Posts filtered by tags: Encryption[x]


 

Zoom admits some calls were routed through China by mistake

Hours after security researchers at Citizen Lab reported that some Zoom calls were routed through China, the video conferencing platform has offered an apology and a partial explanation. To recap, Zoom has faced a barrage of headlines this week over its security policies and privacy practices, as hundreds of millions forced to work from home during the coronavirus pandemic still need to communicate with each other. The latest findings landed earlier today when Citizen Lab researchers said tha...
Tags: Security, Europe, New York, China, Tech, Encryption, Cryptography, Beijing, Data Protection, North America, Video Conferencing, Zoom, Citizen Lab, Eric Yuan, Bill Marczak, Coronavirus


Zoom Accused of Misleading Users With 'End-to-End Encryption' Claims Amid Other Security Issues [Updated]

Zoom is facing fresh scrutiny today following a report that the videoconferencing app's encryption claims are misleading. Zoom states on its website and in its security white paper that the app supports end-to-end encryption, a term that refers to a way of protecting user content so that the company has no access to it whatsoever. However, an investigation by The Intercept reveals that Zoom secures video calls using TLS encryption, the same technology that web servers use to secure HTTPS web...
Tags: Security, Facebook, Privacy, Encryption, Zoom, Patrick Wardle


Zoom Accused of Misleading Users With 'End-to-End Encryption' Claims

Zoom is facing fresh scrutiny today following a report that the videoconferencing app's encryption claims are misleading. Zoom states on its website and in its security white paper that the app supports end-to-end encryption, a term that refers to a way of protecting user content so that the company has no access to it whatsoever. However, an investigation by The Intercept reveals that Zoom secures video calls using TLS encryption, the same technology that web servers use to secure HTTPS web...
Tags: Security, Facebook, Privacy, Encryption, Zoom


Scientists Save Quantum States in a Diamond, a Tiny Step Toward a Quantum Internet

A newly created system can enhance quantum communications over longer distances—a small but crucial step toward a quantum internet.Read more...
Tags: Science, Encryption, Quantum Computing, Quantum Mechanics, Quantum Communications, Quantum Internet


UK turns to WhatsApp to share coronavirus information

Three years ago, the U.K. government chastised WhatsApp for enabling end-to-end encryption by default. Today, it’s relying on the encrypted messaging app as a vital service for sharing information about the coronavirus pandemic. The new chatbot, supplied by the U.K. government, will let anyone subscribe to official advice about the pandemic, known as COVID-19, in the hope of reducing the burden on its national health system. Send “hi” to 07860 064422 (or +44 7860 064422 for international users) ...
Tags: Health, South Korea, UK, New York, Government, Social Media, Tech, Whatsapp, Encryption, United Kingdom, Italy, Boris Johnson, Infection, Messaging Apps, Pandemic, Coronavirus


The most hack-proof home security cameras

We break down the most secure home security cameras, where protecting user data is key for these brands.
Tags: Trends, Encryption, Smart Home, Adt, Buying Guides, Smart Security Camera


This Unpatchable Flaw Affects All Intel CPUs Released in Last 5 Years

All Intel processors released in the past 5 years contain an unpatchable vulnerability that could allow hackers to compromise almost every hardware-enabled security technology that are otherwise designed to shield sensitive data of users even when a system gets compromised. The vulnerability, tracked as CVE-2019-0090, resides in the hard-coded firmware running on the ROM ("read-only memory") [Author: [email protected] (Wang Wei)]
Tags: Tech, Intel, Cyber Security, Encryption, Disk Encryption, Wang Wei, Intel CPU, Intel Processor, Intel Vulnerability, TPM Chip, Fastest Processor


Encryption Flaws Leave Millions of Toyota, Kia, and Hyundai Cars Vulnerable to Key Cloning

Millions of cars with radio-enabled keys made by Toyota, Hyundai, and Kia may be vulnerable to hijacking thanks to a flaw in their encryption implementation, Wired reported this week, citing the results of a KU Leuven in Belgium and University of Birmingham study.Read more...
Tags: Security, Science, Technology, Cars, Cybersecurity, Encryption, Automotive, Hacking, Belgium, Hackers, Automobiles, Hyundai, Kia, University of Birmingham, Leuven, Toyota Hyundai


