encryption
Visit/encryption/34832/interpol-to-support-the-breaking-of-end-to-end-encryption

Interpol to support the breaking of end-to-end encryption
Law enforcement agency argues the technology frustrates the investigative process
18 Nov 2019
Visit/encryption/34684/bbc-puts-its-news-on-the-dark-web-with-the-tor-browser

BBC puts its news on the dark web with the Tor browser
The broadcasting corporation has made its site available on the Tor browser to evade censorship
24 Oct 2019
Visit/data-insights/34675/nordvpn-confirms-2018-data-centre-breach

NordVPN confirms 2018 data centre breach
Personal virtual private network provider admits to a breach in March 2018 but claims no data was exfiltrated
22 Oct 2019
Visit/cloud-security/34663/cloud-storage-how-secure-are-dropbox-onedrive-google-drive-and-icloud

Cloud storage: How secure are the big players?
How the big cloud vendors stack up when it comes to encrypting and protecting your data
18 Oct 2019
Visit/security/34572/uk-and-us-plead-with-mark-zuckerberg-to-bin-encryption-plans

UK and US plead with Mark Zuckerberg to bin encryption plans
Home secretary pens open letter to the Facebook chief as the nations strike historic data-access agreement
4 Oct 2019
Visit/security/innovation-at-work/24460/what-is-data-encryption

A complete guide to data encryption
We explore the world of digital cryptography, and explain why it is an increasingly fundamental aspect of modern business
30 Sep 2019
Visit/security/29671/what-is-aes-encryption

What is AES encryption?
AES is one of the most widely used encryption protocols, but where did it come from and how does it work?
30 Sep 2019
Visit/biometrics/34242/hacked-for-life-why-you-should-be-terrified-by-biometric-technology

Why you should be terrified by biometric technology
Unless our apathy towards data protection changes, we may soon lose something we can’t replace
21 Aug 2019
Visit/security/34226/knob-attack-lets-hackers-insert-themselves-into-your-bluetooth-calls

KNOB attack lets hackers listen in on your Bluetooth calls
Vulnerability allows attackers to ‘completely break’ Bluetooth encryption
16 Aug 2019
Visit/encryption/30380/what-is-pgp

What is PGP?
If you’re looking for a pretty good encryption standard, there are worse places to start
12 Jul 2019
Visit/hacking/30282/what-is-ethical-hacking-white-hat-hackers-explained

What is ethical hacking? White hat hackers explained
Not all hackers are motivated by greed - some of them use their powers for good
11 Jul 2019
Visit/network-internet/33964/mozilla-branded-a-villain-for-dns-over-https-support

Mozilla branded a ‘villain’ for DNS over HTTPS support
Privacy group ridicules ISPA nomination and claims it's "a bit like saying peanut butter is evil"
5 Jul 2019
Visit/security/33954/decade-old-flaw-in-pgp-is-finally-being-exploited

Decade-old flaw in PGP is finally being exploited
It's the Snowden-approved industry standard for secure communications, but hackers have stumbled upon hugely significant flaw
4 Jul 2019
Visit/privacy/33846/law-enforcement-tool-paves-way-for-full-data-extraction-on-iphones

UFED Premium tool paves way for full mobile data extraction
Israeli developer claims its UFED Premium tool can also crack flagship Android devices like the Samsung Galaxy S9
17 Jun 2019
Visit/encryption/33747/time-to-show-sloppy-websites-the-red-card

Time to show sloppy websites the red card
You can't get away with poor payment security in 2019, no matter how small your business
1 Jun 2019
Visit/policy-legislation/33741/tech-industry-bands-together-to-oppose-gchq-snooping

Tech industry bands together to oppose GCHQ snooping
Google, Apple, WhatsApp, Microsoft and others to sign an open letter imploring GCHQ to understand implications of its 'ghost protocol'
31 May 2019
Visit/security/33684/g-suite-passwords-stored-in-plain-text-for-14-years

G Suite passwords stored in plain text for 14 years
Google reveals a bug prevented its cryptography system encrypting enterprise users' login details since 2005
22 May 2019
Visit/encryption/33681/encrypting-a-small-business-why-remote-working-could-be-your-blindspot

Why remote working could be your encryption blindspot
Despite many businesses already using encryption, the majority of policies lack complete coverage
22 May 2019
Visit/endpoint-security/33436/three-ways-to-secure-your-printer

Three ways to secure your printer
Your office printer is a sitting target for hackers, so what can you do to secure it?
11 Apr 2019
Visit/security/33393/samsung-galaxy-s10-s-ultrasonic-sensor-fooled-by-fake-finger

Samsung Galaxy S10’s ultrasonic sensor fooled by fake finger
Samsung’s in-display fingerprint reader can be hacked ‘in 15 minutes’
5 Apr 2019
Visit/security/33377/mobile-banking-apps-are-holding-data-insecurely

Mobile banking apps are holding data insecurely
“Systemic problems” could allow an attacker to manipulate data, take over accounts and commit fraud
3 Apr 2019
Visit/encryption/33310/facebook-goes-full-naked-gun-after-its-latest-password-fiasco

Facebook stored passwords in plaintext
The social network proves once again how little respect is has for its users
25 Mar 2019
Visit/security/32572/the-scariest-security-horror-stories-of-2018

The scariest security horror stories of 2018
From data breaches to hardware vulnerabilities, these are the most embarrassing security blunders of the year
25 Dec 2018