Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

7/28/2010
10:28 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

SPYRUS Announces Mac and Linux Support For High Assurance Encrypting Flash Drives

Secured By SPYRUS technology implements the cryptographic base approved by the United States DoD to protect both unclassified information and most classified information

San Jose, California July 27, 2010 SPYRUS today announced that the same high assurance USB flash drive security designed into their Microsoft' Windows compatible devices is now available to Mac and Linux users.

As a member of the Hydra Privacy Card family, this new OEM-only USB flash drive implements advanced hardware security techniques to provide the most secure use-anywhere USB flash drive available today. Every sector of the devices memory is protected with the advanced, hardware-based XTS-AES 256-bit encryption recommended by IEEE 1669 and referenced by the NIST SP800-38E standard for full disk encryption.

This new SPYRUS sector-based media encryption device uses the same Rosetta Micro FIPS 140-2 Level 3 validated hardware security module built into the entire SPYRUS Hydra Privacy Card family. The device implements XTS-AES 256, AES CBC, ECDH P-384, ECDSA P-384, and SHA-384, which together make up the National Security Agencys Suite B cryptography.

The devices packaging is designed to meet FIPS 140-2 Level 3 specifications for tamper-resistant epoxy potting with built-in anti-tamper and self-destruct mechanisms, thus protecting the device against unauthorized access to the device and data.

Unlike competing use-anywhere encrypting USB flash drives, SPYRUS does not offer to store a copy of your password nor backup the data on your drive to a system on the Internet, where your confidential information could be at risk to hackers.

The device also can be used with the SPYRUS Secure Pocket Drive, the first secure, native, and licensed Microsoft Windows Embedded Standard OS on an encrypting USB flash drive. When used in this manner, it can provide two-person control of information transfer between disparate systems. With the addition of a SPYRUS Hydra Privacy Card Digital Attach encrypting storage device, three-person control can be implemented to allow the secure exchange of information between multiple Microsoft Windows systems.

SPYRUS will be demonstrating their high assurance devices in booth 1944 at LandWarNet in Tampa Florida from August 35, 2010.

For more information about SPYRUS encrypting USB flash drives, please visit http://www.spyrus.com/products/hydrapc_expanded.asp. For information about licensing opportunities for this high assurance encrypting USB flash drive, please contact SPYRUS at [email protected]

About SPYRUS, Inc.

SPYRUS holds patents in the U.S. and abroad that enable solutions for secure authentication, secure communication, and full disk encryption, as well as patents relating to data protection and rights management for digital content. Secured by SPYRUS security technology is designed, developed, and manufactured in the USA to meet FIPS 140-2 Level 3 standards. SPYRUS is headquartered in San Jose, California. See www.spyrus.com for more information.

Hydra Privacy Card devices and Secure Pocket Drive are protected by U.S. Patents 7,757,100, 7,380,140, 6,088,802, 6,981,149, with other patents pending. SPYRUS, the SPYRUS logo, Secured by SPYRUS, Hydra Privacy Card, Hydra PC, Digital Attach, Secure Pocket Drive, and Security to the Edge are either registered trademarks or trademarks of SPYRUS, Inc., in the U.S. and/or other jurisdictions. All other company, organization, and product names are trademarks of their respective organizations.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27218
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
CVE-2020-29367
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
CVE-2020-26245
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
CVE-2017-15682
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
CVE-2017-15683
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.