Particle lays off 10% of staff and co-founder departs after ‘turbulent period’

San Francisco-based startup Particle was one of the rising stars in the Internet of Things space, raising more than $81 million to date on the promise of helping to manage and secure the next generation of connected devices. But the company is only now emerging from what its co-founder and chief executive Zach Supalla called a “turbulent period,” prompting layoffs and cost-cutting to help stay afloat, TechCrunch has learned. Founded in 2012, Particle snagged $40 million in its Series C fun...
Tags: Security, Email, Employment, San Francisco, Tech, Encryption, Signal, World Wide Web, Zach Supalla, Personnel, Zachary Crockett, Series C, Layoff, Particle, Supalla, Qualcomm Ventures and Energy Impact Partners


Particle lays off 10% staff and co-founder departs after ‘turbulent period’

San Francisco-based startup Particle was one of the rising stars in the Internet of Things space, raising more than $81 million to date on the promise of helping to manage and secure the next-generation of connected devices. But the company is only now emerging from what it’s co-founder and chief executive Zach Supalla called a “turbulent period,” prompting layoffs and cost-cutting to help stay afloat, TechCrunch has learned. Founded in 2012, Particle snagged $40 million in its Series C fundr...
Tags: Security, Email, Employment, Articles, San Francisco, Tech, Encryption, Signal, World Wide Web, Zach Supalla, Zachary Crockett, Series C, Layoff, Particle, Supalla, Qualcomm Ventures and Energy Impact Partners


MI5 chief asks tech firms for 'exceptional access' to encrypted messages

Sir Andrew Parker says cyberspace ‘inaccessible to authorities’ and spies need access to stop serious harmMI5’s director general has called on technology companies to find a way to allow spy agencies “exceptional access” to encrypted messages, amid fears they cannot otherwise access such communications.Sir Andrew Parker is understood to be particularly concerned about Facebook, which announced plans to introduce powerful end-to-end encryption last March across all the social media firm’s service...
Tags: Facebook, Privacy, UK News, Surveillance, Encryption, Edward Snowden, UK security and counter-terrorism, MI5, Andrew Parker


AFP did not interview Angus Taylor over false document before dropping investigation

Commissioner Reece Kershaw says Australian Federal Police were not able to substantiate if any offences committedThe Australian Federal Police did not interview Angus Taylor before concluding further investigation would not substantiate whether an offence had been committed in relation to a letter he signed containing inflated data about City of Sydney council’s travel spending.The AFP commissioner, Reece Kershaw, told reporters at the National Press Club on Wednesday he was “not aware” that the...
Tags: Social Media, Australia news, Encryption, Sydney, Australian Security And Counter-terrorism, Australian federal police, Australian intelligence agencies, Afp, Angus Taylor, National Press Club, Clover Moore, Reece Kershaw


Tozny introduces encrypted identity tool as part of security service platform

Tozny, a Portland, Oregon startup that wants to help companies more easily incorporate encryption into their programs and processes, introduced TozID today. It is an identity and access control tool that can work independently or in conjunction with the company’s other encryption tools. “Basically we have a Security as a Service platform, and it’s designed to help developers and IT departments add defense in depth by [combining] centralized user management with an end-to-end encryption platform,...
Tags: Security, Startups, Open Source, Enterprise, Encryption, Darpa, Portland Oregon, NIST, Tozny, Isaac Potoczny Jones, Identity And Access Management, Potoczny Jones, Tozny SDK


CIA Spied Using Sabotaged Encryption Equipment It Sold to Foreign Governments Since the 1970s

The Central Intelligence Agency (CIA) and National Security Agency (NSA) spied on allies and enemies alike through a company they owned that made cryptography equipment, according to an explosive new report from the Washington Post and Germany’s ZDF news outlet. Read more...
Tags: Science, Washington Post, Nsa, Germany, Cold War, Tor, Spying, Encryption, Cryptography, Crypto, Espionage, Cia, Signal, National Security Agency NSA, ZDF, Central Intelligence Agency CIA


Apple is being two-faced about its security. Turns out they have a backdoor key to our backups.

