Five Best File Encryption Tools

Keeping your personal data safe doesnt have to be difficult, as long as you keep sensitive information encrypted and under your control. Thats why this week were looking at the five best file encryption tools you can use to encrypt your data locally.

Title photo by andrey_l (Shutterstock)

For the purposes of this roundup, were focusing on desktop file encryption tools the ones you use on your own computer to encrypt your own private data. Were not examining cloud services that promise to encrypt your data, or business services that say they offer encryption. The goal here is to find the best tools you can use to lock down your sensitive files whether theyre photos, financial documents, personal backups, or anything else and keep them locked down so only you have the key. For those unfamiliar with the topic, we have a great guide on how encryption works, and how you can use it to keep your own data safe.

With that out of the way, here are your top five, in no particular order:

VeraCrypt is a fork of and a successor to TrueCrypt, which ceased development last year (more on it later.) The development team claims they have addressed some of the issues that were raised during TrueCrypts initial security audit, while largely maintaining its familiar interface. Like the original, its free, with versions available for Windows, Mac and Linux.

VeraCrypt supports AES (the most commonly used choice), TwoFish and Serpent encryption ciphers, and allows the creation of hidden, encrypted volumes within other volumes. Its code is available to review, although its not strictly open source (because so much of its codebase came from TrueCrypt.) The tool is also under constant development, with regular security updates and an independent audit in the planning stages (according to the developers.)

AxCrypt is a free, open source, GNU GPL-licensed encryption tool for Windows that prides itself on being simple, efficient and easy to use. It integrates nicely with the Windows shell, so you can right-click a file to encrypt it, or configure timed, executable encryptions, so the file is locked down for a specific period of time and will self-decrypt later, or when its intended recipient gets it. Files with AxCrypt can be decrypted on demand or kept decrypted while theyre in use, and then automatically re-encrypted when theyre modified or closed.

Its fast, too, and allows you to select an entire folder or just a large group of files and encrypt them all with a single click. Its entirely a file encryption tool however, meaning creating encrypted volumes or drives is beyond its capabilities. It supports 128-bit AES encryption only, offers protection against brute force cracking attempts, and is exceptionally lightweight (less than 1MB.) It also has a lot of command line options, so you can fire up the command prompt in Windows and perform more complex action sequences.

BitLocker is a full-disk encryption tool built into Windows Vista and Windows 7 (Ultimate and Enterprise), and into Windows 8 (Pro and Enterprise), as well as Windows Server (2008 and later). It supports AES (128 and 256-bit) encryption, and while its primarily used for whole-disk encryption, it also enables encrypting other volumes or a virtual drive that can be opened and accessed like any other drive on your computer.

It supports multiple authentication mechanisms, including traditional password and PINs, a USB key, and the more controversial Trusted Platform Module (TPM) technology, which uses hardware to integrate keys into devices. BitLockers integration with Windows makes it accessible to many people, and a viable disk encryption tool for individuals looking to protect their data. One concern? Since the code is locked into Windows, you cant review it, and its sometimes asserted that government agencies have backdoor access to decrypt data (though Microsoft denies this).

Go here to read the rest:
Five Best File Encryption Tools

Encryption might have not stopped Anthem hack

As news of Anthems massive hack from last week settled in, health IT and security experts further weighed in on the charged discussions surrounding healthcare cyber security and whether Anthem was adequately prepared for the attack.

It was quickly noted in security circles that the insurer had failed to encrypt its data on some 80 million customers and employees who had their names, Social Security numbers, addresses and other information stolen.

On the surface, that might be cause to criticize Anthem, but several prominent voices came to its defense. Fred Trotter, a noted health IT journalist, had this take today:

Anthem was right, and the Internet is wrong. Or at least, Anthem should be presumed innocent on the issue. More importantly, by creating buzz around this issue, reporters are missing the real story: that multinational hacking forces are targeting large healthcare institutions.

Anthem itself put out several statements from experts who weighed in with similar thoughts.

I have no doubt that Anthem has a fairly sophisticated security organization. This basically proves that it doesnt matter how big you are or how much money you spend, and how diligent you are at protecting your data, you can still have an incident, Mac McMillan, a healthcare security expert and founder of CynergisTek, told Modern Healthcare. Everybody could have a breach.

