Encryption | SC Media

Encryption

Encryption everywhere

While encryption will deter data breaches, it comes with its own baggage — and keys It is not a question of if the bad actors will access confidential or highly classified data, rather it is a question of can attackers read and use confidential and classified data after they access it. Many experts believe the…

Cellebrite claims it can crack any iPhone or Android, Trump admins weigh encryption ban

Israeli data extraction firm Cellebrite announced the ability to break into any iPhone or Android device for law enforcement agencies near the same time Trump administration officials weighed the pros and cons of banning encryption law enforcement can’t break.   Senior Trump officials met Wednesday to discuss whether to seek legislation that would crack down on…

Unpatched bug in Windows SymCrypt library could cause DoS condition, warns researcher

Google’s Project Zero vulnerability hunting team has publicly disclosed an unpatched bug in the SymCrypt cryptography library for Windows, which could create a denial of service condition when the user initiates any function that requires cryptography. Project Zero researcher Tavis Ormandy said in a June 11 tweet that even though the problem is of “relatively…

Future-proof cybersecurity: Addressing implementation challenges in quantum cryptography

As cyberattacks grow in number and sophistication, it is essential that data is protected. But in today’s evolving threat landscape, this is not as simple as applying traditional security to communications systems. Indeed, many current systems use protocols based on mathematical problems, such as integer factorization, which could be easily cracked by quantum computers of…

Adiantum boosts encryption for low-end Android devices

Google has developed a new storage encryption solution that will boost encryption capabilities for low-end Android devices that don’t have the hardware to support AES. Researchers said the new solution, called Adiantum, allows the use of the ChaCha stream cipher “in a length-preserving mode, by adapting ideas from AES-based proposals for length-preserving encryption such as HCTR and HCH,”…

Cloud-based security management

Over the past few years there has been quite a bit of conjecture around the security market and how it will continue to evolve. Security professionals have started to find their own real success against hackers comes from using the same tools and techniques as hackers to turn the tides. Increasingly, security products are adding in…

Cloud-based security products – Group Test

This month we focused on five products in the cloud-based security space that solve a problem almost every organization faces – the ability to have a broad security solution that can span over a multifaceted infrastructure environment whether it’s sitting in AWS, Azure, Google Cloud Platform, virtual environments or bare-metal on-premises machines. Some cloud-based security…

Top cybersecurity legislation of 2019

It’s the law…almost 2018 may go down as the year the EU’s GDPR went into effect but legislators domestically kept busy introducing and passing legislation meant to bolster the U.S.’s cybersecurity and privacy postures. California Privacy Act After a rush to get legislation done so a ballot measure slated for the November election could be…

2019 Cybersecurity Predictions

Stan Lowe, CISO, Zscaler There will be an increased focus on cyber risk versus spending by governments and corporations. Cybersecurity practitioners continue to spend vast amounts of money to mitigate all risk to the extent that we are approaching, or even reached, the point where businesses can no longer sustain it. We’ll begin to see…

Next post in Security News