Apple is being two-faced about its security. Turns out they have a backdoor key to our backups. Reports say that Apple is not going to allow customers to fully encrypt backups of the iOS data they store in iCloud after the FBI demanded access two years ago. Any backdoor will eventually be compromi...
Tags: Apple, Ios, Security, Mobile, Business, Technology, Privacy, Internet, Government, Sem, Cybersecurity, Surveillance, Encryption, Fbi, Computers, Mobile Phones


Smart TV hub Solaborate secures $10M Series A and a go-to-market partnership

When siblings Labinot and Mimoza Bytyqi fled the war in Kosovo in 1999, arriving as refugees on the West Coast of the US, they would have had no idea they’d go on to launch a technology company together. But as adults, the pair set up attacking the $6.7 billion telepresence and video communication category which hasn’t evolved much since the older business systems form Cisco and Polycom . By integrating their Solaborate device with Smart TVs, the entrepreneurs have come up with a drasticall...
Tags: Google, TC, Messenger, Europe, Video, Technology, Microsoft, US, Tech, Cisco, Encryption, United States, Telecommunications, Denmark, West Coast, Kosovo


SXSW Pitch Finalist: StrongSalt

“Encryption sucks and we fix that.” — Ed Yu, CEO and co-founder of StrongSalt The Forrest Four-Cast: February 3, 2020 Is it possible for companies to protect their customers with data privacy that complies with regulations and is easy for developers to use?StrongSalt Co-Founder and CEO Ed Yu says yes it is.This privacy-as-a-service API platform provides peace of mind to companies and the customers they serve in the world of AI and smart devices by building a new privacy infrastructure for the...
Tags: Startups, Privacy, Entrepreneurship, Startup, Encryption, Silicon Valley, Sxsw, SAN JOSE Calif, United States Patent and Trademark Office, Hugh Forrest, Thierry Stern, SxSW Pitch, Austin Startups, Ed Yu, StrongSalt, StrongSalt Co Founder


Lindsey Graham Is Quietly Preparing a Mess of a Bill Trying to Destroy End-to-End Encryption

Top Trump ally and consistent encryption scaremonger Senator Lindsey Graham is working on a bill that could coerce tech companies to stop providing end-to-end encryption by threatening them with massive legal liability, The Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2019 (or EARN IT…Read more...
Tags: Science, Technology, Privacy, Congress, Cybersecurity, Encryption, End To End Encryption, Lindsey Graham, Top Trump, Earn It Act


Tech companies, we see through your flimsy privacy promises

There’s a reason why Data Privacy Day pisses me off. January 28 was the annual “Hallmark holiday” for cybersecurity, ostensibly a day devoted to promoting data privacy awareness and staying safe online. This year, as in recent years, it has become a launching pad for marketing fluff and promoting privacy practices that don’t hold up. Privacy has become a major component of our wider views on security, and it’s in sharper focus than ever as we see multiple examples of companies that harvest too m...
Tags: Human Rights, Privacy, Tech, Encryption, Policy, Digital Media, Digital Rights


The FBI doesn't need Apple to give it a backdoor to encryption, because it already has all the access it needs

Once again, the FBI is putting pressure on Apple to help them break into the phone of a mass shooter. And once again, Apple has been largely resistant to the effort. Which is good, because a government having control over a private company that gives them secret backdoor access into people's personal technology devices is an authoritarian wet dream waiting to happen. It also doesn't matter anyway because — as Reuters pointed out this week — Apple already buckled under FBI pressure a few years an...
Tags: Iphone, Apple, Post, News, China, US, America, Encryption, End-to-end Encryption, Fbi, Iphones, Icloud, San Bernardino, Reuters, Joseph Menn Reuters, Fbi Vs Apple


