The U.S. government, finally realizing that it has to take action to ensure a minimum level of cybersecurity in networks that manage the nation's energy, water and financial services, presented the Framework for Improving Critical ...
Tags: Consumer Electronics
Google has bowed to concerns over unauthorised eavesdropping by announcing that it will start to automatically encrypt data stored in Google Cloud Storage. The company says that it will use 128-bit advanced encryption standard (AES) ...
Tags: Google, Computer Products, webservice, Google Cloud
Google has announced the company is in the process of migrating its SSL [Secure Sockets Layer] certificates from 1024-bit to 2048-bit levels of encryption. Google Identity Team's Tim Bray describes the decision as "part of our continuous ...
Tags: SSL Certificates, google
Google plans to upgrade the security of its Secure Sockets Layer (SSL) certificates, an important component of secure communications. SSL certificates are used to encrypt communication and verify the integrity of another party with which ...
Tags: Google, SSL Encryption Keys, August
Wikileaks' latest release is billed as a transcript of a "secret meeting," but it may more accurately be termed a promotion. The site on Friday released a five-hour transcript of a June 2011 meeting between Julian Assange, one of the ...
Tags: google, Computer Products
Mozilla is taking steps to limit the risk of powerful subordinate Certificate Authority (CA) certificates falling into the hands of attackers and potentially being used to issue rogue certificates for use in SSL snooping attacks. The ...
Tags: Mozilla, browser maker, browser
The Mega file-sharing service has launched a vulnerability reward program that will pay up to 10,000 euros (around $13,600) for every serious security flaw found in the platform and reported responsibly. The rules of the program were laid ...
Tags: Mega, file-sharing service, vulnerability reward program
Symantec on Wednesday began offering multi-algorithm SSL certificates for Web servers that go beyond traditional crypto to include what’s known as the Elliptic Curve Cryptography (ECC) Digital Signature Algorithm (DSA). The firm ...
Tags: Symantec, SSL certificates, Web servers
IDG News Service - Google has taken steps to close potential security holes created by a fraudulent certificate for its google.com domain, discovered in late December. The certificate was erroneously issued by an intermediate certificate ...
Tags: Google, software, browser, HTTPS servers
IDG News Service - Turktrust, the Turkish certificate authority (CA) responsible for issuing an intermediate CA certificate that was later used to generate an unauthorized certificate for google.com, claims that the bad Google certificate ...
Tags: Google certificate, Google, Microsoft, Internet
Digital certificates issued by an authority in Turkey are being used for "man in the middle" attacks on Google properties, according to warnings issued by both Microsoft and Google. The security flaw was traced to a fraudulent digital ...
Tags: Computer Products, Soft
Digital certificates issued by an authority in Turkey are being used for "man in the middle" attacks on Google properties, according to warnings issued by both Microsoft and Google. The security flaw was traced to a fraudulent digital ...
Tags: Microsoft, Google, Turkey, security flaw
IDG News Service-U.S.Immigration and Customs Enforcement has seized 70 websites accused of selling products that infringe copyright,bringing the number of websites seized by ICE in the last two years to 839. The websites recently seized ...
Jelastic, Inc. today announced the launch of Jelastic 1.8.5 featuring integration with Parallels Billing Automation Standard (PBAS), application packaging, TCP load balancing, custom SSL certificates and a Smart Live Migration System. ...
This is the third in a series of interviews with C-level executives responsible for cyber security and privacy in business and government, who also happen to be thought leaders. (Remember, as I mentioned previously, "C-level executive" and ...
Tags: interviews, cyber security, privacy, business, government, web security