encryption

Visit/encryption/34832/interpol-to-support-the-breaking-of-end-to-end-encryption
encryption

Interpol to support the breaking of end-to-end encryption

Law enforcement agency argues the technology frustrates the investigative process
18 Nov 2019
Visit/encryption/34684/bbc-puts-its-news-on-the-dark-web-with-the-tor-browser
Tor on smartphone
encryption

BBC puts its news on the dark web with the Tor browser

The broadcasting corporation has made its site available on the Tor browser to evade censorship
24 Oct 2019
Visit/data-insights/34675/nordvpn-confirms-2018-data-centre-breach
Data & insights

NordVPN confirms 2018 data centre breach

Personal virtual private network provider admits to a breach in March 2018 but claims no data was exfiltrated
22 Oct 2019
Visit/cloud-security/34663/cloud-storage-how-secure-are-dropbox-onedrive-google-drive-and-icloud
cloud security

Cloud storage: How secure are the big players?

How the big cloud vendors stack up when it comes to encrypting and protecting your data
18 Oct 2019
Advertisement
Visit/security/34572/uk-and-us-plead-with-mark-zuckerberg-to-bin-encryption-plans
Encryption
Security

UK and US plead with Mark Zuckerberg to bin encryption plans

Home secretary pens open letter to the Facebook chief as the nations strike historic data-access agreement
4 Oct 2019
Visit/security/innovation-at-work/24460/what-is-data-encryption
Data encryption
Security

A complete guide to data encryption

We explore the world of digital cryptography, and explain why it is an increasingly fundamental aspect of modern business
30 Sep 2019
Visit/security/29671/what-is-aes-encryption
encryption

What is AES encryption?

AES is one of the most widely used encryption protocols, but where did it come from and how does it work?
30 Sep 2019
Visit/biometrics/34242/hacked-for-life-why-you-should-be-terrified-by-biometric-technology
biometric data theft finger print
biometrics

Why you should be terrified by biometric technology

Unless our apathy towards data protection changes, we may soon lose something we can’t replace
21 Aug 2019
Visit/security/34226/knob-attack-lets-hackers-insert-themselves-into-your-bluetooth-calls
Security

KNOB attack lets hackers listen in on your Bluetooth calls

Vulnerability allows attackers to ‘completely break’ Bluetooth encryption
16 Aug 2019
Advertisement
Visit/encryption/30380/what-is-pgp
encryption

What is PGP?

If you’re looking for a pretty good encryption standard, there are worse places to start
12 Jul 2019
Visit/hacking/30282/what-is-ethical-hacking-white-hat-hackers-explained
hacking

What is ethical hacking? White hat hackers explained

Not all hackers are motivated by greed - some of them use their powers for good
11 Jul 2019
Advertisement
Visit/network-internet/33964/mozilla-branded-a-villain-for-dns-over-https-support
Firefox offices
Network & Internet

Mozilla branded a ‘villain’ for DNS over HTTPS support

Privacy group ridicules ISPA nomination and claims it's "a bit like saying peanut butter is evil"
5 Jul 2019
Visit/security/33954/decade-old-flaw-in-pgp-is-finally-being-exploited
Encryption
Security

Decade-old flaw in PGP is finally being exploited

It's the Snowden-approved industry standard for secure communications, but hackers have stumbled upon hugely significant flaw
4 Jul 2019
Visit/privacy/33846/law-enforcement-tool-paves-way-for-full-data-extraction-on-iphones
privacy

UFED Premium tool paves way for full mobile data extraction

Israeli developer claims its UFED Premium tool can also crack flagship Android devices like the Samsung Galaxy S9
17 Jun 2019
Visit/encryption/33747/time-to-show-sloppy-websites-the-red-card
encryption

Time to show sloppy websites the red card

You can't get away with poor payment security in 2019, no matter how small your business
1 Jun 2019
Advertisement
Visit/policy-legislation/33741/tech-industry-bands-together-to-oppose-gchq-snooping
Internet snooping
Policy & legislation

Tech industry bands together to oppose GCHQ snooping

Google, Apple, WhatsApp, Microsoft and others to sign an open letter imploring GCHQ to understand implications of its 'ghost protocol'
31 May 2019
Visit/security/33684/g-suite-passwords-stored-in-plain-text-for-14-years
G Suite on laptop under a magnifying glass
Security

G Suite passwords stored in plain text for 14 years

Google reveals a bug prevented its cryptography system encrypting enterprise users' login details since 2005
22 May 2019
Visit/encryption/33681/encrypting-a-small-business-why-remote-working-could-be-your-blindspot
encryption

Why remote working could be your encryption blindspot

Despite many businesses already using encryption, the majority of policies lack complete coverage
22 May 2019
Visit/endpoint-security/33436/three-ways-to-secure-your-printer
Man selecting options on a printer using authentication for printer security
endpoint security

Three ways to secure your printer

Your office printer is a sitting target for hackers, so what can you do to secure it?
11 Apr 2019
Visit/security/33393/samsung-galaxy-s10-s-ultrasonic-sensor-fooled-by-fake-finger
Security

Samsung Galaxy S10’s ultrasonic sensor fooled by fake finger

Samsung’s in-display fingerprint reader can be hacked ‘in 15 minutes’
5 Apr 2019
Visit/security/33377/mobile-banking-apps-are-holding-data-insecurely
mobile banking
Security

Mobile banking apps are holding data insecurely

“Systemic problems” could allow an attacker to manipulate data, take over accounts and commit fraud
3 Apr 2019
Advertisement
Visit/encryption/33310/facebook-goes-full-naked-gun-after-its-latest-password-fiasco
encryption

Facebook stored passwords in plaintext

The social network proves once again how little respect is has for its users
25 Mar 2019
Visit/security/32572/the-scariest-security-horror-stories-of-2018
phishing
Security

The scariest security horror stories of 2018

From data breaches to hardware vulnerabilities, these are the most embarrassing security blunders of the year
25 Dec 2018