The Blackphone, a new super-secure Android handset is now on sale. The Blackphone offers encryption technology that makes snooping on calls or other communications extremely hard, even for government agencies.
Encryption is essential to cyber security today, with encryption of personally identifiable information (PII) being a top priority for organizations large and small, to protect customers and avoid fines and penalties after data breaches.
On the one year anniversary of Edward Snowden’s public revelations of mass surveillance conducted by the U.S. National Security Agency we look back on the impact, even as we face the prospect of more revelations to come.
eBay customers should change passwords following this latest high profile breach. The Internet giant says the hack exposed names, addresses, phone numbers, and encrypted passwords of customers.
The Heartbleed bug – a flaw in an encryption technology used to protect major websites including Yahoo – has left a huge amount of private data at risk – and internet giants are scrambling to find fixes for a problem which could leave customer data exposed to criminals.
Speaking via email, Silent Circle’s Toby Weir-Jones said of the Android device built to offer secure communication, “It’s obvious there is tremendous interest in the goals we’ve set for Blackphone, even though we have released so little concrete detail so far.”
What are the immediate practical implications of the Snowden-prompted revelation that the NSA has broken or circumvented a lot of commercially available encryption? For a start, you should not stop using encryption, but you may want to review how you use it moving forward, Stephen Cobb explains.
We tend to replace our computers more often these days but how do you ensure that you don’t give away your data when you pass on that old desktop or laptop? Here are our top tips for safer computer disposal. Back up your data Before you do anything with your existing PC or laptop, ensure
Brutalize? Yes, that’s what the Governor of South Carolina wants to do to the person who breached security at the South Carolina Department of Revenue (SCDOR) and exposed Social Security Numbers and other information pertaining to 3.6 million people, as well as 387,000 credit and debit card records. Speaking to the press on Friday, Gov.
When we relayed the FBI/IC3 warning to travelers about a threat involving hotel Internet service overseas last week it produced a lot of requests for advice on how to respond to the threat. So a few of us researchers at ESET came up with a list of data security tips for travelers. These tips will
The phenomenon of organizations allowing or encouraging their employees to use their own computing devices for work–known as Bring Your Own Device, or BYOD–is now widespread in many countries, bringing with it some serious risks to company networks and data. As we first reported here on the blog a few weeks ago, ESET commissioned a
The world's largest information security event, the annual RSA Conference, is over for another year. Most of the more than 18,000 people who attended the 2012 gathering are probably back home now, getting ready to go into the office. What will be top of mind for them, apart from "How did I manage to survive
Employee use of personally-owned computing devices for work-related purposes–known as Bring Your Own Device or BYOD–is not a new trend and security professionals have been concerned about it for some time, but there is a widely held view that the trend has been transformed of late. Why? Waves of mobile digital devices flooding into the
Throughout the years we have advised that you should use encryption on your home WI-FI. There are ma y reasons for this, including keeping your data confidential, but not having encryption enabled on your home WI-FI can put you at serious risk of having your doors knocked down and being arrested for downloading child pornography.
Today kicks off the RSA conference in San Francisco. This is the 20 anniversary for the RSA conference. RSA stands for Rivest, Shamir and Adleman, who invented RSA encryption. The RSA conference and trade show has grown from an encryption focused conference to one which includes virtually every aspect of digital security. As has been
I’m sure that at some point you have listened to the radio. A signal goes out and all radios in range can tune in to the broadcast. WI-FI is essentially a radio signal that transmits and receives data. The access point and your computer exchange information, but all computers with wireless capabilities can receive the
An Associated Press release http://news.yahoo.com/s/ap/20100927/ap_on_hi_te/us_internet_wiretaps today indicates that the Obama administration is drafting legislation that would require companies to make it technically possible to intercept all electronic communications in the US. This would affect all of the US telephone companies, Skype, and also companies, such a RIM (Blackberry) that are based outside of the US.
It will likely come as no surprise to regular readers of ESET's Threat Blog that we are somewhat gadget aficionados here in the Research Department. Our focus, however, is usually on issues such as malware, spam and privacy so we do not spend a lot of time discussing gadgetry. Every once in a while, though,
[Part 9 of an occasional series, updating a blog series I ran in early 2009 to reflect changes in the threat landscape. This series is now available as a white paper at http://www.eset.com/download/whitepapers.php.] Be Wireless, not Careless Don’t connect to just any “free Wi-Fi” access point: it might alter your DNS queries or be the “evil twin” of