News

Small size. Uses a strong AES256-CBC encryption algorithm. Encrypted files are compatible with Windows, Linux, and macOS Includes a password generator. To make the best use of this software, first ...
Victims of the widespread TeslaCrypt ransomware are in luck: Security researchers have created a tool that can decrypt files affected by recent versions of the malicious program. Surprisingly, the ...
Sending important files over the web is a task that is practiced on a daily basis around the world. With the rise in cyber attacks, computer users should always consider encrypting their files before ...
I'm looking to encrypt a file with OpenSSL functions (blowfish, des, rc4-- haven't picked one yet). Anyhow, after decrypting a file, I need to know if the file was correctly decrypted. The only way it ...
A new kind of ransomware comes with its own "referrals" program, one that you probably wouldn't want to join. The malware dubbed "Popcorn Time" locks your Windows computer's files with strong AES-256 ...
Full disk encryption is the most commonly used encryption strategy in practice today for data at rest, but does that mean it’s sufficient to prevent unauthorized access to your data? The short answer: ...
Computer security experts and researchers from the firms Fox-IT and FireEye have collaborated to reverse engineer the CryptoLocker software in a project they called "Operation Tovar." CryptoLocker ...
A new piece of ransomware called CoinVault offers to decrypt a single file for free in hopes of encouraging victims to pay the ransom. UPDATE: A prior version of this story incorrectly defined VSS as ...
I’ve been involved with multiple projects with file encryption lately, and even though I’ve been assisting with data encryption projects for years, I’m still learning something new every day. They say ...