#encryption

[ follow ]
US politics
fromTechCrunch
1 day ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
#quantum-computing
fromNature
1 day ago
Science

'It's a real shock': quantum-computing breakthroughs pose imminent risks to cybersecurity

Information security
fromNextgov.com
3 months ago

Quantum cryptography implementation timelines must be shortened, industry CEO to tell Congress

Combining AI and quantum computing threatens current encryption, creating new cyber fault lines that demand comprehensive, network-wide quantum-resistant protections.
Cryptocurrency
fromHackernoon
8 months ago

The Great Quantum Mirage: Why We're Solving Tomorrow's Problem While Missing Today's Crisis | HackerNoon

The immediate quantum threat involves systematic harvesting of encrypted data, not just the eventual breaking of encryption.
Science
fromNature
1 day ago

'It's a real shock': quantum-computing breakthroughs pose imminent risks to cybersecurity

Quantum hackers could pose a serious threat to digital security by the end of this decade, much sooner than previously anticipated.
Tech industry
fromFuturism
6 days ago

Google Warns That Quantum Armageddon Is Drawing Closer

Google has moved up its timeline to prepare for quantum computers potentially breaking encryption algorithms to 2029, highlighting significant security threats.
fromNextgov.com
3 months ago
Information security

Quantum cryptography implementation timelines must be shortened, industry CEO to tell Congress

fromHackernoon
8 months ago
Cryptocurrency

The Great Quantum Mirage: Why We're Solving Tomorrow's Problem While Missing Today's Crisis | HackerNoon

Information security
fromTelecompetitor
2 days ago

Quantum network supports high-security QKD: How it works, why it matters

Quantum technology presents both risks and benefits for network security, particularly through quantum key distribution (QKD) as a solution to encryption vulnerabilities.
#meta
fromJezebel
1 week ago
Social media marketing

Meta found liable in child exploitation case, ordered to pay $375 million

Meta found liable for child exploitation on its platforms, ordered to pay $375 million in damages for prioritizing profits over child safety.
fromWIRED
2 weeks ago
Privacy technologies

The Danger Behind Meta's Decision to Kill End-to-End Encrypted Instagram DMs

Meta's retreat from end-to-end encryption on Instagram chat raises concerns about user privacy and sets a troubling precedent for big tech.
Social media marketing
fromJezebel
1 week ago

Meta found liable in child exploitation case, ordered to pay $375 million

Meta found liable for child exploitation on its platforms, ordered to pay $375 million in damages for prioritizing profits over child safety.
Privacy technologies
fromWIRED
2 weeks ago

The Danger Behind Meta's Decision to Kill End-to-End Encrypted Instagram DMs

Meta's retreat from end-to-end encryption on Instagram chat raises concerns about user privacy and sets a troubling precedent for big tech.
Information security
fromTNW | Offers
1 week ago

Team password manager costs $1.50 & just added the features businesses actually need

Stolen credentials are a major security risk; using a password manager like Passpack can mitigate this threat effectively.
#cybersecurity
Privacy professionals
fromWIRED
1 week ago

Cyberattack on a Car Breathalyzer Firm Leaves Drivers Stuck

Law enforcement dismantled major botnets while new vulnerabilities and privacy issues in tech continue to emerge, raising concerns over security.
fromThe Hacker News
5 months ago
Information security

ThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More

Attackers increasingly combine social engineering, AI-driven manipulation, and cloud exploitation, widening attack surfaces across communication platforms, devices, and cloud services.
Privacy professionals
fromWIRED
1 week ago

Cyberattack on a Car Breathalyzer Firm Leaves Drivers Stuck

Law enforcement dismantled major botnets while new vulnerabilities and privacy issues in tech continue to emerge, raising concerns over security.
#vpn-security
fromZDNET
3 weeks ago
Privacy technologies

A guide to free VPNs: What you need to know, and what services to avoid

fromZDNET
3 weeks ago
Privacy technologies

10+ VPN tricks and tips I recommend to everyone (whether for personal or business use)

fromZDNET
3 weeks ago
Privacy technologies

A guide to free VPNs: What you need to know, and what services to avoid

fromZDNET
3 weeks ago
Privacy technologies

10+ VPN tricks and tips I recommend to everyone (whether for personal or business use)

Privacy technologies
fromZDNET
3 weeks ago

I've used Tor browser for years, but now I'm using it on my Android phone - here's why

Tor Browser provides maximum privacy and anonymity on Android by routing traffic through encrypted relays, hiding IP addresses and location from websites, ISPs, and governments.
Information security
fromSecurityWeek
1 month ago

