#encrypted-video

[ follow ]
#quantum-computing
Cryptocurrency
fromFuturism
5 hours ago

Bitcoin Developers Are Debating a Move That Could Send Crypto Markets Into a Tailspin

Quantum computers pose a significant cybersecurity threat, prompting proposals to freeze dormant Bitcoins to protect them.
Information security
fromnews.bitcoin.com
3 weeks ago

The Retroactive Decryption Trap: Why Post-Quantum Upgrades Can't Save Your Past Privacy

Google's whitepaper on quantum threats urges immediate post-quantum preparations, shifting the migration deadline to 2029 and highlighting vulnerabilities in blockchain security.
Cryptocurrency
fromFuturism
5 hours ago

Bitcoin Developers Are Debating a Move That Could Send Crypto Markets Into a Tailspin

Quantum computers pose a significant cybersecurity threat, prompting proposals to freeze dormant Bitcoins to protect them.
Information security
fromnews.bitcoin.com
3 weeks ago

The Retroactive Decryption Trap: Why Post-Quantum Upgrades Can't Save Your Past Privacy

Google's whitepaper on quantum threats urges immediate post-quantum preparations, shifting the migration deadline to 2029 and highlighting vulnerabilities in blockchain security.
#remote-work
Remote teams
fromNBC Los Angeles
15 hours ago

Logging on at a cafe? Privacy and security guidelines for remote workers

Remote work in public spaces offers flexibility but poses privacy and security risks that require precautions.
Remote teams
fromNBC New York
15 hours ago

Logging on at a cafe? Privacy and security guidelines for remote workers

Remote work offers flexibility but comes with privacy and security risks that require precautions.
Remote teams
fromFast Company
4 days ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromFast Company
4 days ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromFast Company
4 days ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require careful management.
Information security
fromThe Hacker News
8 hours ago

Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More

New malware fast16 predates Stuxnet, targeting high-precision software to subtly alter calculations, potentially causing significant failures.
#signal
Privacy technologies
fromThe Local Germany
1 day ago

As phishing attacks hit Germany - how secure is Signal messenging app?

Signal, a secure messaging app, faces phishing attacks linked to Russian groups, raising concerns about its security despite its end-to-end encryption.
Apple
fromArs Technica
4 days ago

Apple stops weirdly storing data that let cops spy on Signal chats

Signal's patch deletes preserved notifications and prevents future preservation for deleted apps, but user concerns about privacy remain.
Privacy technologies
fromThe Local Germany
1 day ago

As phishing attacks hit Germany - how secure is Signal messenging app?

Signal, a secure messaging app, faces phishing attacks linked to Russian groups, raising concerns about its security despite its end-to-end encryption.
Apple
fromArs Technica
4 days ago

Apple stops weirdly storing data that let cops spy on Signal chats

Signal's patch deletes preserved notifications and prevents future preservation for deleted apps, but user concerns about privacy remain.
#cybersecurity
Careers
fromEntrepreneur
2 days ago

How to Know Where Your Security Threat Is Before It's Too Late

Organizations winning the security talent war operationalize key questions to prevent knowledge loss and enhance cybersecurity resilience.
fromwww.bbc.com
3 days ago
Privacy technologies

UK cyber chiefs say it's time to ditch passwords for passkeys - what are they?

People in the UK are encouraged to use passkeys instead of passwords for better online security.
fromTheregister
6 days ago
Privacy professionals

Crook claims to leak 'video surveillance footage' of firms

Be Prime confirmed a cybersecurity incident involving alleged access to its surveillance footage and client data by a criminal hacker.
Careers
fromEntrepreneur
2 days ago

How to Know Where Your Security Threat Is Before It's Too Late

Organizations winning the security talent war operationalize key questions to prevent knowledge loss and enhance cybersecurity resilience.
Privacy technologies
fromMail Online
3 days ago

How to create secure passwords - it might be time to switch to passkey

Using unique passwords and transitioning to passkeys enhances online security and reduces the risk of cyber threats.
Privacy professionals
fromTheregister
6 days ago

Crook claims to leak 'video surveillance footage' of firms

Be Prime confirmed a cybersecurity incident involving alleged access to its surveillance footage and client data by a criminal hacker.
DevOps
fromTechRepublic
2 years ago

What is Cloud Security? Fundamental Guide

Cloud security requires specialized processes and technologies to protect assets and data from evolving threats in a dynamic environment.
Deliverability
fromWordtothewise
4 days ago

