#encryption

[ follow ]
Mobile UX
fromEngadget
2 days ago

X's messaging app, XChat, may be available soon

XChat is a new messaging app for X users, featuring end-to-end encryption and various privacy options, available for download on April 17.
Privacy technologies
fromComputerworld
3 days ago

Google adds end-to-end Gmail encryption to Android, iOS devices for enterprises

Google Workspace users can now send end-to-end encrypted messages natively in the Gmail app on mobile devices.
#quantum-computing
Science
fromNature
1 week ago

Daily briefing: Quantum computers could crack cybersecurity systems before 2030

Quantum computing advancements may threaten cybersecurity systems sooner than expected, potentially compromising encryption methods by the end of the decade.
fromNature
1 week ago
Science

'It's a real shock': quantum-computing breakthroughs pose imminent risks to cybersecurity

Information security
fromMail Online
2 months ago

When is Q-Day? Scientists predict date of quantum computing advance

Quantum computers capable of breaking current encryption ('Q-Day') could arrive within years to decades, requiring immediate global preparation and post-quantum protection.
Science
fromNature
1 week ago

Daily briefing: Quantum computers could crack cybersecurity systems before 2030

Quantum computing advancements may threaten cybersecurity systems sooner than expected, potentially compromising encryption methods by the end of the decade.
Science
fromNature
1 week ago

'It's a real shock': quantum-computing breakthroughs pose imminent risks to cybersecurity

Quantum hackers could pose a serious threat to digital security by the end of this decade, much sooner than previously anticipated.
Tech industry
fromFuturism
2 weeks ago

Google Warns That Quantum Armageddon Is Drawing Closer

Google has moved up its timeline to prepare for quantum computers potentially breaking encryption algorithms to 2029, highlighting significant security threats.
Privacy technologies
fromTechCrunch
5 days ago

Developer of VeraCrypt encryption software says Windows users may face boot-up issues after Microsoft locked his account | TechCrunch

Microsoft has blocked the VeraCrypt developer's account, potentially affecting users' access to their encrypted PCs.
US politics
fromTechCrunch
1 week ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
Information security
fromTelecompetitor
1 week ago

Quantum network supports high-security QKD: How it works, why it matters

Quantum technology presents both risks and benefits for network security, particularly through quantum key distribution (QKD) as a solution to encryption vulnerabilities.
#meta
fromJezebel
2 weeks ago
Social media marketing

Meta found liable in child exploitation case, ordered to pay $375 million

Meta found liable for child exploitation on its platforms, ordered to pay $375 million in damages for prioritizing profits over child safety.
fromWIRED
3 weeks ago
Privacy technologies

The Danger Behind Meta's Decision to Kill End-to-End Encrypted Instagram DMs

Meta's retreat from end-to-end encryption on Instagram chat raises concerns about user privacy and sets a troubling precedent for big tech.
Social media marketing
fromJezebel
2 weeks ago

Meta found liable in child exploitation case, ordered to pay $375 million

Meta found liable for child exploitation on its platforms, ordered to pay $375 million in damages for prioritizing profits over child safety.
Privacy technologies
fromWIRED
3 weeks ago

The Danger Behind Meta's Decision to Kill End-to-End Encrypted Instagram DMs

Meta's retreat from end-to-end encryption on Instagram chat raises concerns about user privacy and sets a troubling precedent for big tech.
Information security
fromTNW | Offers
2 weeks ago

Team password manager costs $1.50 & just added the features businesses actually need

Stolen credentials are a major security risk; using a password manager like Passpack can mitigate this threat effectively.
#cybersecurity
Privacy professionals
fromWIRED
3 weeks ago

Cyberattack on a Car Breathalyzer Firm Leaves Drivers Stuck

Law enforcement dismantled major botnets while new vulnerabilities and privacy issues in tech continue to emerge, raising concerns over security.
fromThe Hacker News
6 months ago
Information security

ThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More

Attackers increasingly combine social engineering, AI-driven manipulation, and cloud exploitation, widening attack surfaces across communication platforms, devices, and cloud services.
Privacy professionals
fromWIRED
3 weeks ago

Cyberattack on a Car Breathalyzer Firm Leaves Drivers Stuck

Law enforcement dismantled major botnets while new vulnerabilities and privacy issues in tech continue to emerge, raising concerns over security.
#vpn-security
fromZDNET
1 month ago
Privacy technologies

