Companies opted for AI, machine learning for defense, while attackers used encryption in 2017: Cisco
The on-going battle between cyberattackers and those tasked with defending their company's ramparts resulted in cybercriminals adding encryption to their bag of tricks to keep their activities hidden, while the good guys placed more faith in artificial intelligence and machine learning as a defensive measure.
Google said that beginning in July 2018 with the release of Chrome 68, the browser will begin marking the sites as part of its move toward a more secure web by strongly advocating that sites adopt HTTPS encryption
Enterprises are developing and using enterprise applications on a large scale for various purposes, but a lack of encryption, coupled with serious security flaws in such applications, is also rendering enterprises vulnerable.
Academic researchers have reported vulnerabilities in the group communication protocols of three encrypted messaging apps -- WhatsApp, Signal, and Threema -- that could allow attackers to willfully subvert their integrity and confidentiality.
A POS malware infection was responsible for compromising payment card data collected at certain Forever 21 stores last year -- an attack that was exacerbated by a lack of encryption on some devices, the apparel retailer stated.
Cy Vance spoke on the lack of federal legislation to force tech giants to make exceptions in smartphone encryption for when judicial warrants are issued.
Estonia on Friday blocked the certificates of 760,000 national ID cards in response to a cryptographic vulnerability that researchers have discovered is even more dangerous than originally reported.
After the KRACK epidemic and the ROCA scare the latest DUHK cryptography attack may more of a threat than its quacked up to be for old Fortinet FortiGare devices.
Encryption has kept the FBI from accessing 7,000 mobile devices, says FBI Director Christopher Wray.
Google is rolling out a new three-step cybersecurity plan designed to give extra protection to those most in need.
Deputy AG Rod J. Rosenstein called for tech companies to use "responsible encryption."
The International Organization for Standardization (ISO) decided not to approve the NSA encryption algorithms Speck and Simon.
The government wanted a way to tap into encrypted messages but WhatsApp said declined, according to a report by Sky News.
Keeping soldiers' email out of the hands of enemies has long been a concern, but the Pentagon has been slow to use the readily available encryption tool for its internal mail service which serves 4.5 million users.
Researchers from five universities have published a paper demonstrating full key recovery for libgcrypt's implementation of RSA-1024.
Aware that terrorists take advantage of social media and messaging platforms to spread propaganda and securely communicate, Facebook on Thursday divulged its recent efforts to use AI to identify objectionable content.
WhatsApp added another layer of protection for users in late 2016, quietly introducing a new feature that encrypts messages and contacts when uploading this data to Apple's iCloud servers, according to a Forbes report.
The president of The Internet Society has called on G20 leaders to protect encryption for the good of the world economy.
No More Ransom, conceived as a European resource, is adding new partners and new decryption tools in a boost to its now global anti-ransomware campaign.
Switzerland's cognitive security operations centre will be built around IBM Watson for Cyber Security and provide in-country support to the banking sector.
More than half of the internet traffic is already HTTPS encrypted for the sake of higher security. However, the encrypted traffic is used by cyber-criminals as well to hide their malicious activities from detection.
A United States Air Force officer mistakenly exposed not only the personally identifiable information (PII) of many service members, but also the records of on-going criminal investigations and instructions for recovering encryption keys for military documents.
Anonymous's compromise of Freedom Hosting II may have reduced the overall size of the Tor network by an estimated 15 to 20 percent, according to researcher Sarah Jamie Lewis, who works for OnionScan, an open-source dark web scanning tool project.
At a cybersecurity conference at Boston College Wednesday Comey said he supported strong encryption but that it cause the FBI to investigate in the dark.
A panel of esteemed cryptographers at RSA 2017 expressed doubt over artificial intelligence's applicability in the cybersecurity space, tossing cold water on what otherwise appeared to be a hot technology at the conference.
The EFF is rallying tech firms to unite to defend internet users before Donald Trump's inauguration.