Twitter tightens security against NSA snooping

Saturday, November 23rd, 2013

Twitter has implemented new security measures that should make it much more difficult for anyone to eavesdrop on communications between its servers and users, and is calling on other Internet companies to follow its lead. The company has implemented "perfect forward secrecy" on its Web and mobile platforms, it said Friday. The ...

Encrypt the Web Report: Who’s Doing What

Wednesday, November 20th, 2013

We’ve asked the companies in our Who Has Your Back Program what they are doing to bolster encryption in light of the NSA’s unlawful surveillance of your communications. We’re pleased to see that four companies—Dropbox, Google, SpiderOak and Sonic.net—are implementing five out of five of our best practices for encryption. In addition, we appreciate ...

Next-gen HTTP 2.0 protocol will require HTTPS encryption

Thursday, November 14th, 2013

Sending data in plain text just doesn't cut it in an age of abundant hack attacks and mass metadata collection. Some of the biggest names on the Web--Facebook, Google, Twitter, etc.--have already embraced default encryption to safeguard your precious data, and the next-gen version of the crucial HTTP protocol will only work ...

Linux Back Door Uses Covert Communication Protocol

Wednesday, November 13th, 2013

In May of this year, sophisticated attackers breached a large Internet hosting provider and gained access to internal administrative systems. The attackers appear to have been after customer record information such as usernames, emails, and passwords. While these internal administrative systems had access to customer records, discovery of the attack ...

Security researchers create undetectable hardware trojans

Tuesday, September 17th, 2013

A team of security researchers from the U.S. and Europe has released a paper showing how integrated circuits used in computers, military equipment and other critical systems can be maliciously compromised during the manufacturing process through virtually undetectable changes at the transistor level. As proof of the effectiveness of the approach, ...