Ransomware Groups May Pivot Back to Encryption as Data Theft Tactics Falter

Ransomware groups find pure data exfiltration less profitable; attackers are shifting back to encryption to regain leverage as victim payment rates fall.
fromComputerWeekly.com
1 month ago

The European offensive against encrypted phone evidence | Computer Weekly

Over the past four years, I have handled numerous international cases involving SkyECC, Ennetcom, EncroChat, and other PGP- or crypto-phone networks. These networks were designed to guarantee privacy through end-to-end encryption and were allegedly used by criminals for secure communication, but they quickly attracted the attention of law enforcement. What initially appeared to be an airtight weapon for prosecutors - massive hacks of encrypted messages that seemed to dismantle entire criminal networks - is becoming a legal minefield.
EU data protection
#aes-256-gcm
#bitlocker
fromZDNET
2 months ago
Information security

How to keep your PC encryption key safe - from Microsoft and the FBI

fromZDNET
2 months ago
Privacy technologies

Your BitLocker-secured Windows PC isn't so secure after all - unless you do this

fromComputerworld
2 months ago
Information security

Microsoft handed over BitLocker keys to law enforcement, raising enterprise data control concerns

fromZDNET
2 months ago
Information security

How to keep your PC encryption key safe - from Microsoft and the FBI

fromZDNET
2 months ago
Privacy technologies

Your BitLocker-secured Windows PC isn't so secure after all - unless you do this

fromComputerworld
2 months ago
Information security

Microsoft handed over BitLocker keys to law enforcement, raising enterprise data control concerns

fromArs Technica
2 months ago

Apple's AirTag 2 is easier to find thanks to new chip

Additionally, the speaker in the AirTag is now 50 percent louder, Apple says. These two things together address some user complaints that as useful as an AirTag can be in ideal circumstances, sometimes it was frustrating trying to get things just right to find something. It won't eliminate all edge cases, but it ought to help.
Apple
Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

Strong encryption, especially AES-256-GCM, provides robust, reliable protection for sensitive personal data against unauthorized access and modern cyber threats.
#lawful-interception
#vpn
fromKotaku
6 months ago
Privacy technologies

NordVPN Is Almost Free: Here's the Trick to Slash the Price by Nearly 80% - Kotaku

fromKotaku
6 months ago
Privacy technologies

NordVPN Is Almost Free: Here's the Trick to Slash the Price by Nearly 80% - Kotaku

Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

AES-256-GCM strong encryption provides robust, reliable protection for sensitive personal data as a last line of defense against modern cyber threats.
Artificial intelligence
fromTheregister
2 months ago

Nadella talks AI sovereignty at the World Economic Forum

Corporate AI sovereignty depends on firms controlling proprietary-trained models and embedding tacit knowledge into model weights, not on datacenter location.
Artificial intelligence
fromEngadget
2 months ago

Proton's Lumo AI chatbot now has an encrypted space for your projects

Lumo 1.3 adds encrypted Projects — persistent, synced workspaces with Proton Drive integration, open-source models, and paid unlimited projects via Lumo Plus ($10/month).
#surveillance
#client-side-scanning
Information security
fromInfoWorld
3 months ago

WhatsApp API worked exactly as promised, and stole everything

Malicious proxy wrapped a legitimate WhatsApp WebSocket client to capture session tokens, intercept messages, and exfiltrate encrypted data using multi-layer obfuscation.
fromNextgov.com
3 months ago

Three moves that can jumpstart cyber modernization - even wthout a full budget

Let's be honest: most agencies don't have a blank check to invest in cybersecurity modernization. But that doesn't mean they're stuck. You don't need a full rip-and-replace to make meaningful progress; you need clarity, urgency and smart prioritization. Whether you're working with a full budget or a shoestring one, there are moves you can make today that will strengthen your defenses tomorrow.
Information security
#privacy
fromTechCrunch
3 months ago
Privacy technologies

'End-to-end encrypted' smart toilet camera is not actually end-to-end encrypted | TechCrunch

fromTechCrunch
8 months ago
Privacy technologies

Proton's new privacy-first AI assistant encrypts all chats, keeps no logs | TechCrunch

fromTechCrunch
3 months ago
Privacy technologies

'End-to-end encrypted' smart toilet camera is not actually end-to-end encrypted | TechCrunch

fromTechCrunch
8 months ago
Privacy technologies

Proton's new privacy-first AI assistant encrypts all chats, keeps no logs | TechCrunch

Gadgets
fromZDNET
3 months ago

The fastest portable SSD I've used is also the smallest (and it's not even close)

