Post Profile

Security Audit Finds Critical Vulnerabilities In VeraCrypt, TrueCrypt’s Main Successor

An audit for VeraCrypt, the main successor to TrueCrypt, uncovered multiple critical-, medium-, and low-severity issues. All have been fixed in VeraCrypt 1.19.
read more


Related Posts

TrueCrypt alternative VeraCrypt 1.12 ships with interesting PIM feature

Technology :

VeraCrypt is one of the few programs that came into existence after development of True Crypt was abandoned. Even though True Crypt's security audit did not uncover any backdoors in the program -- see results of the first and second...

VeraCrypt 1.18 fixes one TrueCrypt vulnerability

Technology :

VeraCrypt 1.18 was released yesterday by the development team for all supported operating systems. The new version of the encryption program fixes one vulnerability affecting the application and TrueCrypt, the encryption software it...

VeraCrypt 1.19 fixes security vulnerabilities

Technology :

VeraCrypt 1.19 is the newest version of the popular open source data encryption program that many users switched to after TrueCrypt was discontinued back in 2014. The application is based on TrueCrypt code but has since then been up...

VeraCrypt 1.15 fixes two recently reported TrueCrypt vulnerabilities

Technology :

Yesterday's update of the encryption software VeraCyrpt fixed two vulnerabilities that security researcher James Forshaw discovered in TrueCrypt's source code. TrueCrypt, which has been abandoned by its developers, is still widely u...

VeraCrypt 1.0f-2 update fixes TrueCrypt audit vulnerability

Technology :

VeraCrypt is a TrueCrypt fork that came to life after the original TrueCrypt project was abandoned by its developers. It is not the only fork of TrueCrypt -- Ciphershed is another -- but one that receives regular updates. The most r...


Copyright © 2016 Regator, LLC