Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Top Links You Must Click On


Cloud security experts at Hornetsecurity dispute headlines questioning email encryption standards

PITTSBURGH, May 16, 2018 /PRNewswire/ -- Hornetsecurity, a German-based cloud security solutions company that recently opened its first United States base of operations in Pittsburgh, vehemently disagrees with a recent study that calls into question the security of PGP and S/MIME encryption standards widely used by businesses for their corporate email communications.

On May 14, researchers from Münster University of Applied Sciences (Germany), Ruhr University Bochum (Germany) and Leuven University (Belgium) published a paper that questioned the safety of common encryption standards, creating a worldwide panic within the technology community.

The recent attacks, commonly referred to as eFail, are technically complex and require several steps. However, as Hornetsecurity experts point out, the vulnerabilities discovered do not impact the security protocols themselves but use already known weaknesses in recipients' email clients to make them decrypt an encrypted email and deliver it to the attacker, thereby bypassing encryption protocols.

To get access to the content of an intercepted encrypted email, one of the attacks works by building a new email consisting of a corrupted HTML part, followed by the encrypted content. The recipient's email client is then tricked by the corrupted HTML part to decrypt the encrypted message and send the decrypted message back to the attacker.

"This kind of unsubstantiated exaggeration doesn't help the cause of increasing the wider use of encryption and providing better overall security," Hornetsecurity CEO Oliver Dehning said. "Individuals and institutions that claim to want to improve IT security have done a disservice in this case by creating hysteria in numerous misleading articles and in other unsubstantiated headlines related to eFail."

Emails encrypted by Hornetsecurity are protected against attacks of this kind because Hornetsecurity does not allow the different content types (multipart/mixed) required for an attack. In addition, the Hornetsecurity Encryption Service does not require any client plug-ins. Encryption and decryption are fully automated by Hornetsecurity in the cloud – no installation, maintenance or user interaction is required. To further improve security of its clients who are not using Hornetsecurity Encryption Service, Hornetsecurity has included a new filter into its Spam Filter service that recognizes and puts into quarantine emails exploiting eFail by scanning for suspicious HTML manipulations.

About Hornetsecurity
Hornetsecurity has been focused on cloud computing since 2007, when the company was founded by Oliver Dehning and Daniel Hofmann in Hannover, Germany, where it maintains its global headquarters. Today, Hornetsecurity has grown to more than 100 employees, offering comprehensive security solutions in the fields of email security, web security and data storage to more than 30,000 business customers around the world. In 2017, Hornetsecurity opened a United States base of operations in Pittsburgh.

More information can be found at http://www.hornetsecurity.com  and www.hornetdrive.com.

Cision View original content:http://www.prnewswire.com/news-releases/cloud-security-experts-at-hornetsecurity-dispute-headlines-questioning-email-encryption-standards-300649824.html

SOURCE Hornetsecurity

About PR Newswire
Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Enterprise Open Source Magazine Latest Stories . . .
DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one lo...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, will provide an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSy...
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbrai...
Learn how to solve the problem of keeping files in sync between multiple Docker containers. In his session at 16th Cloud Expo, Aaron Brongersma, Senior Infrastructure Engineer at Modulus, discussed using rsync, GlusterFS, EBS and Bit Torrent Sync. He broke down the tools that are need...
It is ironic, but perhaps not unexpected, that many organizations who want the benefits of using an Agile approach to deliver software use a waterfall approach to adopting Agile practices: they form plans, they set milestones, and they measure progress by how many teams they have engag...
For better or worse, DevOps has gone mainstream. All doubt was removed when IBM and HP threw up their respective DevOps microsites. Where are we on the hype cycle? It's hard to say for sure but there's a feeling we're heading for the "Peak of Inflated Expectations." What does this mean...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE