Vista, Word and Google Desktop circumvent TrueCrypt function

Thursday, July 17th, 2008

Cryptography expert Bruce Schneier, in conjunction with a research group, has studied the security of TrueCrypt, to see whether it meets the specifications for a 'Deniable File System' (DFS) – implemented in TrueCrypt as hidden volumes – and is really able to conceal the existence of a volume within a ...

Data can leak from partially encrypted disks

Wednesday, July 16th, 2008

If you're using encryption software to keep part of your computer's hard drive private, you may have a problem, according to researchers at the University of Washington and BT Group PLC. They've discovered that popular programs such as Microsoft Corp.'s Word and Google Desktop store data on unencrypted sections of a ...

Domino’s Pizza to encrypt emails

Wednesday, July 2nd, 2008

Domino's Pizza is to use Voltage Security's Secure-mail encryption package to protect internal and external company e-mails.The move is part of a corporate-wide data loss prevention initiative to avoid accidental loss of private or proprietary information, said Karl Anderson, network security manager for the pizza maker."We realised that e-mails being ...

DNS blacklist for weak SSL keys

Tuesday, July 1st, 2008

Working closely with the German hosting company – manitu, heise is making available with immediate effect a realtime DNS-based blacklist service for identifying weak SSL keys. The provider already runs the Realtime Blacklist for the iX spam filter NiX Spam, which enables mail servers to identify and filter spam.The principle ...

Detecting SSH tunnels

Tuesday, July 1st, 2008

Italian researchers have published a paper on the Detection of Encrypted Tunnels across Network Boundaries. I came across it in a google search because I’ve been thinking of writing a program which does something similar. It doesn’t seem like anyone else has picked up on this research yet so I ...