The technology community has a definition of an encryption back door. The government has its own. A judge’s order Tuesday night compelling Apple to assist law enforcement officials in unlocking the ...
A new security audit has found critical vulnerabilities in VeraCrypt, an open-source, full-disk encryption program that’s the direct successor to the widely popular, but now defunct, TrueCrypt. Users ...
This article appears in the Aug. 27, 2009, edition of ISO&Agent Weekly. As card-security breaches continue to hamper the payments industry, the parties involved in the transaction process are ...
Researchers at the Netherland’s Radboud University have uncovered serious security issues with several solid-state drives that use hardware-based encryption—vulnerabilities that would allow an ...
A new security audit has found critical vulnerabilities in VeraCrypt, an open-source, full-disk encryption program that’s the direct successor of the widely popular, but now defunct, TrueCrypt. Users ...