A guide to free VPNs: What you need to know, and what services to avoid

fromZDNET
1 month ago
Privacy technologies

10+ VPN tricks and tips I recommend to everyone (whether for personal or business use)

fromZDNET
1 month ago
Privacy technologies

A guide to free VPNs: What you need to know, and what services to avoid

fromZDNET
1 month ago
Privacy technologies

10+ VPN tricks and tips I recommend to everyone (whether for personal or business use)

Privacy technologies
fromZDNET
1 month ago

I've used Tor browser for years, but now I'm using it on my Android phone - here's why

Tor Browser provides maximum privacy and anonymity on Android by routing traffic through encrypted relays, hiding IP addresses and location from websites, ISPs, and governments.
Information security
fromSecurityWeek
2 months ago

Ransomware Groups May Pivot Back to Encryption as Data Theft Tactics Falter

Ransomware groups find pure data exfiltration less profitable; attackers are shifting back to encryption to regain leverage as victim payment rates fall.
fromComputerWeekly.com
2 months ago

The European offensive against encrypted phone evidence | Computer Weekly

Over the past four years, I have handled numerous international cases involving SkyECC, Ennetcom, EncroChat, and other PGP- or crypto-phone networks. These networks were designed to guarantee privacy through end-to-end encryption and were allegedly used by criminals for secure communication, but they quickly attracted the attention of law enforcement. What initially appeared to be an airtight weapon for prosecutors - massive hacks of encrypted messages that seemed to dismantle entire criminal networks - is becoming a legal minefield.
EU data protection
#aes-256-gcm
#bitlocker
fromZDNET
2 months ago
Information security

How to keep your PC encryption key safe - from Microsoft and the FBI

fromZDNET
2 months ago
Privacy technologies

Your BitLocker-secured Windows PC isn't so secure after all - unless you do this

fromComputerworld
2 months ago
Information security

Microsoft handed over BitLocker keys to law enforcement, raising enterprise data control concerns

fromZDNET
2 months ago
Information security

How to keep your PC encryption key safe - from Microsoft and the FBI

fromZDNET
2 months ago
Privacy technologies

Your BitLocker-secured Windows PC isn't so secure after all - unless you do this

fromComputerworld
2 months ago
Information security

Microsoft handed over BitLocker keys to law enforcement, raising enterprise data control concerns

fromArs Technica
2 months ago

Apple's AirTag 2 is easier to find thanks to new chip

Additionally, the speaker in the AirTag is now 50 percent louder, Apple says. These two things together address some user complaints that as useful as an AirTag can be in ideal circumstances, sometimes it was frustrating trying to get things just right to find something. It won't eliminate all edge cases, but it ought to help.
Apple
Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

Strong encryption, especially AES-256-GCM, provides robust, reliable protection for sensitive personal data against unauthorized access and modern cyber threats.
#lawful-interception
#vpn
fromKotaku
7 months ago
Privacy technologies

NordVPN Is Almost Free: Here's the Trick to Slash the Price by Nearly 80% - Kotaku

fromKotaku
7 months ago
Privacy technologies

NordVPN Is Almost Free: Here's the Trick to Slash the Price by Nearly 80% - Kotaku

Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

AES-256-GCM strong encryption provides robust, reliable protection for sensitive personal data as a last line of defense against modern cyber threats.
Artificial intelligence
fromTheregister
2 months ago

Nadella talks AI sovereignty at the World Economic Forum

Corporate AI sovereignty depends on firms controlling proprietary-trained models and embedding tacit knowledge into model weights, not on datacenter location.
Artificial intelligence
fromEngadget
2 months ago

Proton's Lumo AI chatbot now has an encrypted space for your projects

Lumo 1.3 adds encrypted Projects — persistent, synced workspaces with Proton Drive integration, open-source models, and paid unlimited projects via Lumo Plus ($10/month).
#surveillance
#client-side-scanning
Information security
fromInfoWorld
3 months ago

WhatsApp API worked exactly as promised, and stole everything

Malicious proxy wrapped a legitimate WhatsApp WebSocket client to capture session tokens, intercept messages, and exfiltrate encrypted data using multi-layer obfuscation.
fromNextgov.com
3 months ago

Three moves that can jumpstart cyber modernization - even wthout a full budget

Let's be honest: most agencies don't have a blank check to invest in cybersecurity modernization. But that doesn't mean they're stuck. You don't need a full rip-and-replace to make meaningful progress; you need clarity, urgency and smart prioritization. Whether you're working with a full budget or a shoestring one, there are moves you can make today that will strengthen your defenses tomorrow.
Information security
#privacy
fromTechCrunch
4 months ago
Privacy technologies

