The security review: Virtualization, diversity and encryption

Get up-to-date with the latest happenings in information security with our review of the past week.

Reclaim privacy with operational security says Snowden

Edward Snowden has been offering advice on operational security to ordinary people, advocating, among other things, two-factor authentication and encryption.

The security review: Industrie 4.0, Schrödinger’s Cat and weakening encryption

This week’s roundup of the past seven days includes a interesting piece on Industrie 4.0, Schrödinger’s antivirus, proposals to weaken encryption and much more.

UK government: Data encryption needs to be limited

The UK government is to put forward proposals that will require organizations to limit the effectiveness of data encryption, arguing it weakens security.

Apple: It is impossible to access encrypted data on iPhones

Apple has once again reiterated its claim that it is technically impossible for it to access encrypted data on iPhones that are running iOS 8 or higher and even if it was possible, it would be apprehensive to perform such an action.

Back to university: cybersecurity now a major concern in higher education

Cybersecurity topics and panels were rated one of the “6 Best Things” at the recent Campus Tech conference, in Boston.

How to steal PGP encryption keys (using radio waves and pita bread)

An ingenious team of Israeli security researchers at Tel Aviv University have discovered a way to steal secret encryption keys using a gadget so small it can be hidden inside some pita bread.

WhatsApp gets tough on security

But only on Android for now. The popular messaging service has announced a default encryption protocol that surely makes WhatsApp THE most secure consumer messaging system in the world right now.

Artist mails NSA ‘uncrackable’ mixtape

An artist has created what he claims to be an ‘uncrackable’ mixtape, using freely available encryption tools and housed on a home-made device, and posted it to America’s National Security Agency (NSA).

Blackphone ultra-secure Android handset goes on sale

The Blackphone, a new super-secure Android handset is now on sale. The Blackphone offers encryption technology that makes snooping on calls or other communications extremely hard, even for government agencies.

Encryption essential for cyber security: A million reasons to encrypt sensitive data

Encryption is essential to cyber security today, with encryption of personally identifiable information (PII) being a top priority for organizations large and small, to protect customers and avoid fines and penalties after data breaches.

NSA faces fresh revelations as Snowden anniversary arrives

On the one year anniversary of Edward Snowden’s public revelations of mass surveillance conducted by the U.S. National Security Agency we look back on the impact, even as we face the prospect of more revelations to come.

eBay customers urged to change their passwords after breach

eBay customers should change passwords following this latest high profile breach. The Internet giant says the hack exposed names, addresses, phone numbers, and encrypted passwords of customers.

Heartbleed encryption flaw leaves millions of sites at risk

The Heartbleed bug – a flaw in an encryption technology used to protect major websites including Yahoo – has left a huge amount of private data at risk – and internet giants are scrambling to find fixes for a problem which could leave customer data exposed to criminals.

Interview: ‘Fully encrypted’ Android Blackphone – will it allow for spy-proof communication?

Speaking via email, Silent Circle’s Toby Weir-Jones said of the Android device built to offer secure communication, “It’s obvious there is tremendous interest in the goals we’ve set for Blackphone, even though we have released so little concrete detail so far.”

Encryption advice for companies in the wake of Snowden NSA revelations

What are the immediate practical implications of the Snowden-prompted revelation that the NSA has broken or circumvented a lot of commercially available encryption? For a start, you should not stop using encryption, but you may want to review how you use it moving forward, Stephen Cobb explains.

Think before you take that old computer to the city dump

We tend to replace our computers more often these days but how do you ensure that you don’t give away your data when you pass on that old desktop or laptop? Here are our top tips for safer computer disposal.  Back up your data Before you do anything with your existing PC or laptop, ensure

Brutalized! South Carolina breach exposes data security woes at State level

Brutalize? Yes, that’s what the Governor of South Carolina wants to do to the person who breached security at the South Carolina Department of Revenue (SCDOR) and exposed Social Security Numbers and other information pertaining to 3.6 million people, as well as 387,000 credit and debit card records. Speaking to the press on Friday, Gov.

11 Tips for protecting your data when you travel

When we relayed the FBI/IC3 warning to travelers about a threat involving hotel Internet service overseas last week it produced a lot of requests for advice on how to respond to the threat. So a few of us researchers at ESET came up with a list of data security tips for travelers. These tips will

BYOD Infographic: For security it's not a pretty picture

The phenomenon of organizations allowing or encouraging their employees to use their own computing devices for work–known as Bring Your Own Device, or BYOD–is now widespread in many countries, bringing with it some serious risks to company networks and data. As we first reported here on the blog a few weeks ago, ESET commissioned a

Follow us

Copyright © 2015 ESET, All Rights Reserved.