The Samsung T9 portable SSD delivers ultra-fast, durable, and compact external storage with up to 2,000MB/s speeds, 256-bit encryption, and USB 3.2 Gen 2x2 support.
Gadgets
fromWIRED
3 months ago

Gear News of the Week: Android Gets Emergency Live Video, and the Pixel Watch 4 Supports Gestures

Android phones can stream encrypted live video to emergency dispatchers during calls or texts; Pixel Watch adds Double Pinch and Wrist Turn gesture controls.
fromGSMArena.com
3 months ago

Android gets the ability to share live video with emergency services

Google has announced a new feature called Android Emergency Live Video, and it's pretty much what you'd assume it would be based on the name - the ability to share live video with emergency services. And it works "in a single tap" too, because in an emergency every second counts.
Mobile UX
#digital-rights
fromWIRED
6 months ago
Privacy professionals

Cindy Cohn Is Leaving the EFF, but Not the Fight for Digital Rights

fromWIRED
6 months ago
Privacy professionals

Cindy Cohn Is Leaving the EFF, but Not the Fight for Digital Rights

#cloud-storage
Privacy professionals
fromfaun.pub
5 months ago

Tri-Secret Secure in Snowflake: Elevating Data Protection with Dual-Key Encryption

Tri-Secret Secure combines Snowflake-managed keys, customer-managed keys in cloud KMS, and user authentication to give customers revocation control over data encryption.
Information security
fromMedium
5 months ago

Tri-Secret Secure in Snowflake: Elevating Data Protection with Dual-Key Encryption

Tri-Secret Secure combines Snowflake-managed, customer-managed KMS keys, and user authentication to give customers decisive control over encryption and revocation of their data.
#chat-control
#uk-government
fromIT Pro
7 months ago
Privacy technologies

'Hugely significant': Experts welcome UK government plans to back down in Apple encryption battle - but it's not quite over yet

fromIT Pro
7 months ago
Privacy technologies

'Hugely significant': Experts welcome UK government plans to back down in Apple encryption battle - but it's not quite over yet

fromwww.mercurynews.com
6 months ago

After tech snafu, most East Bay police radio channels to go silent soon

The multi-million dollar effort to remove public access to police radio communications across the East Bay has a new start date, roughly a month after similar plans were undone by a technology snafu. Every law enforcement agency in Contra Costa County including all police departments and the county's sheriff's office will end public access to their radio chatter on Oct. 7, said David Swing, head of the East Bay Regional Communications System Authority. Nearly every such agency in Alameda County plans to follow suit on Oct. 9, he said. The only holdout appears to be the Berkeley Police Department, which vowed last month to keep their conversations public.
California
US news
fromThe Mercury News
6 months ago

After tech snafu, most East Bay police radio channels to go silent soon

Contra Costa law enforcement will end public access to police radio communications on Oct. 7; most Alameda agencies will follow on Oct. 9.
Apple
fromComputerWeekly.com
6 months ago

Home Office issues new 'back door' order over Apple encryption | Computer Weekly

UK government ordered Apple to provide warranted access to encrypted iCloud backups of British users, prompting legal challenge and raising privacy and jurisdiction concerns.
Information security
fromWIRED
6 months ago

Proton Pass Finally Has the Goods to Compete With Other Password Managers

Proton Pass matured into a competitive, privacy-focused password manager offering a generous free plan, strong encryption, passkey support, and integrated Proton services.
EU data protection
fromComputerWeekly.com
6 months ago

Chat Control: EU to decide on requirement for tech firms to scan encrypted messages | Computer Weekly

EU proposals would force tech companies to scan all encrypted messages before transmission, undermining end-to-end encryption and risking privacy and security for all citizens.
Information security
fromFox News
6 months ago

Don't use your home Wi-Fi before fixing certain security risks

Secure home Wi-Fi requires strong passwords, up-to-date encryption and current equipment to prevent interception, unauthorized access and misuse of personal data.
fromElectronic Frontier Foundation
7 months ago

What WhatsApp's "Advanced Chat Privacy" Really Does

The viral post falsely claims that if you do not enable Advanced Chat Privacy, Meta's AI tools will be able to access your private conversations. This isn't true, and it misrepresents both how Meta AI works and what Advanced Chat Privacy is. The confusion seems to spawn from the fact that Meta AI can be invoked through a number of methods, including in any group chat with the @Meta AI command .
Privacy technologies
Information security
fromThe Hacker News
7 months ago

Researchers Warn of MystRodX Backdoor Using DNS and ICMP Triggers for Stealthy Control