Trotter goes on to say encryption is not always helpful, and the initial focus by reporters on that element misses a larger point.

They presume that encrypted records are always more secure than encrypted records, which is simplistic and untrue.Encryption is a mechanism that ensures that data is useless without a key, much in the same way that your car is made useless without a car key. Given this analogy, what has apparently happened to Anthem is the security equivalent to a car-jacking.

Other experts pointed out that the use of Social Security numbers is an antiquated and insecure in a digital age. Whether the healthcare and insurance industries act on that notion, and perhaps develop a new type of ID mechanism for health records, remains to be seen, but its certainly an intriguing idea.

But, as Trotter note, theres the matter of accessibility under HIPAA, and Robert Neivert, COO of consumer privacy company Private Me, similarly noted that convenience and security have yet to reach an ideal balance when it comes to healthcare data.

View original post here:
Encryption might have not stopped Anthem hack

Infrastructure that Matters – IBM Systems Sean Flanagan 1Q’2015 – Video


Infrastructure that Matters - IBM Systems Sean Flanagan 1Q #39;2015
If you #39;re using open source software solutions, you probably running on some form of Linux. IBM Power Systems provide an outstanding infrastructure for open source solutions. IBM #39;s Flash...

By: IBMSystemsEurope

Read the original here:
Infrastructure that Matters - IBM Systems Sean Flanagan 1Q'2015 - Video

Proofs in Cryptography: Lecture 2 Probabilistic and Game based Security Definitions – Video


Proofs in Cryptography: Lecture 2 Probabilistic and Game based Security Definitions
Proofs in Cryptography Lecture 2 Probabilistic and Game based Security Definitions ALPTEKN KP Assistant Professor of Computer Science and Engineering Ko...

By: Kolt KU

Read more:
Proofs in Cryptography: Lecture 2 Probabilistic and Game based Security Definitions - Video

Wikileaks’ Julian Assange considering suing Nick Clegg for defamation

Julian Assange is considering legal action against Nick Clegg over comments he made on a radio programme yesterday.

The Wikileaks founder is taking legal advice on whether he should sue the Deputy Prime Minsiter for defamation, after he said he had been "charged" with a crime.

Mr Assange has been holed up in the Ecuadorian embassy since 2012 to avoid extradition to Sweden over accusations of sexual assault, but he has yet to be charged over the matter.

Mr Clegg made the comments during his phone-in discussion programme, Call Clegg, on LBC Radio on Thursday morning.

In a statement released on the Wikileaks website, Mr Assange said: "I have instructed my legal team to examine whether the Deputy Prime Minister, Nick Clegg should be sued for defamation.

"Nick Clegg falsely stated to the media yesterday, in comments that were widely reported, that I had been "charged" with an offence. I have not been charged or indicted, in this country or in Sweden as the Supreme Court of the United Kingdom clearly states."

The Metropolitan Police has spent 10m policing the embassy in case Assange leaves the building, according to figures obtained by LBC under the Freedom of Information act.

In August, he said he was planning to leave the embassy "soon" - but he remains within the building where he has been for 950 days.

During the phone-in, Mr Clegg said Assange should "go to Sweden" to face justice.

Swedish authorities want to speak to Mr Assange over allegations he sexually assaulted two women in Stockholm in 2010.

Here is the original post:
Wikileaks' Julian Assange considering suing Nick Clegg for defamation

InnocentCryptoKitty 037 Epic Chris Ellis getting DRUNK with CATNIP Bitcoin CryptoCurrency Funny – Video


InnocentCryptoKitty 037 Epic Chris Ellis getting DRUNK with CATNIP Bitcoin CryptoCurrency Funny
http://www.twitter.com/VanosEnigmA http://www.facebook.com/VanosEnigma http://www.twitter.com/CryptoEEV Thank you mucho meow for your donation: Bitcoin Address: 1FJ9ZZcnKqhiiYWNh...

By: VanosEnigmA Enigmaisland

The rest is here:
InnocentCryptoKitty 037 Epic Chris Ellis getting DRUNK with CATNIP Bitcoin CryptoCurrency Funny - Video