Data Security: Hot Stories

Search Result for Encryption in All Fields - Find 15 Stories

 Search Stories
Hot Words
Key Words
In Field



 Search Result for Encryption in All Fields - Find 15 Stories
Texas Gunman Locked iPhone Renews Encryption Debate
When you heard FBI failed to unlock the cellphone of the Texas gunman, what do you think? Yahoo once leaked almost everyone's data to hackers, but Apple is fighting to protect privacy of murders like this shooter. Are they really so different? This sad story is reigniting the debate over encryption and government access to secured communications. It's just a blooding commerce chance for some companies and far away the nature: we must punish criminals either online or by gun...
By SAMANTHA RAPHELSON  View Source  
China Government Use its Own Encryption in Windows 10
MS announced a news that hardly impacts global OS market but may change some people's fates in future. It will allow China's government to use own encryption in Window 10. This is a horrible start. Right now there is no detail to disclose, for example, how China replaces the original encryption with own version and if the rule will apply to all computers sold in China. The deal may solve some security concerns of China government, but is raising privacy threat on other side. Where to buy computer possibly will become a new question...
By Brad Sams  View Source  
Naked Pictures of Kate Moss Been Stolen
The new celebrity victim of hacker attacking is Kate Moss by recent report. Her computer somehow was visited by unknown guys, and lots of photos are believed to have been stolen. These very, very private pictures are possibly involved with her friends too. Right now the leaked stuffs aren't in public yet, hopefully they are in right encryption...
By Durhamregion  View Source  View Cache  
Encryption Apps Help White House Staffers Leak
Since Donald Trump’s inauguration, a steady stream of leaks happened around the White House. Some are innocuous, and some devastating. The question is how the stories do to media secretly. In response, Trump has launched an investigation, tweeted: "Why are there so many illegal leaks coming out of Washington?" A tiny technology flaw hole will cause fatal info leak...
By LILY HAY NEWMAN  View Source  
Sex Videos Are Safe Under Rumuki
Sex tapes are a high risk object of privacy. As long as produced, they are never totally secure. We heard lots of bad or sad stories. Zealand startup Rumuki aims the market: keep sex videos security for young lovers. The device is a prenup for sex videos with encryption, and only unlocks and shows with mutual consent. In first week of its launching, more than 1,000 devices are register...
By M. J. Coren  View Source  
TrueCrypt is discontinued and try alternatives
If you used to be user of TrueCrypt, it's time to drop it. Since 2004, this open source encryption software has been installed on millions of computers as the No 1 free encryption option. However, the freeware was discontinued in May 2014 and is no longer updated. In these years a number of security flaws have been uncovered so that people have to seek alternatives seriously.
By Paul Bischoff  View Source  
Critical flaws found in open-source encryption software
VeraCrypt may be new to you, but some of us know TrueCrypt, a famous open source encryption software. VeraCrypt, the successor of popular TrueCrypt, is found critical vulnerabilities recently. Security software has security issue. What can we trust? The further bad story is the flaw cannot be patched easily, so ...
By Lucian Constantin  View Source  
A Small Business Guide to Computer Encryption
Only a few people know the nature of encryption, but all businesses need it to protect sensitive data. The basic encryption is called ciphertext, which let data to be unreadable unless you are authorised. A modern business has to consider all core data in security view, from USB flash drives to cloud...
By Kim Lindros  View Source  
The Best Encryption Software
Do you remember the story of Bernardino shooter's iPhone? FBI needed information encrypted in the phone, but Apple refused to offer a back door to get it. No such back door existed as Apple said? None knows the truth. The FBI had to hire hackers to get into the phone...
By NEIL J. RUBENKING  View Source  
Apple engineers note that hackers are the real danger to our security
There's been a lot of talk recently about the U.S. government's position concerning mobile security, encryption, and the sanctity of personal data. This came about when Apple refused to help the FBI unlock the San Bernardino suspect's iPhone 5c on ethical grounds. Since, the FBI called in so-called “pro hackers” to do the job; the iPhone has been...
By Joe White  View Source  
The Strange Origins of TrueCrypt, ISIS Favored Encryption Tool
Before companies like Apple and Microsoft built encryption into their products, before Apple took on the U.S. government (briefly) over the unlocking of a San Bernardino shooter’s iPhone, TrueCrypt and programs like it were the primary means for securing files and disks by those with a privacy bent of whatever stripe. Free to download and...
By EVAN RATLIFF  View Source  
Flaw in iMessage encryption revealed by researchers
Researchers at Johns Hopkins University have cracked the encryption on Apple’s iMessage service, proving that a skilled attacker is capable of reading messages sent between iPads, iPhones and Macs despite the security measures protecting the devices. The attack relies on a flaw in iMessage which will be fixed in iOS 9.3, released today. But until...
By Alex Hern  View Source  
12 tips from getting hacked
If we’ve learned anything about cyber security in 2014, it’s that hackers are becoming more of a threat than ever before. Within the past two months companies such as Microsoft, AOL, and eBay have been the victim of security breaches. And let’s not forget about the Heartbleed bug — a giant vulnerability that was discovered within an encryption...
By Lisa Eadicicco  View Source  
These Sites Tell Which Of Your Accounts Have Been Hacked
Heartbleed, the massive flaw in web encryption recently made public, is just one of the unending stream of vulnerabilities that enables hackers to steal personal details and passwords from companies with which you do business. Of recent, a number of websites have opened up shop to alert users when such attacks happen. For example,...
By http://www.forbes.com/  View Source  
NSA's access to Microsoft's services detailed
Microsoft helped the NSA get around its encryption systems so the agency could more easily spy on users of its services, reports suggest. Papers given to The Guardian newspaper allege there were close links between the security agency and the tech firm. Microsoft said its collaboration with the NSA only took place because legal obligations...
By BBC News  View Source