CipherShed and VeraCrypt developers stand ready to step in for TrueCrypt now that the cryptanalysis phase of the audit is complete and no backdoors were discovered. Both open source projects sprung ...
The methods are the same as those of TrueCrypt: you can create individual file containers and mount them as drives, allowing you to keep your files encrypted. A container is actually a place that when ...
Two privilege escalation vulnerabilities in the last TrueCrypt build were discovered by James Forshaw of Google Project Zero, and patched in VeraCrypt. TrueCrypt may be a fond memory for most of its ...
An audit of VeraCrypt has uncovered critical vulnerabilities which could be exploited by attackers to compromise user data. VeraCrypt is open-source security software. The successor to TrueCrypt, the ...
A new security audit has found critical vulnerabilities in VeraCrypt, an open-source, full-disk encryption program that’s the direct successor to the widely popular, but now defunct, TrueCrypt. Users ...
Windows users who rely on TrueCrypt to encrypt their hard drives have a serious security problem: a researcher has discovered two critical flaws in the program. TrueCrypt may have been abandoned by ...
Shortly after that the story took an unexpected turn. The developers of Truecrypt suddenly ended its development and put a warning on their web page: "Using TrueCrypt is not secure as it may contain ...
If you're still using TrueCrypt to protect your Windows disks, even though its developers abandoned it and said it was "not secure" last year, you may want to stop that. Google Project Zero researcher ...
The second, larger audit of TrueCrypt 7.1a has concluded, with no sign of the software-breaking flaw that its creators warned was there. What's this mean for the future of the code and the program's ...
Serious security flaws have been discovered in TrueCrypt, placing users who insist on using the legacy encryption system at risk. The system encryption service, axed last year after Microsoft ...