Items tagged with Encryption

F-Secure added 256 bit AES encryption for email to the newest version of its Messaging Security Gateway. The company boasts that the F-Secure Messaging Security Gateway is the "most effective anti-spam appliance on the market" and claims a detection accuracy of 99.8 percent. The new email encryption feature is designed to be easy to use and does not require a separate server. The F-Secure Messaging Security Gateway is available as a physical or virtual appliance. F-Secure Makes It Easy for Businesses to Encrypt Email, Roast Spam and Defeat Viruses F-Secure Messaging Security Gateway Now Offers Powerful Email Encryption in Addition to Industry-Leading Spam Filtering and Anti-Virus Capabilities... Read more...
VIA Launches ACE-CNX Customized Security ServiceVIA ACE-CNX provides tailor-made data security through hardware-based data encryption Taipei, Taiwan, 1 September 2009 - VIA Technologies, Inc, a leading innovator of power efficient x86 processor platforms, today announced the VIA ACE-CNX security service, helping customers harness the power of the Advanced Cryptographic Engine (ACE) embedded at the core of all VIA processors. The customer-centered VIA ACE-CNX service allows VIA's team of security experts to work closely with the customer, implementing data encryption standards that meet with widely accepted international standards. The advantage of data encryption through the hardware, as opposed... Read more...
One of the iPhone 3GS's new features is hardware encryption. This should make it more suitable for business, but as its purportedly in hardware, it's unavailable to other iPhone models. It can also be cracked in two minutes, using nothing more than freeware, according to Jonathan Zdziarski, an iPhone developer and hacker. Zdziarski said:"It is kind of like storing all your secret messages right next to the secret decoder ring. I don’t think any of us [developers] have ever seen encryption implemented so poorly before, which is why it’s hard to describe why it’s such a big threat to security.”To grab data, one simply has to jailbreak the iPhone 3GS, then install an SSH client to port the iPhone... Read more...
Kaiser Permanente, a non-profit HMO based in California, has begun offering its Northern California members USB flash drives containing a portion of their medical records that can be carried with them on business trips and vacations. Kaiser Permanente undertook a major computerization of their medical recordkeeping in the past few years. As a member, I can attest to that. You can book appointments online (change them, even), email your physician, order prescriptions online, etc. etc. But you can't see your medical records aside from items like test results and the like. The $5 flash drive, available from any medical secretary at a Kaiser facility, doesn't hold all your records, but enough of... Read more...
Full Disk Encryption Comes to Solid State DrivesLee, MA and San Jose, CA: Wave Systems Corp. and Samsung Electronics Co., Ltd., have collaborated to give professionals on the go the ultimate in hard drive security. Along with blazing speed, ultra-fast boot-up and silent operation, Samsung's new self-encrypting SSDs automatically encrypt information as it's saved to the drive, an industry first for SSDs.Full disk encryption (FDE) has already been adopted as a standard feature available in many commercial laptop and desktop systems with hard disk drives. Samsung self-encrypting drives - 256-, 128- and 64-gigabyte SSDs - provide FDE bundled with Wave's EMBASSY management software and are now available... Read more...
Encrypt Your Data with New Ultra-Secure Iomega eGo Encrypt Portable Hard Drive Iomega Also Adds New "BlackBelt" Model To Award-Winning eGo Portable Hard Drive Lineup San Diego, December 2, 2008 - Iomega, an EMC company (NYSE: EMC) and a global leader in data protection, today announced two new models in its award-winning eGo Portable Hard Drive line: the new ultra-secure Iomega® eGo™ Encrypt Portable Hard Drive with hardware-based encryption for double data protection, and the new "black-on-black" super rugged Iomega eGo BlackBelt Portable Hard Drive with Drop Guard™ Xtreme data protection."Adding two exciting models to our eGo Portable Hard Drive lineup is an embarrassment of... Read more...
