Representatives of newly launched file-storage and sharing service Mega addressed some of the concerns raised by security researchers in recent days about the site's architecture and the implementation of its cryptographic features. In a ...
Tags: file-storage, sharing service, Mega
While the world’s online sharing community is excited about Kim Dotcom’s bold new venture, the file-storage and sharing service Mega, it is already drawing criticism from security researchers, who advise not to trust it. The ...
Cryptocat, a project building an instant messaging platform that provides more privacy and security for activists, plans a host of improvements this year, including developing an application for mobile devices. An open-source program, ...
Tags: Cryptocat, instant messaging platform, mobile application
Good Technology announced Good Vault, a system for adding two-factor authentication to the iPhone 4 and 4S for access to Good for Enterprise email. One of the Good Vault options features a smart-card reader that can be attached to an ...
Tags: Good Technology, Good Vault, authentication, iPhone
If having to pay $7+ per gigabyte for secure flash drives makes you blanch, take a look at the Lenovo ThinkPad USB 3.0 Secure Hard Drive. At only $200 for 750GBwhich translates to about 4GB per $1and PIN-pad security, it's a lot more ...
Tags: Lenovo, ThinkPad, USB 3.0, Secure Hard Drive
Ericsson has launched the world's first WebRTC-compatible browser for mobile devices, which will allow developers to integrate voice and video communications in their Web-based applications. The WebRTC (real-time communication) ...
Tags: Ericsson, WebRTC compatible browser, mobile devices, applications
As more traditional business functions become cloud offerings, there are certain questions organisations need to ask before moving to the cloud. This was the message of Mike Lynch, the former CEO of HP-owned Autonomy, who left the company ...
Tags: cloud offerings, Autonomy, cloud computing, IT industry, computer
The word "breach" can send shivers down your spine. When it comes to data storage in the cloud, it's even more worrisome. Several weeks ago, Dropbox announced that the passwords for thousands of users had been stolen, leading some business ...
Tags: data storage, Dropbox, passwords, service
Microsoft Windows 8 support for TPM Tipping point for TPM TPM gathers momentum The end of the password? TPM in action across all devices Since 2006, many new computing devices have been sold with a built-in trusted platform module ...
Tags: Microsoft Windows 8, TPM, password
Microsoft's"Secure Boot"plans for Windows 8 have already caused no end of controversy in the Linux community,and certainly one of the more divisive announcements in recent months was Canonical's decision to drop the GRUB 2 bootloader as ...
Tags: Ubuntu Linux, Microsoft, Windows 8, Secure Boot, FSF
IDG News Service-Amazon Web Services has upgraded its Storage Gateway so it can cache data locally,and has also made it generally available. The Storage Gateway is a software appliance that integrates local and cloud storage and can be ...
Tags: Amazon, Storage Gateway, data, Upgrades
Most organisations are failing to put the necessary protections around data in virtual environments, leaving them wide open to attack, says Jason Hart, vice-president cloud solutions, SafeNet. "In the virtual world, the basic security ...
Tags: necessary protections, data, virtual environments, confidentiality
Any organisations that have not yet replaced outdated security certificates will have to act quickly to meet the Microsoft deadline. From 9 October, Microsoft systems will require all public key infrastructure (PKI) digital certificates ...
Tags: Microsoft, outdated security, Microsoft deadline, key length
HM Revenue and Customs(HMRC)is implementing disk encryption as part of a laptop refresh programme following a pilot rollout using 300 laptops. HMRC will use Becrypt Disk protect,which has been certified by the CESG,the UK Government's ...
Tags: HMRC, encryption, Becrypt Disk protect, Becrypt
The Information Commissioner's Office(ICO)has published new guidelines that underline businesses'sole responsibility for the protection of data,even if it has been outsourced to third-party cloud network providers. As more businesses ...
Tags: ICO, data protection, cloud service, encryption key, UK