Quantcast
 
Yahoo Explains How It’s Making All Its Properties More Secure

Yahoo Explains How It’s Making All Its Properties More Secure

By Chris Crum April 3, 2014

Last fall, Yahoo announced that it would turn on SSL/HTTPS encryption for Yahoo Mail this year, which it did in January. The following month, they added it to Tumblr. Yahoo has now posted an update on its ongoing encryption efforts. …

Yahoo To Encrypt All Data By End Of Q1 Yahoo To Encrypt All Data By End Of Q1
· 1 Comment

Yahoo CEO Marissa Mayer announced on Monday that the company plans to have all information that moves between its data centers (meaning data from all Yahoo products) encrypted by the end of Q1 2014. It will also offer users an …

Mobile Encryption Market Hits $230 Million This Year Mobile Encryption Market Hits $230 Million This Year
· 1 Comment

The rush of the quickly growing mobile device industry has made it easier than ever for people to share their lives in real-time. Unfortunately, this has led to privacy and security concerns that have not yet been fully resolved. As …

Yahoo Mail Gets 'Very Serious' About Security Yahoo Mail Gets 'Very Serious' About Security
· 1 Comment

Update: A Yahoo spokesperson tells WebProNews, “In addition to making https a default feature by January 2014 for all Yahoo Mail users, we plan to implement 2048-bit encryption keys, which will provide our users with a further layer of security.” …

Google Turns On Secure Search For More People Google Turns On Secure Search For More People
· 3 Comments

In early June, it was revealed that the NSA was working with a variety of tech companies to access information on foreign targets and Americans. Google and others named in the leak denied ever having provided unfettered access to their …

NIST Says It Would Never Weaken Encryption NIST Says It Would Never Weaken Encryption
· 2 Comments

Last week, it was revealed that the NSA works tirelessly to break through all forms of encryption. One of the more worrisome revelations from the leak was that the agency worked with the National Institute of Standards and Technology to …

NSA Can Break Internet Encryption Technologies NSA Can Break Internet Encryption Technologies
· 6 Comments

The NSA can see pretty much everything you do online as long as it’s not encrypted. That’s at least what a Snowden leak from last month claimed. The news spurred more people and businesses to sign up for more encryption …

Google Eases Cloud Storage Security Concerns Google Eases Cloud Storage Security Concerns
· 3 Comments

Google announced that Google Cloud Storage now encrypts all data before it’s written to disk. Better yet, this will cost you nothing extra. In fact, you don’t even have to do anything extra or change any settings. Data is simply …

5th Amendment Protects Child Porn Suspect 5th Amendment Protects Child Porn Suspect
· 1 Comment

A man accused of housing child pornography on multiple hard drives will not be forced to give authorities access, after a Wisconsin judge rules that doing so would violate his 5th Amendment rights against self-incrimination. The case involves Jeffrey Feldman, …

New Megaupload Is 90 Percent Complete New Megaupload Is 90 Percent Complete
· 1

It’s been over six months since Megaupload was shut down by the feds for charges of criminal copyright infringement. Since then, Kim Dotcom has been fighting court cases in New Zealand and the U.S. He’s also been working on a …

ASP.NET: HttpModule for Query String Encryption
· 20

URL parameters or query strings are often used to carry information that can be used by hackers to do identity theft or other unpleasant things.

White Papers Crack Encryption, RSS Issues

Encryption usage by the federal government needs to be defined better, while GeoRSS offers the promise of geo-enabling RSS feeds with location information.

OS X File Encryption

I’m going to look at two methods for encrypting files on Mac OS X. The first is built in, and uses DisK Utilty to create an encrypted disk image.

How To Deal With Wireless Encryption Security Threats

Because nobody wants to compromise the integrity of their network by having some hacker “borrow” your bandwidth or gain access and start snooping around you need to lock down your network.

Overview of XML Encryption

XML encryption classifies a course of action for encrypting plain text data, generating ciphertext, and decrypting the ciphertext to retrieve the plaintext data.

What is the Point of Encryption if you Don’t Know Who For?

Phishing is the fastest growing threat in the history of Internet and has gained immense popularity amongst Internet fraudsters and hackers as a simple yet effective way to gain unsolicited access to confidential user information.

Paper Passports About To Fade Away

In a post-911 society, identification documents will move away from paper and toward utilizing digital media.