encryption

Visit/security/encryption/355820/k2view-innovates-in-data-management-with-new-encryption-patent
encryption logo
encryption

K2View innovates in data management with new encryption patent

Organizations can encrypt data associated with a specific person, place or thing
28 May 2020
Visit/security/encryption/355608/microsoft-will-let-end-users-revoke-encrypted-emails-in-office-365
encryption

Microsoft will let end-users revoke encrypted emails in Office 365

Office 365 Message Encryption will be expanded in the fourth quarter of 2020
12 May 2020
Visit/security/encryption/355387/bitcoin-cash-developer-looks-to-sidestep-earn-it-act-with-uncrackable
encryption

Bitcoin Cash developer looks to sidestep EARN IT Act with uncrackable messaging system

Messaging system offers unbreakable encryption using Bitcoin Cash
21 Apr 2020
Visit/security/encryption/355294/messaging-app-signal-may-pull-out-of-us-if-encryption-bill-passes
encryption

Messaging app Signal may pull out of U.S. if encryption bill passes

Signal calls on users to oppose EARN IT Act, fearing it will be used to undermine end-to-end encryption
9 Apr 2020
Advertisement
Visit/security/cyber-security/355232/do-you-have-visibility-of-all-your-machine-identities
cyber security

Do you have visibility of all your machine identities?

SSH manipulation has become mainstream, presenting a real threat to businesses. Here's how to protect yourself
6 Apr 2020
Visit/software/video-conferencing/355180/zoom-does-not-use-end-to-end-encrypted
video conferencing

Zoom admits meetings don't use end-to-end encryption

Conferencing app used by UK government isn't as secure as first thought
1 Apr 2020
Visit/business-strategy/public-sector/354836/encryption-under-threat-from-earn-it-act
public sector

Encryption under threat from EARN IT Act

The proposed legislation could be formally introduced in the coming weeks
22 Feb 2020
Visit/cloud-security/34663/cloud-storage-how-secure-are-dropbox-onedrive-google-drive-and-icloud
cloud security

Cloud storage: How secure are the big players?

How the big cloud vendors stack up when it comes to encrypting and protecting your data
14 Feb 2020
Advertisement
Visit/security/encryption/354541/trump-piles-pressure-on-apple-to-unlock-pensacola-shooters-iphone
Trump
encryption

Trump piles pressure on Apple to unlock Pensacola shooter's iPhone

US President suggests action should be taken as part of a quid pro quo
15 Jan 2020
Visit/encryption/30380/what-is-pgp
encryption

What is PGP?

If you’re looking for a pretty good encryption standard, there are worse places to start
13 Dec 2019
Advertisement
Visit/encryption/34832/interpol-to-support-the-breaking-of-end-to-end-encryption
encryption

Interpol to support the breaking of end-to-end encryption

Law enforcement agency argues the technology frustrates the investigative process
18 Nov 2019
Visit/encryption/34684/bbc-puts-its-news-on-the-dark-web-with-the-tor-browser
Tor on smartphone
encryption

BBC puts its news on the dark web with the Tor browser

The broadcasting corporation has made its site available on the Tor browser to evade censorship
24 Oct 2019
Visit/data-insights/34675/nordvpn-confirms-2018-data-centre-breach
Data & insights

NordVPN confirms 2018 data centre breach

Personal virtual private network provider admits to a breach in March 2018 but claims no data was exfiltrated
22 Oct 2019
Visit/security/34572/uk-and-us-plead-with-mark-zuckerberg-to-bin-encryption-plans
Encryption
Security

UK and US plead with Mark Zuckerberg to bin encryption plans

Home secretary pens open letter to the Facebook chief as the nations strike historic data-access agreement
4 Oct 2019
Advertisement
Visit/security/innovation-at-work/24460/what-is-data-encryption
Data encryption
Security

A complete guide to data encryption

We explore the world of digital cryptography, and explain why it is an increasingly fundamental aspect of modern business
30 Sep 2019
Visit/security/29671/what-is-aes-encryption
encryption

What is AES encryption?

AES is one of the most widely used encryption protocols, but where did it come from and how does it work?
30 Sep 2019
Visit/biometrics/34242/hacked-for-life-why-you-should-be-terrified-by-biometric-technology
biometric data theft finger print
biometrics

Why you should be terrified by biometric technology

Unless our apathy towards data protection changes, we may soon lose something we can’t replace
21 Aug 2019
Visit/security/34226/knob-attack-lets-hackers-insert-themselves-into-your-bluetooth-calls
Security

KNOB attack lets hackers listen in on your Bluetooth calls

Vulnerability allows attackers to ‘completely break’ Bluetooth encryption
16 Aug 2019
Visit/hacking/30282/what-is-ethical-hacking-white-hat-hackers-explained
hacking

What is ethical hacking? White hat hackers explained

Not all hackers are motivated by greed - some of them use their powers for good
11 Jul 2019
Visit/network-internet/33964/mozilla-branded-a-villain-for-dns-over-https-support
Firefox offices
Network & Internet

Mozilla branded a ‘villain’ for DNS over HTTPS support

Privacy group ridicules ISPA nomination and claims it's "a bit like saying peanut butter is evil"
5 Jul 2019
Advertisement
Visit/security/33954/decade-old-flaw-in-pgp-is-finally-being-exploited
Encryption
Security

Decade-old flaw in PGP is finally being exploited

It's the Snowden-approved industry standard for secure communications, but hackers have stumbled upon hugely significant flaw
4 Jul 2019
Visit/privacy/33846/law-enforcement-tool-paves-way-for-full-data-extraction-on-iphones
privacy

UFED Premium tool paves way for full mobile data extraction

Israeli developer claims its UFED Premium tool can also crack flagship Android devices like the Samsung Galaxy S9
17 Jun 2019
Visit/encryption/33747/time-to-show-sloppy-websites-the-red-card
encryption

Time to show sloppy websites the red card

You can't get away with poor payment security in 2019, no matter how small your business
1 Jun 2019