'End-to-end encrypted' smart toilet camera is not actually end-to-end encrypted | TechCrunch

fromTechCrunch
4 months ago
Privacy technologies

'End-to-end encrypted' smart toilet camera is not actually end-to-end encrypted | TechCrunch

Gadgets
fromZDNET
3 months ago

The fastest portable SSD I've used is also the smallest (and it's not even close)

The Samsung T9 portable SSD delivers ultra-fast, durable, and compact external storage with up to 2,000MB/s speeds, 256-bit encryption, and USB 3.2 Gen 2x2 support.
Gadgets
fromWIRED
3 months ago

Gear News of the Week: Android Gets Emergency Live Video, and the Pixel Watch 4 Supports Gestures

Android phones can stream encrypted live video to emergency dispatchers during calls or texts; Pixel Watch adds Double Pinch and Wrist Turn gesture controls.
fromGSMArena.com
4 months ago

Android gets the ability to share live video with emergency services

Google has announced a new feature called Android Emergency Live Video, and it's pretty much what you'd assume it would be based on the name - the ability to share live video with emergency services. And it works "in a single tap" too, because in an emergency every second counts.
Mobile UX
#digital-rights
fromWIRED
7 months ago
Privacy professionals

Cindy Cohn Is Leaving the EFF, but Not the Fight for Digital Rights

fromWIRED
7 months ago
Privacy professionals

Cindy Cohn Is Leaving the EFF, but Not the Fight for Digital Rights

#cloud-storage
Privacy professionals
fromfaun.pub
5 months ago

Tri-Secret Secure in Snowflake: Elevating Data Protection with Dual-Key Encryption

Tri-Secret Secure combines Snowflake-managed keys, customer-managed keys in cloud KMS, and user authentication to give customers revocation control over data encryption.
Information security
fromMedium
5 months ago

Tri-Secret Secure in Snowflake: Elevating Data Protection with Dual-Key Encryption

Tri-Secret Secure combines Snowflake-managed, customer-managed KMS keys, and user authentication to give customers decisive control over encryption and revocation of their data.
#chat-control
#uk-government
fromIT Pro
7 months ago
Privacy technologies

'Hugely significant': Experts welcome UK government plans to back down in Apple encryption battle - but it's not quite over yet

fromIT Pro
7 months ago
Privacy technologies

'Hugely significant': Experts welcome UK government plans to back down in Apple encryption battle - but it's not quite over yet

fromwww.mercurynews.com
6 months ago

After tech snafu, most East Bay police radio channels to go silent soon

The multi-million dollar effort to remove public access to police radio communications across the East Bay has a new start date, roughly a month after similar plans were undone by a technology snafu. Every law enforcement agency in Contra Costa County including all police departments and the county's sheriff's office will end public access to their radio chatter on Oct. 7, said David Swing, head of the East Bay Regional Communications System Authority. Nearly every such agency in Alameda County plans to follow suit on Oct. 9, he said. The only holdout appears to be the Berkeley Police Department, which vowed last month to keep their conversations public.
California
US news
fromThe Mercury News
6 months ago

After tech snafu, most East Bay police radio channels to go silent soon

Contra Costa law enforcement will end public access to police radio communications on Oct. 7; most Alameda agencies will follow on Oct. 9.
Apple
fromComputerWeekly.com
6 months ago

Home Office issues new 'back door' order over Apple encryption | Computer Weekly

UK government ordered Apple to provide warranted access to encrypted iCloud backups of British users, prompting legal challenge and raising privacy and jurisdiction concerns.
Information security
fromWIRED
6 months ago

Proton Pass Finally Has the Goods to Compete With Other Password Managers

Proton Pass matured into a competitive, privacy-focused password manager offering a generous free plan, strong encryption, passkey support, and integrated Proton services.
EU data protection
fromComputerWeekly.com
7 months ago

Chat Control: EU to decide on requirement for tech firms to scan encrypted messages | Computer Weekly

EU proposals would force tech companies to scan all encrypted messages before transmission, undermining end-to-end encryption and risking privacy and security for all citizens.
Information security
fromFox News
7 months ago

Don't use your home Wi-Fi before fixing certain security risks

Secure home Wi-Fi requires strong passwords, up-to-date encryption and current equipment to prevent interception, unauthorized access and misuse of personal data.
fromElectronic Frontier Foundation
7 months ago

