encryption

Visit/security/29671/what-is-aes-encryption
encryption

What is AES encryption?

AES is one of the most widely used encryption protocols, but where did it come from and how does it work?
30 Sep 2019
Visit/biometrics/34242/hacked-for-life-why-you-should-be-terrified-by-biometric-technology
biometric data theft finger print
biometrics

Why you should be terrified by biometric technology

Unless our apathy towards data protection changes, we may soon lose something we can’t replace
21 Aug 2019
Visit/security/34226/knob-attack-lets-hackers-insert-themselves-into-your-bluetooth-calls
Security

KNOB attack lets hackers listen in on your Bluetooth calls

Vulnerability allows attackers to ‘completely break’ Bluetooth encryption
16 Aug 2019
Visit/hacking/30282/what-is-ethical-hacking-white-hat-hackers-explained
hacking

What is ethical hacking? White hat hackers explained

Not all hackers are motivated by greed - some of them use their powers for good
11 Jul 2019
Advertisement
Visit/network-internet/33964/mozilla-branded-a-villain-for-dns-over-https-support
Firefox offices
Network & Internet

Mozilla branded a ‘villain’ for DNS over HTTPS support

Privacy group ridicules ISPA nomination and claims it's "a bit like saying peanut butter is evil"
5 Jul 2019
Visit/security/33954/decade-old-flaw-in-pgp-is-finally-being-exploited
Encryption
Security

Decade-old flaw in PGP is finally being exploited

It's the Snowden-approved industry standard for secure communications, but hackers have stumbled upon hugely significant flaw
4 Jul 2019
Visit/privacy/33846/law-enforcement-tool-paves-way-for-full-data-extraction-on-iphones
privacy

UFED Premium tool paves way for full mobile data extraction

Israeli developer claims its UFED Premium tool can also crack flagship Android devices like the Samsung Galaxy S9
17 Jun 2019
Visit/encryption/33747/time-to-show-sloppy-websites-the-red-card
encryption

Time to show sloppy websites the red card

You can't get away with poor payment security in 2019, no matter how small your business
1 Jun 2019
Visit/policy-legislation/33741/tech-industry-bands-together-to-oppose-gchq-snooping
Internet snooping
Policy & legislation

Tech industry bands together to oppose GCHQ snooping

Google, Apple, WhatsApp, Microsoft and others to sign an open letter imploring GCHQ to understand implications of its 'ghost protocol'
31 May 2019
Visit/security/33684/g-suite-passwords-stored-in-plain-text-for-14-years
G Suite on laptop under a magnifying glass
Security

G Suite passwords stored in plain text for 14 years

Google reveals a bug prevented its cryptography system encrypting enterprise users' login details since 2005
22 May 2019
Advertisement
Visit/encryption/33681/encrypting-a-small-business-why-remote-working-could-be-your-blindspot
encryption

Why remote working could be your encryption blindspot

Despite many businesses already using encryption, the majority of policies lack complete coverage
22 May 2019
Visit/endpoint-security/33436/three-ways-to-secure-your-printer
Man selecting options on a printer using authentication for printer security
endpoint security

Three ways to secure your printer

Your office printer is a sitting target for hackers, so what can you do to secure it?
11 Apr 2019
Advertisement
Visit/security/33393/samsung-galaxy-s10-s-ultrasonic-sensor-fooled-by-fake-finger
Security

Samsung Galaxy S10’s ultrasonic sensor fooled by fake finger

Samsung’s in-display fingerprint reader can be hacked ‘in 15 minutes’
5 Apr 2019
Visit/security/33377/mobile-banking-apps-are-holding-data-insecurely
mobile banking
Security

Mobile banking apps are holding data insecurely

“Systemic problems” could allow an attacker to manipulate data, take over accounts and commit fraud
3 Apr 2019
Visit/encryption/33310/facebook-goes-full-naked-gun-after-its-latest-password-fiasco
encryption

Facebook stored passwords in plaintext

The social network proves once again how little respect is has for its users
25 Mar 2019
Visit/security/32572/the-scariest-security-horror-stories-of-2018
phishing
Security

The scariest security horror stories of 2018

From data breaches to hardware vulnerabilities, these are the most embarrassing security blunders of the year
25 Dec 2018
Advertisement
Visit/encryption/32593/australia-passes-controversial-anti-encryption-law
Encryption
encryption

Australia passes controversial anti-encryption law

The law will compel companies to comply with law enforcement demands to hand over data
17 Dec 2018
Visit/data-breaches/32474/marriotts-starwood-hotel-system-breached-exposing-data-of-up-to-500-million
Marriott hotel sign
data breaches

Marriott's Starwood Hotel system suffers massive breach

Data from email addresses to payment card and passport numbers were potentially accessed
30 Nov 2018
Visit/security/32397/four-ways-to-secure-sensitive-data
Security

Four ways to secure sensitive data

Read our tips to ensure that your business and customer data is kept as secure as possible
19 Nov 2018
Visit/encryption/32302/critical-vulnerabilities-ssd-encryption
SSD
encryption

Researchers find 'critical flaws' in SSD encryption

Hardware-based encryption far less secure than presumed with attackers able to access data without passwords
6 Nov 2018
Visit/encryption/31822/five-eyes-nations-hand-tech-giants-encryption-ultimatum
encryption logo
encryption

‘Five Eyes’ nations hand tech giants encryption ultimatum

Industry given final warning as governments declare they are ready to legislate for backdoor access
3 Sep 2018
Visit/privacy/31769/facebook-pulls-onavo-app-after-violating-apples-privacy-rules
A screenshot of the Onavo Protect app listed on an app store
privacy

Facebook pulls Onavo app after violating Apple's data rules

Apple asked Facebook to "voluntarily" delist the app as it collects data on other smartphone software
23 Aug 2018
Advertisement
Visit/security/31762/leaky-api-exposes-black-hat-attendees-personal-data
Leaky bucket
Security

Leaky API exposes Black Hat attendees’ personal data

Embarrassing breach revealed names, email addresses, phone numbers and more
22 Aug 2018
Visit/security/31659/whatsapp-exploit-lets-hackers-manipulate-group-chat-messages
WhatsApp, Web app, Messaging
Security

WhatsApp exploit lets hackers manipulate group chat messages

Researchers say the flaw could be used to spread fake news across the platform
9 Aug 2018
Advertisement