Data Security: Service and Tool

services, tools, resources, and stories: it's an imformation hub of data security to help keep your data secure.

Custom Search
 Search Services
Key Words

 Search Tools
Hot Words
Key Words

 Hot StoriesMore ... 


By Marcio Jose Sanchez
Apple officially moves its Chinese iCloud operations. At this moment who will believe that Apple protects encryption keys from China? Starting Wednesday, iCloud customers in China will be transferred to China, housed in a center operated by a Chinese company. In fact some people start to delete private data from iCloud since a debate between Apple and FBI 2 years ago. In general, if anyone dislikes FBI, he or she is easy to go with enemies of FBI. Apple possibly will gain more customers who trust China rather than America...
By Marcio Jose Sanchez  View Source  
Related stories:   APPLE   CLOUD   CHINA   
Apple and FBI Agree to End Encryption Battle
Two years after the FBI failed to let Apple hack into a phone used by one of the San Bernardino murders. Apple has been highlighted for protecting customers' privacy, even if the customer killed dozen of Americans and FBI needs more clues to safe innocent man and woman. Is this dispute really an issue about customers' privacy? Since 2018 Feb, Apple moves all iCloud data of Chinese customers to China. It refused FBI to hunt terrorists but leave a backdoor for Chinese Government. It's not to keep privacy but trade privacy...
By Elizabeth Weise  View Source  
Inside North Korea Hacker Army
South Korea is hosting winter Olympic Game, but the key player is North and its leader. Few people can understand why things go in such a way: North Korea get everything without paying a coin. Too many secrets hidden in the country, hacker army is one of them. A recent report uncovered that Pyongyang has sent hundreds of hackers to other countries to make money by any means necessary. South Korea is an ideal place of the mission. At Seoul's Gangnam district, Jong Hyok looks like...
By Sam Kim  View Source  
Maximize Encryption Effectiveness and 4 Common Pitfalls
Every coin has two sides, so does encryption. To minimize adverse effects you had better have some knowledge about encryption technology and products. There are tradeoffs in network performance and complexity that might arise when organizations aren't approaching encryption thoughtfully. Here are four pitfalls to avoid as you begin encrypting content: Proprietary Algorithms, Full Disk Encryption, Regulatory Compliance, and Decryption Key Storage...
By Joe Cosmano  View Source  
Hackers Abuse Google Ad To Spread Malware That Mines Cryptocurrency
Everyone is possible to become a victim of malware, even IT giants like Google. Trend Micro have spotted Google's ad network was abused to spread malware by hackers to mine cryptocurrency like Bitcoin. The network reaches about a quarter billion unique viewers in the U.S. alone, but cyber criminals just infected 5 countries up to now: France, Italy, Japan, Spain and Taiwan. The malware's goal is to mine cryptocurrency on your computers. It steals power of your computer power instead of privacy in it...
By Lee Mathews  View Source