CipherShed and VeraCrypt developers stand ready to step in for TrueCrypt now that the cryptanalysis phase of the audit is complete and no backdoors were discovered. Both open source projects sprung ...
Two privilege escalation vulnerabilities in the last TrueCrypt build were discovered by James Forshaw of Google Project Zero, and patched in VeraCrypt. TrueCrypt may be a fond memory for most of its ...
The methods are the same as those of TrueCrypt: you can create individual file containers and mount them as drives, allowing you to keep your files encrypted. A container is actually a place that when ...
A new security audit has found critical vulnerabilities in VeraCrypt, an open-source, full-disk encryption program that’s the direct successor to the widely popular, but now defunct, TrueCrypt. Users ...
An audit of VeraCrypt has uncovered critical vulnerabilities which could be exploited by attackers to compromise user data. VeraCrypt is open-source security software. The successor to TrueCrypt, the ...
Windows users who rely on TrueCrypt to encrypt their hard drives have a serious security problem: a researcher has discovered two critical flaws in the program. TrueCrypt may have been abandoned by ...
If you're still using TrueCrypt to protect your Windows disks, even though its developers abandoned it and said it was "not secure" last year, you may want to stop that. Google Project Zero researcher ...
The second, larger audit of TrueCrypt 7.1a has concluded, with no sign of the software-breaking flaw that its creators warned was there. What's this mean for the future of the code and the program's ...
Serious security flaws have been discovered in TrueCrypt, placing users who insist on using the legacy encryption system at risk. The system encryption service, axed last year after Microsoft ...
Google's Project Zero team discovered two serious flaws in the driver the TrueCrypt full disk encryption program installs on Windows systems Windows users who rely on TrueCrypt to encrypt their hard ...