Why disk encryption may not be enough

The researcher's software exploits the way in which critical encryption information is stored within a computer's RAM

Trusting the contents of your computer’s hard-drive to disk encryption tools may not be enough to keep prying eyes out should you become the victim of theft.

A team of researchers from Princetown University in the US has managed to engineer a piece of software that is able to extract the data encryption key from a computer’s RAM, even while the computer is asleep or when the user has logged-out. The team has even demonstrated how the attack can be used on the encrypted hard-drive of a recently shut-down computer.