Data Security: Hot Stories

Search Result for encrypt in All Fields - Find 14 Stories

 Search Stories
Hot Words
Key Words
In Field



 Search Result for encrypt in All Fields - Find 14 Stories
Apple and FBI Agree to End Encryption Battle
Two years after the FBI failed to let Apple hack into a phone used by one of the San Bernardino murders. Apple has been highlighted for protecting customers' privacy, even if the customer killed dozen of Americans and FBI needs more clues to safe innocent man and woman. Is this dispute really an issue about customers' privacy? Since 2018 Feb, Apple moves all iCloud data of Chinese customers to China. It refused FBI to hunt terrorists but leave a backdoor for Chinese Government. It's not to keep privacy but trade privacy...
By Elizabeth Weise  View Source  
Maximize Encryption Effectiveness and 4 Common Pitfalls
Every coin has two sides, so does encryption. To minimize adverse effects you had better have some knowledge about encryption technology and products. There are tradeoffs in network performance and complexity that might arise when organizations aren't approaching encryption thoughtfully. Here are four pitfalls to avoid as you begin encrypting content: Proprietary Algorithms, Full Disk Encryption, Regulatory Compliance, and Decryption Key Storage...
By Joe Cosmano  View Source  
The Most Secure VPNs of 2018: Top Picks for the best encryption
Honestly, I usually suggest to be cautious before installing some information security products. But VPN seems an exception, especially if you have to travel abroad and visit countries like China or North Korea. VPN security and encryption is a rather tricky business different other security issues: the fundamental purpose of a VPN is to increase your online security and privacy by sending your data through an encrypted tunnel. If you cannot trust your network, VPN is the only solution...
By Desire Athow  View Source  
Texas Gunman Locked iPhone Renews Encryption Debate
When you heard FBI failed to unlock the cellphone of the Texas gunman, what do you think? Yahoo once leaked almost everyone's data to hackers, but Apple is fighting to protect privacy of murders like this shooter. Are they really so different? This sad story is reigniting the debate over encryption and government access to secured communications. It's just a blooding commerce chance for some companies and far away the nature: we must punish criminals either online or by gun...
By SAMANTHA RAPHELSON  View Source  
China Government Use its Own Encryption in Windows 10
MS announced a news that hardly impacts global OS market but may change some people's fates in future. It will allow China's government to use own encryption in Window 10. This is a horrible start. Right now there is no detail to disclose, for example, how China replaces the original encryption with own version and if the rule will apply to all computers sold in China. The deal may solve some security concerns of China government, but is raising privacy threat on other side. Where to buy computer possibly will become a new question...
By Brad Sams  View Source  
Encryption Apps Help White House Staffers Leak
Since Donald Trump’s inauguration, a steady stream of leaks happened around the White House. Some are innocuous, and some devastating. The question is how the stories do to media secretly. In response, Trump has launched an investigation, tweeted: "Why are there so many illegal leaks coming out of Washington?" A tiny technology flaw hole will cause fatal info leak...
By LILY HAY NEWMAN  View Source  
Sex Videos Are Safe Under Rumuki
Sex tapes are a high risk object of privacy. As long as produced, they are never totally secure. We heard lots of bad or sad stories. Zealand startup Rumuki aims the market: keep sex videos security for young lovers. The device is a prenup for sex videos with encryption, and only unlocks and shows with mutual consent. In first week of its launching, more than 1,000 devices are register...
By M. J. Coren  View Source  
Yahoo admits employees discovered hack
Today Yahoo admitted that some employees were aware of data leaking as early as 2014. Are you a Yahoo user? 500 million users’ data are stolen since 2014. Your data are in hackers' hard drive for three years and you never get a warning. Now Yahoo publicly acknowledged the hack. We don't comment why or how this happened, but recommend to encrypt your own data if you doubt Yahoo, or any other data services.
By Kate Conger  View Source  
Critical flaws found in open-source encryption software
VeraCrypt may be new to you, but some of us know TrueCrypt, a famous open source encryption software. VeraCrypt, the successor of popular TrueCrypt, is found critical vulnerabilities recently. Security software has security issue. What can we trust? The further bad story is the flaw cannot be patched easily, so ...
By Lucian Constantin  View Source  
A Small Business Guide to Computer Encryption
Only a few people know the nature of encryption, but all businesses need it to protect sensitive data. The basic encryption is called ciphertext, which let data to be unreadable unless you are authorised. A modern business has to consider all core data in security view, from USB flash drives to cloud...
By Kim Lindros  View Source  
The Best Encryption Software
Do you remember the story of Bernardino shooter's iPhone? FBI needed information encrypted in the phone, but Apple refused to offer a back door to get it. No such back door existed as Apple said? None knows the truth. The FBI had to hire hackers to get into the phone...
By NEIL J. RUBENKING  View Source  
The Strange Origins of TrueCrypt, ISIS Favored Encryption Tool
Before companies like Apple and Microsoft built encryption into their products, before Apple took on the U.S. government (briefly) over the unlocking of a San Bernardino shooter’s iPhone, TrueCrypt and programs like it were the primary means for securing files and disks by those with a privacy bent of whatever stripe. Free to download and...
By EVAN RATLIFF  View Source  
Flaw in iMessage encryption revealed by researchers
Researchers at Johns Hopkins University have cracked the encryption on Apple’s iMessage service, proving that a skilled attacker is capable of reading messages sent between iPads, iPhones and Macs despite the security measures protecting the devices. The attack relies on a flaw in iMessage which will be fixed in iOS 9.3, released today. But until...
By Alex Hern  View Source  
Password Manager LastPass Hacked, Exposing Encrypted Master Passwords
Password manager LastPass said Monday that email addresses and encrypted master passwords were compromised in a breach. LastPass CEO Joe Siegrist wrote in a blog post that the company does not believe user accounts were accessed in the attack, but the company recommended that users change the master password they use to access their account. ...
By Kate Vinton  View Source