article thumbnail

ViperSoftX uses more sophisticated encryption and anti-analysis techniques

Security Affairs

Trend Micro researchers observed a new ViperSoftX malware campaign that unlike previous attacks relies on DLL sideloading for its arrival and execution technique. ” reads the analysis published by Trend Micro. ” reads the analysis published by Trend Micro. ViperSoftX is back, doesn't look like much has changed.

article thumbnail

Encryption trends and predictions over 50 years

Thales Cloud Protection & Licensing

Modern encryption can trace its root back to before WWII when Alan Turing built a modern computer in order to break the Enigma. Encryption went from being a technology predominantly used in highly classified, mission critical applications to a foundational component used in almost all aspects of our lives. So now what?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Key Findings from the 2017 Thales Encryption Trends Study: Australia

Thales Cloud Protection & Licensing

The 2017 Thales Encryption Trends Study Australia found the IT department’s influence over encryption strategy has more than halved in the past five years from 59 per cent to 28 per cent. Lagging behind global trends. It’s effectively pushed data security responsibility out of the IT department and into the boardroom.

article thumbnail

Key Findings from the 2017 Thales Encryption Trends Study: Australia

Thales Cloud Protection & Licensing

The 2017 Thales Encryption Trends Study Australia found the IT department’s influence over encryption strategy has more than halved in the past five years from 59 per cent to 28 per cent. Lagging behind global trends. It’s effectively pushed data security responsibility out of the IT department and into the boardroom.

article thumbnail

Ransomware Gangs Don’t Need PR Help

Krebs on Security

We’ve seen an ugly trend recently of tech news stories and cybersecurity firms trumpeting claims of ransomware attacks on companies large and small, apparently based on little more than the say-so of the ransomware gangs themselves. Such coverage is potentially quite harmful and plays deftly into the hands of organized crime.

article thumbnail

When Encryption Meets Flash Arrays

Thales Cloud Protection & Licensing

To combat threats and keep data safe, IT teams must employ robust encryption, key management, and access controls. To secure storage, many organizations have been leveraging native encryption offerings from their storage vendors. On the other hand, many enterprise applications now offer native encryption capabilities.

article thumbnail

Multi-cloud use, regulatory compliance and information protection drive new era of encryption and key management in France

Thales Cloud Protection & Licensing

Now in its 13 th year, our Global Encryption Trends Study that is performed by the Ponemon Institute reveals interesting findings that span a dozen different geographies. Below I have highlighted other key trends revealed in the 2018 France Encryption Trends Study. The State of Encryption in France.