DKIM2: What it means for the future of email

DKIM2 is a new email authentication protocol in development, improving security and reliability over DKIM and addressing issues from previous methods.
Digital life
fromThe New Yorker
5 days ago

The Anguish of Data Loss

Data preservation is crucial, yet digital devices are fragile and often treated carelessly, leading to significant loss when data is not backed up.
Privacy professionals
fromDigiday
5 days ago

Future of TV Briefing: The ambitious and alarming proposal fix to TV and streaming's identity crisis

Identity Infrastructure 2.0 aims to improve identity mechanisms in TV and streaming but raises significant privacy concerns for viewers.
Remote teams
fromNBC4 Washington
15 hours ago

Logging on at a cafe? Privacy and security guidelines for remote workers

Digital nomads face privacy and security risks while working in public spaces, necessitating precautions and adherence to employer guidelines.
#ransomware
Law
fromTheregister
6 days ago

Third ransomware pro pleads guilty to cybercrime U-turn

Angelo Martino pleaded guilty to aiding the ALPHV/BlackCat ransomware gang in extorting US businesses.
Law
fromTheregister
6 days ago

Third ransomware pro pleads guilty to cybercrime U-turn

Angelo Martino pleaded guilty to aiding the ALPHV/BlackCat ransomware gang in extorting US businesses.
Information security
fromArs Technica
4 days ago

Now, even ransomware is using post-quantum cryptography

Kyber's use of PQC key-exchange algorithms serves more as a marketing tactic than a practical security measure against imminent quantum threats.
#vpn
Cryptocurrency
fromThe Village Voice
4 days ago

Which VPN makes sense for crypto traders in 2026? - The Village Voice

Crypto traders must choose VPNs based on technical fundamentals like protocol choices, logging policies, and security features to protect their activities.
Privacy professionals
fromWIRED
1 month ago

Using a VPN May Subject You to NSA Spying

Using commercial VPNs may expose Americans to foreign surveillance laws, risking their constitutional protections against warrantless government spying.
Cryptocurrency
fromThe Village Voice
4 days ago

Which VPN makes sense for crypto traders in 2026? - The Village Voice

Crypto traders must choose VPNs based on technical fundamentals like protocol choices, logging policies, and security features to protect their activities.
Privacy professionals
fromWIRED
1 month ago

Using a VPN May Subject You to NSA Spying

Using commercial VPNs may expose Americans to foreign surveillance laws, risking their constitutional protections against warrantless government spying.
#privacy
Privacy professionals
fromSecuritymagazine
6 days ago

The Privacy-Security Partnership: How We Bend Risk in a Resource Crunch

Fewer privacy practitioners feel confident in meeting laws, while resource shortages and compliance challenges increase stress in the field.
Privacy technologies
fromComputerWeekly.com
1 week ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
Privacy professionals
fromSecuritymagazine
6 days ago

The Privacy-Security Partnership: How We Bend Risk in a Resource Crunch

Fewer privacy practitioners feel confident in meeting laws, while resource shortages and compliance challenges increase stress in the field.
Privacy technologies
fromComputerWeekly.com
1 week ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
fromNature
2 weeks ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
#meta
fromWIRED
1 month ago
Privacy technologies

The Danger Behind Meta's Decision to Kill End-to-End Encrypted Instagram DMs

Privacy technologies
fromWIRED
1 month ago

The Danger Behind Meta's Decision to Kill End-to-End Encrypted Instagram DMs

Meta's retreat from end-to-end encryption on Instagram chat raises concerns about user privacy and sets a troubling precedent for big tech.
Cryptocurrency
fromnews.bitcoin.com
6 days ago

XRP Prepares for Quantum Future as Ripple Maps XRPL Strategy for Security Readiness

Ripple is implementing a multi-phase plan to secure the XRP Ledger against quantum threats by 2028.
Information security
fromIT Brew
4 days ago

Asking around: When does ransomware threat intelligence become noise?