What WhatsApp's "Advanced Chat Privacy" Really Does

The viral post falsely claims that if you do not enable Advanced Chat Privacy, Meta's AI tools will be able to access your private conversations. This isn't true, and it misrepresents both how Meta AI works and what Advanced Chat Privacy is. The confusion seems to spawn from the fact that Meta AI can be invoked through a number of methods, including in any group chat with the @Meta AI command .
Privacy technologies
Information security
fromThe Hacker News
7 months ago

Researchers Warn of MystRodX Backdoor Using DNS and ICMP Triggers for Stealthy Control

MystRodX is a stealthy, flexible C++ backdoor that uses layered encryption, passive wake-up triggers via DNS/ICMP, and modular capabilities for remote control and data capture.
Privacy technologies
fromwww.bbc.com
7 months ago

Court documents shed new light on UK-Apple row over user data

UK government sought legal powers under the Investigatory Powers Act to compel Apple to access globally encrypted ADP user data, potentially including non-UK users.
fromComputerworld
7 months ago

FTC warns tech giants against foreign government pressure on privacy and censorship

"I am concerned that these actions by foreign powers to impose censorship and weaken end-to-end encryption will erode Americans' freedoms and subject them to myriad harms, such as surveillance by foreign governments and an increased risk of identity theft and fraud," Ferguson wrote in the letters, the statement added.
US politics
US politics
fromTheregister
7 months ago

FTC warns US Big Tech: Don't bend to foreign censors

The U.S. Federal Trade Commission warns major tech platforms that complying with foreign censorship demands or weakening encryption may violate U.S. law and invite consequences.
#apple
fromComputerworld
7 months ago

UK agrees to drop dangerous data encryption backdoor demands, says US

End-to-end encryption is an essential security tool that protects our personal data, including our bank details, health information, private conversations and images. It'd be an entirely reckless and unprecedented move from the UK Government to open up a backdoor to this data, and one that will have global consequences.
Privacy professionals
fromComputerWeekly.com
7 months ago

US says UK has agreed to drop encryption 'back door' demands against Apple | Computer Weekly

The decision led Apple to withdraw its Advance Data Protection (ADP) service from UK customers, stating "we have never built a backdoor or master key to any of our products or services and we never will."
US politics
fromInfoQ
7 months ago

HCP Terraform Now Offers Hold Your Own Key (HYOK) Option for Artifact Encryption

HashiCorp's Hold Your Own Key (HYOK) support for HCP Terraform allows customers to fully control the encryption keys for sensitive Terraform artifacts, enhancing security.
Privacy technologies
Privacy technologies
fromAxios
7 months ago

Encryption could be coming to ChatGPT, Sam Altman says

OpenAI is taking steps towards encryption for sensitive information management but faces challenges due to its role as a data provider.
fromBitcoin Magazine
7 months ago

Online Privacy Is Under Threat In The UK And US. Policy Expert Freddie New Advises How To Protect Yourself

VPNs (Virtual Private Networks) allow you to browse the internet from a remote server, masking your IP address and anonymizing your identity in the process.
Privacy professionals
#data-security
fromZDNET
7 months ago
Privacy technologies

This SSD gadget locks prying eyes out and makes me feel like James Bond

fromZDNET
7 months ago
Privacy technologies

This SSD gadget locks prying eyes out and makes me feel like James Bond

Privacy professionals
fromTechzine Global
7 months ago

Palo Alto Networks launches quantum-secure firewalls

Palo Alto Networks introduces tools to combat quantum threats, including a Quantum Readiness Dashboard and 14 new firewall models for future-proof security.
fromSocial Media Today
8 months ago

Russia Restricts WhatsApp and Telegram Usage in the Nation

Russian President Vladimir Putin authorised the development of its own, state-backed messaging app, which will be integrated with government services, and will provide a more functional service to locals.
Privacy technologies
Tech industry
fromComputerWeekly.com
8 months ago

Arqit to join Vodafone network and ecosystem innovation centre | Computer Weekly

Arqit Quantum joins Tomorrow Street's Scaleup X to enhance cyber security for telecoms and critical infrastructure sectors.
#security
fromWIRED
8 months ago
Privacy professionals

Encryption Made for Police and Military Radios May Be Easily Cracked

fromWIRED
8 months ago
Privacy professionals

Encryption Made for Police and Military Radios May Be Easily Cracked

Television
fromwww.theguardian.com
8 months ago

Operation Dark Phone: Murder By Text this jaw-dropping tale of how police hacked gangs is like The Wire

International police hacked EncoChat, unveiling insights into organized crime as they intercepted messages that detailed drug trafficking, murder, and more.
[ Load more ]