Skip to main content

Encryption

Encryption: A nice idea that few want to implement?

posted onDecember 23, 2005
by hitbsecnews

Companies are not embracing encryption as a way to protect sensitive data. According to Ponemon Institute's 2005 National Encryption Survey, only 4.2% of companies responding to our survey say their organizations have an enterprisewide encryption plan.

Cryptomathic: driving customer authenticati

posted onNovember 25, 2005
by hitbsecnews

Identity and access management technology is often used to control what systems and access rights users have within and between organizations. However, perhaps the most contentious area where identity management has as yet to really make its presence felt, but has the potential to make a real difference, is in the customer-facing areas of online trading and financial service. Take, for example, the banking sector.

Bots may get cloak of encryption

posted onNovember 15, 2005
by hitbsecnews

In their quest to retain control over hijacked PCs, cybercriminals will add encryption to their malicious software to avoid detection and removal, one expert predicted Monday.

In the near future, bots will include encryption to hide their presence from security and network sniffing tools often used to detect their presence, said Adam Meyers, an information assurance engineer at SRA International speaking at the Computer Security Institute conference here.

E-mail encryption tool set to debut

posted onOctober 22, 2005
by hitbsecnews

Essential Security Software plans to announce on Monday the release of Taceo, an e-mail encryption and rights-management product aimed at small businesses. Taceo lets users encrypt e-mail and restrict the recipient by blocking the ability to print, forward, take screenshots or cut information to the clipboard, Essential said in a statement. An e-mail can also be set to be unreadable until a certain date and time, or set to expire.

PGP set to release encryption package

posted onOctober 3, 2005
by hitbsecnews

PGP Corp. in November plans to ship a new encryption software bundle for laptops, desktops and servers, the company said Monday.

The new Whole Disk Encryption products offer full encryption of the hard drive disk when a computer is turned off, helping protect the data if the PC is stolen or lost. In addition, a PC user can choose to encrypt a file on the fly when a system is running, PGP Corp. said Monday in a statement.

The bundle also enables people to securely store data on external devices and permanently erase data on a disk, the company said.

Australian speed camera fines in doubt due to MD5 insecurities

posted onAugust 11, 2005
by hitbsecnews

EVERY fine issued by speed cameras could be invalid, after the Roads and Traffic Authority admitted yesterday it could not prove the authenticity of the pictures they take.
In a double blow to the RTA, The Daily Telegraph can also reveal that Sydney Harbour Tunnel cameras monitoring toll cheats have been switched off for at least three years - and no penalties handed out.

The revelation came as Sydney magistrate Lawrence Lawson threw out a speeding case after the RTA said it had no evidence that an image from a camera had not been doctored.

Encrypt data or invite disaster

posted onJune 28, 2005
by hitbsecnews

In today's workplace, stealing information doesn't require a covert Special Forces team: It is often done by an employee armed with a 5 GB USB flash drive. And your unsecured, unencrypted network invites a hacker to compromise a server or workstation holding sensitive data.

But you don't have to be vulnerable. There are plenty of options available today for securing/encrypting your data and many of these options are just overlooked.

Hackers require only 15 minutes to break hash algorithms

posted onJune 1, 2005
by hitbsecnews

New research on several commonly used hash algorithms has revealed security weaknesses in e-commerce systems and the internet, according to experts.

Hash algorithms are used by computers to compare data, and are a cornerstone of encryption and IT security systems. However, experts have warned that hackers now require only 15 minutes to create two email messages that produce the same digital signatures when checked by the most commonly used hash algorithms.

A Gentle Introduction To Cryptography

posted onMay 12, 2005
by hitbsecnews

With the increasing incidence of identity thefts, credit card frauds, social engineering attacks, the digital world is facing challenges in the years ahead. Obviously, cryptography, a young science, will play a prominent role in the security of protecting digital assets. This article tries to explain the basics of cryptography (encryption) using plain language.

PGP announces complete hard drive encryption

posted onMay 9, 2005
by hitbsecnews

PGP Corporation on Monday announced a new way for Windows users to encrypt their entire hard drives. Previous versions of the company's popular encryption software could only scramble chunks of a hard drive -- basically, large files that are mounted as virtual drives after you type in the correct passphrase. Now Windows XP users can buy what the company is calling "PGP Whole Disk encryption," which is a cleaner way to preserve the confidentiality of data on, say, an external hard drive.

Simplenews subscription

Stay informed - subscribe to our newsletter.
The subscriber's email address.
Keeping Knowledge Free for Over a Decade

Copyright © 2018 Hack In The Box. All rights reserved.

36th Floor, Menara Maxis, Kuala Lumpur City Centre 50088 Kuala Lumpur Malaysia
Tel: +603-2615-7299 Fax: +603-2615-0088