Effective threat intelligence requires filtering information relevant to specific market segments to avoid overwhelming alerts.
Cryptocurrency
fromBitcoin Magazine
1 week ago

When Quantum Computers Come For Your Bitcoin: What Classical Property Law Says Happens Next

Bitcoin's future is challenged by quantum computing, raising questions about ownership and legality of coins accessed through quantum-derived keys.
Privacy professionals
fromWIRED
6 days ago

They Built a Legendary Privacy Tool. Now They're Sworn Enemies

GrapheneOS is highly regarded for mobile security, but its creator, Daniel Micay, has a controversial and enigmatic reputation within the cybersecurity community.
#ai
Information security
fromHarvard Gazette
5 days ago

Got personal financial, medical data you'd like to keep private? Good luck.Got personal financial, medical data you'd like to keep private? Good luck. - Harvard Gazette

New AI models may increase the risk of cybercriminals breaching secure systems, exposing personal data.
Information security
fromFast Company
5 days ago

Brace yourself for a flood of patches in all of your tech gadgets

Mythos, Anthropic's AI model, identifies software vulnerabilities, prompting urgent updates to prevent exploitation by hackers.
Information security
fromSecurityWeek
4 days ago

AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers

AI systems can autonomously hack cloud environments, demonstrating advanced capabilities in executing sophisticated attacks without specific instructions.
Information security
fromHarvard Gazette
5 days ago

Got personal financial, medical data you'd like to keep private? Good luck.Got personal financial, medical data you'd like to keep private? Good luck. - Harvard Gazette

New AI models may increase the risk of cybercriminals breaching secure systems, exposing personal data.
Information security
fromFast Company
5 days ago

Brace yourself for a flood of patches in all of your tech gadgets

Mythos, Anthropic's AI model, identifies software vulnerabilities, prompting urgent updates to prevent exploitation by hackers.
Information security
fromFast Company
4 days ago

1Password sees AI as both threat and tool

AI presents both risks and opportunities for password management, requiring firms to balance security with the potential for careless app development.
Venture
from24/7 Wall St.
1 month ago

Broadcom Just Shipped the World's First Quantum-Safe Network Encryption - 3 Reasons AVGO Investors Should Pay Attention

Broadcom shipped the first quantum-safe network encryption solution embedded at the silicon level, positioning itself as a first-mover in a compliance-driven enterprise infrastructure upgrade cycle.
Privacy technologies
fromEngadget
3 weeks ago

Proton adds a secure video conferencing service called Meet to its toolbox

Proton launches Meet, a privacy-focused video-calling service, competing with Microsoft and Google while ensuring user anonymity and security.
fromTheregister
2 months ago

Matrix messaging gaining ground in government IT

FOSDEM 2026 Amid growing interest in digital sovereignty and getting data out of the corporate cloud and into organizations' ownership, the Matrix open communication protocol is thriving. The project was co-founded by Matthew Hodgson and Amandine le Pape, and The Reg FOSS desk met both at this year's FOSDEM for a chat about what's happening with Matrix. The Register has covered Matrix and its commercial Element side quite a few times over the years,
Software development
Gadgets
fromEngadget
2 months ago

How much do VPNs cost?

Compare VPNs using the same subscription duration and tier to avoid misleading advertised monthly rates and identify fair value.
Law
fromAbove the Law
1 month ago

Hate To Say I Told You So Again: Your Chats Ain't Private - Above the Law

Communications with GenAI platforms lack attorney-client privilege protection because they occur between a client and a machine, not a lawyer, and are not confidential under platform terms of service.
Privacy technologies
fromNextgov.com
1 month ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Privacy technologies
fromWIRED
1 month ago

Signal's Creator Is Helping Encrypt Meta AI

Moxie Marlinspike's privacy platform Confer will integrate its encryption technology into Meta's AI systems to protect user data in AI conversations.
Privacy technologies
fromZDNET
1 month ago

You're being tracked online - 9 easy ways to stop the surveillance

Reducing online tracking is possible through careful browser choice, VPNs, and anti-tracking software.
Privacy technologies
fromSecuritymagazine
1 month ago

Fear of Surveillance Leads to Increased VPN Use

36% of U.S. adults use VPNs, primarily to prevent tracking by private companies (65%) and government surveillance (35%), with privacy and security cited as the dominant motivation by 65% of users.
#end-to-end-encryption
Privacy technologies
fromwww.theguardian.com
1 month ago

Instagram to remove end-to-end encryption for private messages in May

Instagram will disable end-to-end encryption on direct messages from May 2026, allowing Meta to access all message contents due to low user adoption of the feature.
Privacy technologies
fromTechCrunch
1 month ago

TikTok won't add end-to-end encryption to direct messages, report says | TechCrunch

TikTok deliberately rejects end-to-end encryption for direct messages, citing safety concerns and the need for law enforcement access to protect users from harm.
Privacy technologies
fromwww.theguardian.com
1 month ago

