Chrome to stop using online checks to spot revoked certificates |
- Chrome to stop using online checks to spot revoked certificates
- Satellite telephony encryption cracked
- Trustwave revokes "MitM" certificate, vows never to issue one again
- More bogus ad-serving Android apps evade Google's Bouncer
- How online communication connects generations
- Security architecture for trusted execution environments
- Improved data recovery from SSDs
- Visibility and control of cloud services
- Security for IT consumerization
- Symantec releases Backup Exec 2012
Chrome to stop using online checks to spot revoked certificates Posted: 08 Feb 2012 06:08 AM PST Future versions of Google's Chrome browser will no longer use online revocation checks to verify whether the HTTPS site the user wants to visit possesses a valid certificate, shared Google researcher ... |
Satellite telephony encryption cracked Posted: 08 Feb 2012 05:25 AM PST Satellite telephony was thought to be secure against eavesdropping. Researchers at the Horst Görtz Institute for IT-Security (HGI) at the Ruhr University Bochum (RUB) have cracked the encryption algor... |
Trustwave revokes "MitM" certificate, vows never to issue one again Posted: 08 Feb 2012 05:19 AM PST Certificate authority Trustwave has revoked a subordinate root certificate it issued to a company that allowed it to intercept their employees' private email communication. "This single certificate... |
More bogus ad-serving Android apps evade Google's Bouncer Posted: 08 Feb 2012 03:32 AM PST Users searching for games on the official Android Market have lately been heavily targeted by ad-pushing scammers. First it was the fake Temple Run app, and now a string of bogus copies of popular iPh... |
How online communication connects generations Posted: 08 Feb 2012 03:21 AM PST AARP and Microsoft released "Connecting Generations," a research report that examines how people of all ages are using online communication and social networking to enhance their family relationships. |
Security architecture for trusted execution environments Posted: 08 Feb 2012 02:00 AM PST Elliptic Technologies introduced the tVault Security Architecture - a technology that enables end-to-end security in connected devices. tVault provides robust security inside Trusted Execution Envi... |
Improved data recovery from SSDs Posted: 08 Feb 2012 12:18 AM PST Data recovery from new types of data storage can be extremely time-consuming because of the need to research the algorithms used to originally store the data. Previously, recovery from SSDs, if possib... |
Visibility and control of cloud services Posted: 07 Feb 2012 11:30 PM PST Fidelis Security Systems announced a new cloud security solution which provides necessary visibility and control to decrease risks associated with using SaaS. The solution is deployed at the enterpris... |
Security for IT consumerization Posted: 07 Feb 2012 11:00 PM PST Lancope announced that its StealthWatch System extends network visibility to mobile devices for the security of bring-your-own-device (BYOD) environments. By analyzing mobile device information col... |
Symantec releases Backup Exec 2012 Posted: 07 Feb 2012 10:30 PM PST Symantec announced Backup Exec 2012 to help users eliminate complexity, perform backups in 100 percent virtualized environments and deliver instantaneous and cloud-based recovery through a single solu... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment