K2View innovates in data management with new encryption patent
Organizations can encrypt data associated with a specific person, place or thing
Microsoft will let end-users revoke encrypted emails in Office 365
Office 365 Message Encryption will be expanded in the fourth quarter of 2020
Bitcoin Cash developer looks to sidestep EARN IT Act with uncrackable messaging system
Messaging system offers unbreakable encryption using Bitcoin Cash
Messaging app Signal may pull out of U.S. if encryption bill passes
Signal calls on users to oppose EARN IT Act, fearing it will be used to undermine end-to-end encryption
Do you have visibility of all your machine identities?
SSH manipulation has become mainstream, presenting a real threat to businesses. Here's how to protect yourself
Zoom admits meetings don't use end-to-end encryption
Conferencing app used by UK government isn't as secure as first thought
Encryption under threat from EARN IT Act
The proposed legislation could be formally introduced in the coming weeks
Cloud storage: How secure are the big players?
How the big cloud vendors stack up when it comes to encrypting and protecting your data
Trump piles pressure on Apple to unlock Pensacola shooter's iPhone
US President suggests action should be taken as part of a quid pro quo
What is PGP?
If you’re looking for a pretty good encryption standard, there are worse places to start
Interpol to support the breaking of end-to-end encryption
Law enforcement agency argues the technology frustrates the investigative process
BBC puts its news on the dark web with the Tor browser
The broadcasting corporation has made its site available on the Tor browser to evade censorship
NordVPN confirms 2018 data centre breach
Personal virtual private network provider admits to a breach in March 2018 but claims no data was exfiltrated
UK and US plead with Mark Zuckerberg to bin encryption plans
Home secretary pens open letter to the Facebook chief as the nations strike historic data-access agreement
A complete guide to data encryption
We explore the world of digital cryptography, and explain why it is an increasingly fundamental aspect of modern business
What is AES encryption?
AES is one of the most widely used encryption protocols, but where did it come from and how does it work?
Why you should be terrified by biometric technology
Unless our apathy towards data protection changes, we may soon lose something we can’t replace
KNOB attack lets hackers listen in on your Bluetooth calls
Vulnerability allows attackers to ‘completely break’ Bluetooth encryption
What is ethical hacking? White hat hackers explained
Not all hackers are motivated by greed - some of them use their powers for good
Mozilla branded a ‘villain’ for DNS over HTTPS support
Privacy group ridicules ISPA nomination and claims it's "a bit like saying peanut butter is evil"
Decade-old flaw in PGP is finally being exploited
It's the Snowden-approved industry standard for secure communications, but hackers have stumbled upon hugely significant flaw
UFED Premium tool paves way for full mobile data extraction
Israeli developer claims its UFED Premium tool can also crack flagship Android devices like the Samsung Galaxy S9
Time to show sloppy websites the red card
You can't get away with poor payment security in 2019, no matter how small your business