encryption

Visit/security/32572/the-scariest-security-horror-stories-of-2018
phishing
Security

The scariest security horror stories of 2018

From data breaches to hardware vulnerabilities, these are the most embarrassing security blunders of the year
25 Dec 2018
Visit/encryption/32593/australia-passes-controversial-anti-encryption-law
Encryption
encryption

Australia passes controversial anti-encryption law

The law will compel companies to comply with law enforcement demands to hand over data
17 Dec 2018
Visit/data-breaches/32474/marriotts-starwood-hotel-system-breached-exposing-data-of-up-to-500-million
Marriott hotel sign
data breaches

Marriott's Starwood Hotel system suffers massive breach

Data from email addresses to payment card and passport numbers were potentially accessed
30 Nov 2018
Visit/security/32397/four-ways-to-secure-sensitive-data
Security

Four ways to secure sensitive data

Read our tips to ensure that your business and customer data is kept as secure as possible
19 Nov 2018
Advertisement
Visit/encryption/32302/critical-vulnerabilities-ssd-encryption
SSD
encryption

Researchers find 'critical flaws' in SSD encryption

Hardware-based encryption far less secure than presumed with attackers able to access data without passwords
6 Nov 2018
Visit/encryption/31822/five-eyes-nations-hand-tech-giants-encryption-ultimatum
encryption logo
encryption

‘Five Eyes’ nations hand tech giants encryption ultimatum

Industry given final warning as governments declare they are ready to legislate for backdoor access
3 Sep 2018
Visit/privacy/31769/facebook-pulls-onavo-app-after-violating-apples-privacy-rules
A screenshot of the Onavo Protect app listed on an app store
privacy

Facebook pulls Onavo app after violating Apple's data rules

Apple asked Facebook to "voluntarily" delist the app as it collects data on other smartphone software
23 Aug 2018
Visit/security/31762/leaky-api-exposes-black-hat-attendees-personal-data
Leaky bucket
Security

Leaky API exposes Black Hat attendees’ personal data

Embarrassing breach revealed names, email addresses, phone numbers and more
22 Aug 2018
Visit/security/31659/whatsapp-exploit-lets-hackers-manipulate-group-chat-messages
WhatsApp, Web app, Messaging
Security

WhatsApp exploit lets hackers manipulate group chat messages

Researchers say the flaw could be used to spread fake news across the platform
9 Aug 2018
Visit/security/31575/why-encryption-is-the-key-to-your-security-strategy
Encryption
Sponsored

Why encryption is the key to your security strategy

Encryption used to come with performance penalties, but the latest hardware platforms can provide all the benefits without the downsides
27 Jul 2018
Advertisement
Visit/data-breaches/31292/dixons-carphone-data-breach-company-admits-attempted-hack-exposed-details-of-59
data breaches

Dixons Carphone data breach: 6 million bank cards exposed

The firm says there had been "an attempt to compromise" 5.9 million credit and debit cards last year, with 105,000 cards being leaked
13 Jun 2018
Visit/data-breaches/31289/yahoo-handed-250000-fine-over-2014-data-breach
data breaches

Yahoo handed £250,000 fine over 2014 data breach

ICO punishes Yahoo's UK arm for failing to protect 515,000 Brits
12 Jun 2018
Advertisement
Visit/cyber-terrorism/31247/quantum-computing-could-help-fight-terrorism-says-uk-gov
cyber terrorism

Quantum computing could help fight terrorism, says UK gov

Counter-terrorism strategy embraces tech, but warns of future extremist digital capabilities
5 Jun 2018
Visit/privacy/31198/russia-demands-that-apple-removes-telegram-from-app-store
privacy

Russia demands that Apple removes Telegram from App Store

Regulator seeks to restrict users' access to encrypted messaging app as usage continues
29 May 2018
Visit/virtual-private-network-vpn/31179/how-to-turn-a-raspberry-pi-into-a-vpn-server
virtual private network (VPN)

How to turn a Raspberry Pi into a VPN server

A guide to building an encrypted connection to your home network from anywhere
29 May 2018
Visit/encryption/31110/pgp-efail-security-flaw
encryption

Pretty Good Privacy isn't broken, says inventor

Phil Zimmerman and ProtonMail criticise EFF's advice that users delete PGP to deal with EFAIL
25 May 2018
Advertisement
Visit/security/30496/chrome-continues-http-phase-out-by-removing-secure-icon-from-https-sites
Security

Chrome will no longer label HTTPS sites as 'secure'

Changes in 'secure' and 'non secure' icons comprise final steps in plan to make web secure-by-default
18 May 2018
Visit/data-protection/31117/facial-recognition-technology-is-dangerously-inaccurate
data protection

Facial recognition technology is "dangerously inaccurate"

Police stored innocent people's biometrics data after mistaking them for criminals, says privacy group
15 May 2018
Visit/security/31060/twitter-alerts-users-after-squashing-password-revealing-internal-bug
Security

Twitter alerts uses after finding password-revealing bug

The company is advising users to reset their passwords 'in the interests of caution'
4 May 2018
Visit/encryption/31022/amber-rudds-war-on-tech-is-over
encryption

Amber Rudd's war on tech is over

Hopefully Sajid Javid knows his way around more than WhatsApp
30 Apr 2018
Visit/privacy/30981/google-gets-caught-up-in-russian-internet-censorship-battle
privacy

Google gets caught up in Russian internet censorship battle

US search giant accused of helping Telegram chat service evade Russian ban
23 Apr 2018
Visit/data-breaches/30870/150m-myfitnesspal-users-hit-by-data-breach
data breaches

150m MyFitnessPal users hit by data breach

Thieves made off with usernames, email addresses and encrypted passwords
3 Apr 2018
Advertisement
Visit/cyber-security/30849/tech-firms-welcome-cyber-security-export-strategy
cyber security

Tech firms welcome Cyber Security Export Strategy

But experts caution against nation state hacking risks, and urge firms to get basics right
27 Mar 2018
Visit/internet-of-things-iot/30715/iot-security-measures-need-teeth-to-counter-the-spread-of-hackable
A collection of IoT devices
Internet of Things (IoT)

IoT security review 'needs teeth' to tackle hackable devices

Tech industry reacts to Whitehall review's IoT security recommendations
8 Mar 2018
Advertisement