Security First, Apple Stands Ground on iPhone Encryption

Security First, Apple Stands Ground on iPhone Encryption The Apple iPhone platform is based on security first. It is designed to be secure and private.  To do that they use a proprietary encryption system. While there have been private companies who have tried to break that encryption and police d...
Tags: Iphone, Apple, Ios, Security, Business, Technology, Privacy, Government, Sem, Phone, Encryption, Exploit, Fbi, Law Enforcement, Iphones, Smart Phone


iCloud doesn’t encrypt your data but these cloud storage apps do

If you're serious about your data security, learn about these companies providing serious encryption options.
Tags: Apple, Mobile, Cloud Storage, Trends, Ios Apps, Encryption, Icloud, Secure Storage


Google Cloud gets a Secret Manager

Google Cloud today announced Secret Manager, a new tool that helps its users securely store their API keys, passwords, certificates and other data. With this, Google Cloud is giving its users a single tool to manage this kind of data and a centralized source of truth, something that even sophisticated enterprise organizations often lack. “Many applications require credentials to connect to a database, API keys to invoke a service, or certificates for authentication,” Google developer advocate...
Tags: Google, Cloud, Enterprise, Developer, Tech, Encryption, Password, Computing, Google Cloud Platform, Cloud Infrastructure, Matt Driscoll, Google Cloud, Berglas, Secret Management, Sath Vargo, Berglas Google


DOJ Says FBI Cracked Lev Parnas's iPhone 11 in Two Months Even as It Demands Apple Backdoor

The U.S. Department of Justice claimed in a letter to a federal judge this week that it took almost two months for the FBI to break into an iPhone 11 owned by Lev Parnas, a former associate of Donald Trump’s lawyer, Rudy Giuliani, who has been sucked into the sprawling impeachment mess facing the White House, …Read more...
Tags: Ios, Politics, Science, Technology, Privacy, White House, Ukraine, Cybersecurity, Encryption, Fbi, Department Of Justice, Donald Trump, Doj, Rudy Giuliani, U S Department of Justice, Impeachment


The US government should stop demanding tech companies compromise on encryption

In a tweet late Tuesday, President Trump criticized Apple for refusing “to unlock phones used by killers, drug dealers and other violent criminal elements.” Trump was specifically referring to a locked iPhone that belonged to a Saudi airman who killed three U.S sailors in an attack on a Florida base in December. It’s only the latest example of the government trying to gain access to a terror suspect’s device it claims it can’t access because of the encryption that scrambles the device’s data wit...
Tags: Iphone, Apple, Security, Florida, Congress, Government, US, Tech, Smartphones, Encryption, Cryptography, Online Shopping, President, Department Of Justice, Computer Security, Trump


Old Man Yells at iCloud

Read more...
Tags: Iphone, Apple, Ios, Science, Technology, Privacy, Cybersecurity, Encryption, Icloud, Donald Trump, Sure Whatever


Save Space on Your Android by Automatically Deleting Signal Attachments

Signal just updated its Android app with new features that make managing file attachments and deleting old conversations much easier than it used to be.Read more...
Tags: Android, Storage, Encryption, Lifehacks, Signal


Apple rejects U.S. Attorney General request to unlock another phone

The question of security backdoors and law enforcement's access to our data looms large again
Tags: Apple, Mobile, Facebook, News, Trends, Encryption, Cellebrite, Encryption Backdoor, Phone Security


DOJ Steps Up Pressure on Apple to Unlock Saudi Terror Suspect's iPhone

Apple is facing escalating demands from the U.S. Justice Department (DOJ) to assist authorities investigating the deadly shooting at a naval airbase in Pensacola, Florida, last month, which is now being treated as an act of terrorism.Read more...
Tags: Apple, Science, Privacy, Encryption, Fbi, Doj, Pensacola Florida, Going Dark, U S Justice Department DOJ


U.S. Attorney General wants Apple to unlock another phone following a shooting

The question of security backdoors and law enforcement's access to our data looms large again as U.S. Attorney General Williams Barr asks Apple to unlock the phone of another alleged shooter.
Tags: Apple, Mobile, Facebook, News, Trends, Encryption, Cellebrite, Encryption Backdoor, Phone Security, Williams Barr