Security News

Encryption management solutions market to grow steadily by 2025
2022-02-14 04:00

The encryption management solutions market is expected to increase by $6.07 billion from 2020 to 2025, and the market's growth momentum will accelerate at a CAGR of almost 17%, according to Technavio. The encryption management solutions market is fragmented, and the vendors are deploying various organic and inorganic growth strategies to compete in the market.

How to enable end-to-end encryption in Facebook Messenger
2022-02-09 15:07

How to enable end-to-end encryption in Facebook Messenger. End-to-end encryption is not enabled by default in Facebook Messenger.

Breaking 256-bit Elliptic Curve Encryption with a Quantum Computer
2022-02-09 12:25

Finally, we calculate the number of physical qubits required to break the 256-bit elliptic curve encryption of keys in the Bitcoin network within the small available time frame in which it would actually pose a threat to do so. It would require 317 106 physical qubits to break the encryption within one hour using the surface code, a code cycle time of 1 μs, a reaction time of 10 μs, and a physical gate error of 10-3.

Internet Society condemns UK's Online Safety Bill for demonising encryption using 'think of the children' tactic
2022-01-28 12:56

Britain's controversial Online Safety Bill will leave Britons more exposed to internet harms than ever before, the Internet Society has said, while data from other countries suggests surveillance mostly isn't used to target child abusers online, despite this being a key cited rationale of linked measures. Government efforts to depict end-to-end encryption as a harm that needs to be designed out of the internet as it exists today will result in "Fraud and online harm" increasing, the Internet Society said this week.

Silk could tie up all-but-unbreakable encryption, say South Korean boffins
2022-01-28 05:31

Silk could become a means of authentication and unbreakable encryption, according to South Korean boffins. Silk can take on this role, as explained in Nature Communications, because security boffins are increasingly interested in "Physical unclonable functions" - physical objects whose properties are impossible to replicate.

Patching the CentOS 8 Encryption Bug is Urgent – What Are Your Plans?
2022-01-27 04:50

Just two weeks after reaching the official end of life, something broke spectacularly, leaving CentOS 8 users at major risk of a severe attack - and with no support from CentOS. You'd think that this issue no longer affects a significant number of organizations because by now, companies would have migrated away from CentOS 8 to an OS that is actively supported by vendors. Just the same with Red Hat, which backs CentOS. But, with CentOS 8 now no longer officially supported, a CentOS 8 patch for the LUKS flaw is not going to appear.

Privacy is for paedophiles, UK government seems to be saying while spending £500k demonising online chat encryption
2022-01-20 15:06

The British government's PR campaign to destroy popular support for end-to-end encryption on messaging platforms has kicked off, under the handle "No Place To Hide", and it's as broad as any previous attack on the safety-guaranteeing technology. Judging by videos earnestly distributed by organisations supporting it, the No Place To Hide campaign is much wider than merely targeting Facebook Messenger as was previously thought.

UK Government to Launch PR Campaign Undermining End-to-End Encryption
2022-01-18 12:05

Rolling Stone is reporting that the UK government has hired the M&C Saatchi advertising agency to launch an anti-encryption advertising campaign. Presumably they'll lean heavily on the "Think of the children!" rhetoric we're seeing in this current wave of the crypto wars.

Serious Security: Linux full-disk encryption bug fixed – patch now!
2022-01-14 21:58

With FDE, everything gets encrypted, including unused parts of the disk, deleted sectors, filenames, swapfile data, the apps you're using, the operating system files you've installed, and even the disk space you've deliberately zeroed out to forcibly overwrite what was there before. Did you use the right cryptographic algorithm? Did you generate the encryption keys reliably? Did you handle the issue of data integrity properly? Can you change passwords safely and quickly? How easy is it to lock yourself out by mistake? What if you want to adjust the encryption parameters as your corporate policies evolve?

Analyst guide: Encryption solutions buyers checklist
2022-01-11 09:01

Encryption plays a key part in email security, ensure you find the right fit for your enterprise. Finding ways to secure information effectively is a must. This challenge is perhaps never more...