Engineers at Google for several years have been doing battle against the perception that end-to-end email encryption necessarily must be complex and hard to use. They've been cooking up a project ...
A new security audit has found critical vulnerabilities in VeraCrypt, an open-source, full-disk encryption program that’s the direct successor of the widely popular, but now defunct, TrueCrypt. Users ...
TrueCrypt is a powerful, free, open source program that allows you to create encrypted volumes on your computer, or to encrypt entire disks, including your system disk. Furthermore, it allows you to ...
Sun announced today that it is throwing its hat into the standards arena, proposing that its open-source key management API be used as a universal way to allow encrypting devices to communicate with ...
Percona, a leader in enterprise-grade, open source database software, support, and services, is announcing the general availability of the Percona Transparent Data Encryption (TDE) extension for ...
Open Source has sort of eaten everything in software these days. And that includes malware, apparently, with open source Command and Control (C2) frameworks like Sliver and Havoc gaining traction. And ...
MongoDB today announced at its developer conference MongoDB.local Chicago the general availability of Queryable Encryption, which it says is a first-of-its-kind technology that helps organizations ...
Analysis shows most security risk sits in longtail open source images, with 98% of CVEs outside top projects & Critical flaws ...
Several popular messaging apps, including Messenger, Signal, Telegram and WhatsApp, use end-to-end encryption. Open Rights Group/Flickr, CC BY-SA Imagine opening your front door wide and inviting the ...