Paubox, the leading provider of HIPAA compliant email security, has been named the best email encryption software by G2 in its 2026 Best Healthcare Software Products Awards. It’s the second ...
Two popular AES libraries, aes-js and pyaes, “helpfully” provide a default IV in their AES-CTR API, leading to a large number of key/IV reuse bugs. These bugs potentially affect thousands of ...
In early 2025, Forbes reports, investigators at the FBI served Microsoft with a warrant seeking the BitLocker encryption recovery keys for several laptops it believed held evidence of fraud in Guam’s ...
The RansomHouse ransomware-as-a-service (RaaS) has recently upgraded its encryptor, switching from a relatively simple single-phase linear technique to a more complex, multi-layered method. In ...
Seravault is a progressive web app that allows users to encrypt confidential information and securely share with others. The app implements end-to-end encryption so that the man-in-the-middle attack ...
The 2024 FinWise data breach serves as a stark example of the growing insider threats faced by modern financial institutions. Unlike typical cyberattacks originating from external hackers, this ...
Quantum computers could one day crack the encryption protecting your most sensitive data. Here's how VPNs are adapting. I’ve been writing about technology since 2012, focusing on privacy. With ...
Mobile devices sometimes get lost. A laptop bag gets left on the bus or train, a smartphone slips out of your pocket, or a USB flash drive falls to the ground unnoticed. Losing a notebook or phone ...
The U.S. government on Monday announced the U.K. would drop its demand for Apple to provide a "back door" to user data. The move represents a triumph for the iPhone maker and, more broadly, for end-to ...
Two years ago, researchers in the Netherlands discovered an intentional backdoor in an encryption algorithm baked into radios used by critical infrastructure–as well as police, intelligence agencies, ...
A new research paper by Google Quantum AI researcher Craig Gidney shows that breaking widely used RSA encryption may require 20 times fewer quantum resources than previously believed. The finding did ...