Security News

Cryptomator: Open-source cloud storage encryption
2024-08-28 04:30

Cryptomator offers open-source, client-side encryption of your files in the cloud. It’s available for Windows, Linux, macOS and iOS. Cryptomator works with Dropbox, Google Drive, OneDrive, MEGA,...

Security Experts Welcome NIST’s New Encryption Standards For Quantum Computers
2024-08-16 15:26

Quantum computers are rapidly increasing the ability for high-performance computing, and the new standards are ready for immediate use, NIST said. "Quantum computing technology could become a force for solving many of society's most intractable problems, and the new standards represent NIST's commitment to ensuring it will not simultaneously disrupt our security," said Under Secretary of Commerce for Standards and Technology and NIST Director Laurie E. Locascio, in a statement.

NIST Releases First Post-Quantum Encryption Algorithms
2024-08-15 15:37

From the Federal Register: After three rounds of evaluation and analysis, NIST selected four algorithms it will standardize as a result of the PQC Standardization Process. The public-key...

NIST releases first encryption tools to resist quantum computing
2024-08-14 19:33

The U.S. National Institute of Standards and Technology (NIST) has released the first three encryption standards designed to resist future cyberattacks based on quantum computing technology. [...]

NIST releases finalized post-quantum encryption standards
2024-08-14 03:00

NIST has finalized its principal set of encryption algorithms designed to withstand cyberattacks from a quantum computer. The announced algorithms are specified in the first completed standards...

NIST finalizes trio of post-quantum encryption standards
2024-08-14 01:44

The National Institute of Standards and Technology today released the long-awaited post-quantum encryption standards, designed to protect electronic information long into the future - when quantum computers are expected to break existing cryptographic algorithms. The finalized standards include three post-quantum cryptographic algorithms.

Google Chrome Adds App-Bound Encryption to Protect Cookies from Malware
2024-08-01 09:49

Google has announced that it's adding a new layer of protection to its Chrome browser through what's called app-bound encryption to prevent information-stealing malware from grabbing cookies on Windows systems. "On Windows, Chrome uses the Data Protection API which protects the data at rest from other users on the system or cold boot attacks," Will Harris from the Chrome security team said.

Chrome adopts app-bound encryption to stymie cookie-stealing malware
2024-07-31 16:35

Google says it's enhancing the security of sensitive data managed by Chrome for Windows users to fight the scourge of infostealer malware targeting cookies. Starting in Chrome 127, the stable version of which was released last week, the browser now uses app-bound encryption primitives that encrypt data in a way that links it to a specific app.

Google Chrome adds app-bound encryption to block infostealer malware
2024-07-30 17:03

Google Chrome has added app-bound encryption for better cookie protection on Windows systems and improved defenses against information-stealing malware attacks. As Chrome software engineer Will Harris explained in a blog post published today, Chrome currently uses the most robust techniques provided by each operating system to safeguard sensitive data such as cookies and passwords: Keychain services on macOS, kwallet or gnome-libsecret on Linux, and the Data Protection API on Windows.

How Searchable Encryption Changes the Data Security Game
2024-07-29 10:40

Just looking at traditional encryption of data at rest, these encryption solutions commonly involve a complete "Lift and shift" of the database to the encryption at rest solution. A modern, more complete database encryption strategy must account for encryption of critical database data in three states: at rest, in motion, and now IN USE. Searchable Encryption, also called Encryption-in-Use, keeps that data fully encrypted while it's still usable.