encryption and IT security systems. However, experts have warned that hackers now require only 15 minutes to create two email messages that produce the same digital signatures when checked by the most commonly used hash algorithms.
With the increasing incidence of identity thefts, credit card frauds, social engineering attacks, the digital world is facing challenges in the years ahead. Obviously, cryptography, a young science, will play a prominent role in the security of protecting digital assets. This article tries to explain the basics of cryptography (encryption) using plain language.
PGP Corporation on Monday announced a new way for Windows users to encrypt their entire hard drives. Previous versions of the company's popular encryption software could only scramble chunks of a hard drive -- basically, large files that are mounted as virtual drives after you type in the correct passphrase. Now Windows XP users can buy what the company is calling "PGP Whole Disk encryption," which is a cleaner way to preserve the confidentiality of data on, say, an external hard drive.
Toshiba Research Europe has used the science of quantum cryptography to transmit voice and video over a secure fiber link that is protected by the laws of physics. The demonstration is significant because it shows that the single-photon encryption technology is not only compatible with real Internet Protocol (IP) traffic but also robust enough for deployment on commercial fiber networks. The system was shown to financial institutions and government representatives in London last week by scientists working at Toshiba’s Cambridge Research Laboratory.