We've always been warned to be vigilant about what information we provide when online. Between phishing, malware, and DNS spoofing it's difficult to blindly trust any online entity these days. But if we have a secure connection to a known site, we're okay then, right? Not always... Someone might still be listening in. Just because you think your connection is secure, doesn't mean that it is. In fact, as we reported a few weeks ago, researchers have found a way to wirelessly listen in on your keyboard activity--sort of a passive, non-intrusive keylogger. Perhaps a bit more common is the act of listening in on wireless networking communications. Even such efforts as disabling router SSIDs and using... Read more...
You'll recall that in February security researchers found a way to break into encrypted hard drives by using a trick that relies on the fact that RAM dissipates its contents slower if cooled.The research paper, by Princeton, the Electronic Frontier Foundation, and Wind River Systems was titled "Lest We Remember: Cold Boot Attacks on Encryption Keys" (.PDF").  Over the weekend, timed to coincide with the Last HOPE hacker conference over the weekend in New York, the source code was published to the Web.Of course, this technique only works if the laptop hasn't already been turned off, which would have enabled the memory to fully dissipate.  This probably isn't the method most people on... Read more...
Utilizing a little known fact about RAM, researchers have devised a way to crack disk encryption. The attack takes only a few minutes to conduct and uses the disk encryption key that's stored in the computer's RAM. The attack works because content as well as encryption keys stored in RAM linger in the system, even after the machine is powered off, enabling an attacker to use the key to collect any content still in RAM after reapplying power to the machine. "We've broken disk encryption products in exactly the case when they seem to be most important these days: laptops that contain sensitive corporate data or personal information about business customers," said J. Alex Halderman, one of the researchers,... Read more...
EMI music announced today that their catalog of digital music will be made available, starting with Apple's iTunes download service, without Digital Rights Management (DRM) restrictions. Apple's iTunes Store (www.itunes.com) is the first online music store to receive EMI's new premium downloads. Apple has announced that iTunes will make individual AAC format tracks available from EMI artists at twice the sound quality of existing downloads, with their DRM removed, at a price of $1.29/¬1.29/£0.99. iTunes will continue to offer consumers the ability to pay $0.99/¬0.99/£0.79 for standard sound quality tracks with DRM still applied. Complete... Read more...
If you build it, it will be cracked. That's been the story behind most encryption, and the latest generation of media formats seem no different. Last year, Microsoft's HD-DVD encryption was cracked by someone who goes by the name of "Muslix64", and this year he adds Blu-Ray to his list of defeated media formats. This is a pretty amazing feat considering he/she had no access to Blu-Ray hardware. "Although Muslix64 did not have any Blu-ray equipment at his disposal, he was still able to recover the keys with the help of Janvitos' memory dump file and media file. Blu-ray media files are divided into individual aligned units. The first 16 bytes of each unit are not encrypted, with... Read more...
Finally, a government program regarding technology that I can support. HotHardware has reported in prior articles Seagate Announces Encrypted Hard Drives for Notebooks and How To Turn Your Stolen Laptop Into A Snitching Doorstop both concerning the issues that are being served by this memorandum. After story after story of government laptops being stolen and compromised, the U.S. government is making progress in encrypting all information stored on its data devices. On June 23, 2006, a memorandum (PDF) from the Executive Office of the President mandated that all government mobile computers and devices must fully encrypt all data. The document... Read more...
I know you slept through quantum physics class. Your snoring woke me up. Luckily, Someone at Magiq Technologies, among other people, was sitting up straight and taking notes. And they think they can make the next generation of data encryption essentially impregnable by using those pesky photons from page 234 in the textbook we didn't read either: Magic combines a computer, a finely tuned laser, a photon detector, and a fiber-optic line. The laser inside the Magiq QPN box is adjusted to produce single photons, which are then sent over the fiber-optic cable to a second QPN box, which detects them and notes precisely their time of arrival.... Read more...
First ... Prev 4 5 6 7 8