Instagram to remove end-to-end encryption for private messages in May

Instagram will disable end-to-end encryption on direct messages from May 2026, allowing Meta to access all message contents due to low user adoption of the feature.
Privacy technologies
fromTechCrunch
1 month ago

TikTok won't add end-to-end encryption to direct messages, report says | TechCrunch

TikTok deliberately rejects end-to-end encryption for direct messages, citing safety concerns and the need for law enforcement access to protect users from harm.
#whatsapp
fromTechCrunch
2 months ago
Privacy technologies

WhatsApp is rolling out a new stricter security setting to protect users from cyber attacts | TechCrunch

fromTechCrunch
2 months ago
Privacy technologies

WhatsApp is rolling out a new stricter security setting to protect users from cyber attacts | TechCrunch

Privacy technologies
fromTechRepublic
1 month ago

Instagram Users Urged to Save Encrypted DMs Before Feature Disappears

Meta will discontinue end-to-end encrypted messaging for Instagram DMs on May 8, 2026, citing low adoption rates and directing users to download conversations beforehand.
fromCoindesk
2 months ago

Privacy

This Privacy Notice applies to all personal information processed by CoinDesk, including its affiliates and subsidiaries (" CoinDesk," " we," " us," or " our "). It covers the information CoinDesk collects through the websites, mobile applications, electronic devices, all other products and services we provide, any other services that display this Privacy Notice, all of the associated content, functionalities, and advertising, and when you communicate with us by phone, email, or otherwise (collectively, the " Services ").
Privacy professionals
Privacy technologies
fromMakeUseOf
1 month ago

Your smart TV is snitching on your watch history - here's how to stop it completely

Smart TVs track viewing habits through Automated Content Recognition to provide personalized recommendations, but users can disable this feature in settings to protect privacy.
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

Firewalls can fail, passwords can be stolen, but strong encryption remains your last line of defense. InToday's digital world, protect sensitive personal details is more critical and important than ever. The AES algorithm (Advanced Encryption Standard) algorithm is one of the most trusted and widely used way or method for securing data against unauthorized access and frauded. Advanced Encryption Standard supports different levels like 128-bit, 192-bit, and 256-bit encryption, providing strong security for personal data and more.
Information security
Privacy technologies
fromTech Times
1 month ago

Top Strategies to Protect Your Online Privacy from AI Tracking and Data Collection

Implement VPNs, two-factor authentication, app permission audits, and tracker blockers to protect personal data from AI-driven monitoring and unauthorized collection.
Information security
fromZDNET
2 months ago

7 apps I use to lock down, encrypt, and store my private files - and most are free

Use dedicated file-and-folder security apps across devices, stay vigilant about sharing and access, and keep operating systems and apps up to date.
Privacy technologies
fromEngadget
1 month ago

Meta is killing end-to-end encryption in Instagram DMs

Meta is discontinuing end-to-end encryption in Instagram DMs by May 8, 2026, citing low user adoption of the optional feature.
Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

Strong encryption, especially AES-256-GCM, provides robust, reliable protection for sensitive personal data against unauthorized access and modern cyber threats.
fromFast Company
2 months ago

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

Meanwhile, the actual threat landscape evolved in an entirely different direction. Today's attackers aren't sitting at keyboards manually typing password guesses. They're running offline brute force attacks with dedicated GPU rigs that can attempt 100 billion passwords per second against hashing algorithms like MD5 or SHA-1. At that speed, your clever substitution of "@" for "a" buys you microseconds of additional security.
Information security
Privacy technologies
fromFast Company
2 months ago

This new privacy-focused phone service is designed to keep your phone from getting hacked

Cape is a US-wide privacy-focused cellphone carrier that prevents SIM swapping and IMSI-catcher surveillance while minimizing customer data collection and encrypting voicemails.
Privacy technologies
fromWIRED
1 month ago

The Piracy Problem Streaming Platforms Can't Solve

Piracy in MENA stems from structural barriers including lack of local platforms, payment access limitations, internet censorship, and historical perceptions of free online content rather than cultural preferences.
Privacy technologies
fromZDNET
2 months ago

How to disable ACR on your TV (and all the privacy risks it negates in the process)

Smart TVs use ACR to continuously track and transmit viewing data for targeted advertising, risking user privacy.
Privacy technologies
fromZDNET
2 months ago

Your BitLocker-secured Windows PC isn't so secure after all - unless you do this

If BitLocker recovery keys are backed up to a Microsoft cloud account, Microsoft may disclose them to law enforcement under a valid legal order.
[ Load more ]