Items tagged with Encryption

WhatsApp bills itself as a free and secure messaging application with end-to-end encryption and cross platform support, all of which have made it a popular option. However, it may not be as secure as advertised. Vulnerabilities that were disclosed last year have still not been addressed, and if abused, could allow an... Read more...
Several technology firms have written an open letter to the GCHQ (Government Communications Headquarters), a UK intelligence and security organization, in response to the agency's proposed eavesdropping measure. If implemented, law enforcement would be able to spy on encrypted messages, such as those that are sent... Read more...
Firefox Send, a file transfer service that Mozilla first introduced in beta form back in 2017, is now fully available for the public to try out. Mozilla has repositioned Firefox as an alternative browser with a heavy focus and security and privacy, and Firefox Send is an extension of this philosophy. With Firefox... Read more...
Is your data secure? Researchers recently discovered a new variation of the Bleichenbacher oracle attack that could threaten TLS 1.3 encryption. Seven researchers discovered that OpenSSL, Amazon s2n, MbedTLS, Apple CoreTLS, Mozilla NSS, WolfSSL, and GnuTLS utilized TLS protocols vulnerable to attacks. Google's new... Read more...
Encryption certainly isn't the sexiest of topics for most people; we want our data to be secure from nefarious sorts and then move on. The challenge with encryption is that depending on the algorithm and type of encryption used, it can consume lots of system resources. This isn't such a big deal on high-end... Read more...
Go home, Australian government, you're drunk. That's the general sentiment among technology firms and privacy advocates around the world, in response to a controversial encryption bill Australia's parliament passed this week. The new legislation forces companies to crack their own encryption when and if it's requested... Read more...
Researchers from Radboud University in the Netherlands have announced a flaw that affects some SSDs that feature hardware-based security; the flaw could allow an attacker to completely bypass disk encryption. Bypassing the encryption would give the hackers full access to the local data without having to know the... Read more...
One aspect of smartphones that largely gets overlooked is security. For many consumers, the technical details surrounding stronger encryption just isn't as interesting as advancements in camera technology and other prominent features. For those who do care to know more, however, Google wrote a blog post describing its... Read more...
Apple has a history of butting heads with government officials over the topic of encryption, and specifically whether the Cupertino outfit should be forced to install a backdoor into its iOS devices primarily for law enforcement to use. It's not just the US Federal Bureau of Investigation (FBI) that Apple disagrees... Read more...
A pair of macOS security experts have discovered a bug in the latest version of macOS that exposes the contents of files, including ones that are encrypted and are supposed to be safe from prying eyes. The security flaw exists within Apple's 'Quick Look' feature, which caches thumbnails and names of files, even when... Read more...
Apple has confirmed plans to bolt shut a security hole in iPhone devices that law enforcement agencies have been using to gain entrance into locked handsets after seizing them from suspected criminals. As can be imagined, those same agencies are none too pleased with Apple's decision. As far as Apple is concerned... Read more...
The FBI has quoted statistics to the public and Congress that claimed investigators had been locked out of encrypted devices like smartphones nearly 7,800 times. It is now being reported that the actual number is much smaller in the area of between 1,000 and 2,000 incidents. The report claims that over a time frame of... Read more...
Security researchers are warning anyone who uses PGP (Pretty Good Privacy) or S/MIME for email encryption to disable the scheme in their email clients right away, and to uninstall tools that automatically decrypt PGP-encrypted email, due to a security flaw. They've discovered a critical vulnerability dubbed EFAIL that... Read more...
The Federal Bureau of Investigation butted heads with Apple in 2016 and 2017 when the Cupertino company refused to build a backdoor into its iPhone handsets, which would allow law enforcement agencies to access locked devices at the expense of security for millions of iOS users. Fast forward to today and there's a... Read more...
Skype has announced something that some users have wanted for a long time: end-to-end encryption for conversations. Skype Insiders can preview the new encryption feature right now, and it's called Private Conversations. With these conversations, end-to-end encryption for audio calls, text messages, images, audio... Read more...
Here we go again. In 2016, authorities tried to legally compel Apple to unlock an iPhone model that belonged to one of the terrorists in the San Bernardino shooting that left more than a dozen people dead. Apple resisted, and the Federal Bureau of Investigation dropped its lawsuit before the legal matter had a chance... Read more...
Most people have probably never been to Cloudflare's San Francisco office, but those who have been there would have noticed a large wall of lava lamps in the lobby. It is hard to miss—after all, it is not everyday that you come across dozens of lava lamps arranged on a set of shelves, not even in Spencer's where these... Read more...
There's no secret that the FBI is not a big fan of device encryption on devices like smartphones. As we saw in the San Bernardino incident, then FBI director James Comey attempted to bully Apple into providing a backdoor to iOS and the Touch ID safe enclave in order to break into an iPhone 5s that was used by one of... Read more...
In an effort to boost security on Android devices, Google is testing a feature called DNS (Domain Name Server) over TLS (Transport Layer Security) to protect users from hackers who might be spying on a site's traffic, according to the Android Open Source Project (AOSP). This experimental feature is currently fielding... Read more...
The new iStorage diskAshur2 is a specialized, external hard drive geared toward security conscious consumers. The diskAshur2 is a little pricey, and although it's no slouch in the speed department (we'll get into that in a bit), it's certainly not going to compete with that shiny new internal SSD you've got your eye... Read more...
In an era where high profile data breaches are becoming far too common, IBM has a solution that could help. The company on Monday unveiled IBM Z, a next generation mainframe that is is billing as the world's most powerful transaction system. Just as importantly, it offers pervasive encryption so that all data is... Read more...
Here's something you don't see too often: a ransomware creator unearthing the master decryption key for public consumption. That's exactly what we're seeing from Petya's original developer, allowing those affected by certain versions of Petya to recover their data, and developers the ability to create decrypters to... Read more...
Prev 1 2 3 4 5 Next