Security News

Using memory encryption in web applications to help reduce the risk of Spectre attacks
2021-03-25 06:00

As Google security engineers pointed out, these mechanisms do not prevent the Spectre exploit, but rather "Protect sensitive data from being present in parts of the memory from which they can be read by the attacker." To further reduce the risk of data leakage, website owners should add an extra line of defense to protect the actual data in memory in the event that all other security controls.

REvil ransomware has a new ‘Windows Safe Mode’ encryption mode
2021-03-19 11:15

The REvil ransomware operation has added a new ability to encrypt files in Windows Safe Mode, likely to evade detection by security software and for greater success when encrypting files. Windows Safe Mode is a special startup mode that allows users to run administrative and diagnostic tasks on the operating system.

DARPA taps Intel to help build the holy grail of encryption
2021-03-08 14:00

The Defense Advanced Research Projects Agency, or DARPA, has signed an agreement with Intel to add it to its Data Protection in Virtual Environments project, which aims to create a practically useful form of fully homomorphic encryption. Fully homomorphic encryption has been described as the "Holy grail" of encryption because it allows encrypted data to be used without ever having to decrypt it.

Intel CPU interconnects can be exploited by malware to leak encryption keys and other info, academic study finds
2021-03-08 01:00

Doctoral student Riccardo Paccagnella, master's student Licheng Luo, and assistant professor Christopher Fletcher, all from the University of Illinois at Urbana-Champaign, delved into the way CPU ring interconnects work, and found they can be abused for side-channel attacks. "It is the first attack to exploit contention on the cross-core interconnect of Intel CPUs," Paccagnella told The Register.

Microsoft Teams adds end-to-end encryption (E2EE) to one-on-one calls
2021-03-02 14:00

Microsoft adds new security, privacy, and compliance features to the Microsoft Teams chat and collaboration solution, including end-to-end encryption support for one-on-one voice calls. Microsoft Teams is a cloud collaboration platform designed to allow an organization's team to stay organized and communicate via text, audio, and video, all in one place.

India's demand to identify people on chat apps will 'break end-to-end encryption', say digital rights warriors
2021-02-26 02:10

After a three-year review process, India has announced strict regulations for instant chat services, social network operators, and video-streaming companies. India's Internet Freedom Foundation has slammed this traceability requirement, claiming it will be impossible to implement strong end-to-end encryption as a result, and thus could harm privacy.

Database encryption: Protecting the crown jewels
2021-02-22 06:30

They can also copy the entire database - including files that contain many of the corporate crown jewels. There are a variety of technologies for database encryption.

Homomorphic encryption: Myths and misconceptions
2021-02-18 06:30

I like tackling misconceptions relating to innovative technical advancements in my own line of work, and here I'll talk about homomorphic encryption. Here are four misconceptions about homomorphic encryption that should be considered by anyone interested in potential use cases.

Quantum computing and encryption: Key to achieving resilience, technological sovereignty and leadership
2021-02-15 05:00

One such document is the new EU Cybersecurity Strategy, which mentions quantum computing and encryption as key technologies for achieving resilience, technological sovereignty and leadership. Quantum technology will enable a huge leap forward in many branches of industry, as it can efficiently resolve problems technologies of today are not able to provide a solution for.

Cornami and Inpher deliver Fully Homomorphic Encryption to modern innovators
2021-02-10 01:30

FHE has long been described as transformative for data privacy and cloud security as it enables computing on encrypted data sets, thereby keeping the underlying data secure. With Secret Computing technology, data scientists can finally build advanced analytics and Artificial Intelligence models on distributed data sources without ever exposing or transferring sensitive data across departments, organizations, or jurisdictions.