MystRodX is a stealthy, flexible C++ backdoor that uses layered encryption, passive wake-up triggers via DNS/ICMP, and modular capabilities for remote control and data capture.
Privacy technologies
fromwww.bbc.com
7 months ago

Court documents shed new light on UK-Apple row over user data

UK government sought legal powers under the Investigatory Powers Act to compel Apple to access globally encrypted ADP user data, potentially including non-UK users.
fromComputerworld
7 months ago

FTC warns tech giants against foreign government pressure on privacy and censorship

"I am concerned that these actions by foreign powers to impose censorship and weaken end-to-end encryption will erode Americans' freedoms and subject them to myriad harms, such as surveillance by foreign governments and an increased risk of identity theft and fraud," Ferguson wrote in the letters, the statement added.
US politics
US politics
fromTheregister
7 months ago

FTC warns US Big Tech: Don't bend to foreign censors

The U.S. Federal Trade Commission warns major tech platforms that complying with foreign censorship demands or weakening encryption may violate U.S. law and invite consequences.
#apple
fromComputerworld
7 months ago

UK agrees to drop dangerous data encryption backdoor demands, says US

End-to-end encryption is an essential security tool that protects our personal data, including our bank details, health information, private conversations and images. It'd be an entirely reckless and unprecedented move from the UK Government to open up a backdoor to this data, and one that will have global consequences.
Privacy professionals
fromComputerWeekly.com
7 months ago

US says UK has agreed to drop encryption 'back door' demands against Apple | Computer Weekly

The decision led Apple to withdraw its Advance Data Protection (ADP) service from UK customers, stating "we have never built a backdoor or master key to any of our products or services and we never will."
US politics
fromInfoQ
7 months ago

HCP Terraform Now Offers Hold Your Own Key (HYOK) Option for Artifact Encryption

HashiCorp's Hold Your Own Key (HYOK) support for HCP Terraform allows customers to fully control the encryption keys for sensitive Terraform artifacts, enhancing security.
Privacy technologies
Privacy technologies
fromAxios
7 months ago

Encryption could be coming to ChatGPT, Sam Altman says

OpenAI is taking steps towards encryption for sensitive information management but faces challenges due to its role as a data provider.
fromBitcoin Magazine
7 months ago

Online Privacy Is Under Threat In The UK And US. Policy Expert Freddie New Advises How To Protect Yourself

VPNs (Virtual Private Networks) allow you to browse the internet from a remote server, masking your IP address and anonymizing your identity in the process.
Privacy professionals
#data-security
fromZDNET
7 months ago
Privacy technologies

This SSD gadget locks prying eyes out and makes me feel like James Bond

fromHackernoon
3 years ago
Privacy technologies

Securing Data at Rest: From LUKS to NBDE - A Modern Encryption Guide | HackerNoon

fromZDNET
7 months ago
Privacy technologies

This SSD gadget locks prying eyes out and makes me feel like James Bond

fromHackernoon
3 years ago
Privacy technologies

Securing Data at Rest: From LUKS to NBDE - A Modern Encryption Guide | HackerNoon

Privacy professionals
fromTechzine Global
7 months ago

Palo Alto Networks launches quantum-secure firewalls

Palo Alto Networks introduces tools to combat quantum threats, including a Quantum Readiness Dashboard and 14 new firewall models for future-proof security.
fromSocial Media Today
7 months ago

Russia Restricts WhatsApp and Telegram Usage in the Nation

Russian President Vladimir Putin authorised the development of its own, state-backed messaging app, which will be integrated with government services, and will provide a more functional service to locals.
Privacy technologies
Tech industry
fromComputerWeekly.com
7 months ago

Arqit to join Vodafone network and ecosystem innovation centre | Computer Weekly

Arqit Quantum joins Tomorrow Street's Scaleup X to enhance cyber security for telecoms and critical infrastructure sectors.
#security
fromWIRED
7 months ago
Privacy professionals

Encryption Made for Police and Military Radios May Be Easily Cracked

fromWIRED
7 months ago
Privacy professionals

Encryption Made for Police and Military Radios May Be Easily Cracked

Television
fromwww.theguardian.com
8 months ago

Operation Dark Phone: Murder By Text this jaw-dropping tale of how police hacked gangs is like The Wire

International police hacked EncoChat, unveiling insights into organized crime as they intercepted messages that detailed drug trafficking, murder, and more.
fromComputerWeekly.com
8 months ago

WhatsApp is refused right to intervene in Apple legal action on encryption 'backdoors' | Computer Weekly

The Investigatory Powers Tribunal will hear five legal challenges regarding a secret Home Office order requiring Apple to grant access to encrypted iCloud data.
Privacy professionals
[ Load more ]