Encryption

“Confidential Mode” feature in Gmail is misleading because the emails are not end-to-end encrypted and “expired” messages can be retrieved via the sent folder

Security

Google, Microsoft, Facebook and Twitter collaborate for Data Transfer Project

Google, Microsoft, Twitter, and Facebook have joined forces to unveil a Data Transfer Project, an open source initiative to develop tools that will …

Branding

New America’s Open Technology Institute Joins Coalition Calling on Australian Government to Support Strong Encryption

Yesterday, New America’s Open Technology Institute (OTI) joined an international coalition of civil society organizations, companies, and technology …

Privacy

Keep Your Communications Secure With These Eight Encrypted Messaging Apps

Cybersecurity spending this year is expected to reach $66 billion in the U.S., as security breaches and hacker attacks continue to rise. Faced with these kinds of threats, businesses and consumers alike are seeking ways to protect their data and communications more efficiently.<p>Encryption apps and …

Apps

How to Back Up and Restore Your iPhone

Did you get a new iOS device or need to fix a glitchy one? You can back up and restore your iPhone on your PC via iTunes or via Apple's iCloud. …

How-To's

What data can a thief get from a stolen phone or laptop?

11m<p>Chris Hoffman writes: “<b>Losing your hardware</b> is bad enough, but what happens to your <b>personal data</b>? Could a <b>thief</b> with your <b>phone,</b> tablet, or laptop</b> …

Personal Data

NordVPN vs. IPVanish VPN: Which is better in 2018?

These two popular VPN services have a lot to offer.Virtual Private Networks (VPNs) help you maintain a bit of privacy and security while navigating …

Privacy

How cryptography enables online shopping, cloud tech, and the blockchain

What do the Gallic Wars and online shopping have in common? The answer, believe it or not, is cryptography. Cryptography is the cement of the digital world, but it also has a long history that predates the digital era.<p>Most people do not realize that cryptography is a foundational element to our …

Blockchain

NPR | Submissions

At NPR, we welcome your news tips. Here’s a guide to getting in touch with our newsroom and how to share sensitive information. SecureDrop: SecureDrop is a secure, encrypted system that allows you to send confidential information to the NPR newsroom about a story you think is important and needs to …

Gram Parsons

Reading Comprehension: Application Questions | GMAT practice question

The secure transmission of messages has always been a chief concern of those engaged in politics, warfare, or business. One common way to deny access …

Freedom of Information

CBSE intoduces encrypted question papers for class Xth compartment exams

Hack:<p>The Central Board of Secondary Education (CBSE) has introduced encrypted question papers for class Xth compartment exams on Friday<br>• This moves …

Central Board of Secondary Education

Whatsapp to limit message forwarding following lynchings in India spurred by misinformation

Whatsapp is limiting the number of times a user can forward a message following a string of mob lynchings in India stemming from …

India

Russian Ministry of Foreign Affairs continues use of Telegram channel despite messaging app ban

The Russian Ministry of Foreign Affairs’ (MFA) Telegram channel continues to be active despite a court ruling that blocked country-wide access to the messenger service back in April.<p>The decision came after Telegram, which offers encrypted messaging, refused to hand over to the Federal Security …

World News

Huobi Launches Service to Build Crypto Exchanges in the Cloud

Huobi, the world's third-largest cryptocurrency exchange platform by trade volume, is now offering a business arm to help customers build their own …

Cryptocurrency

Civilization VI is the latest big game to remove controversial advert analytics software

The latest patch for Civilization VI has stripped out the game’s Red Shell software, a controversial product that tracks the ads which the user has …

Civilization (Video Game)

Is privacy even possible in this Golden Age of Data Breaches?

In 2018 the number of internet users, worldwide, rose to 3.6 billion. If you’re a collector of anecdotes or technology milestones, that’s more than …

Online Privacy

Facebook says it will remove fake news that stirs violence

<i>This story was delivered to Business Insider Intelligence "Digital Media Briefing" subscribers hours before appearing on Business Insider. To be the first to know, please click here.</i><p>Facebook says it will remove misinformation that contributes to imminent violence or "physical harm," under a policy …

Fake News

CoinMarketCap Announces Changes to Counter Fake Volume Concerns

The popular crypto data tracker CoinMarketCap is instituting changes in light of what it called "concerns" over fake volume figures.<p>In a blog post, …

Cryptocurrency

iOS and Android AES Encryption (No UINT in Java)

All,<p>I am new to encryption so I'm not sure all of the information I need to share to get help; but I'll edit this question as I learn more about how …

Cybersecurity

Cisco Security Webinars

<i>Cryptomining: Defending Against the Digital Gold Rush</i><p><i>VPNFilter. Global malware threat discovered. What you want to know.</i><p><i>Steps to CDM Success</i><p><i>Cybersecurity Report Talks: Visibility past, present and future</i><p><i>Cybersecurity Report Talks: Managing Vulnerabilities</i><p><i>Zero Trust on a Beer Budget</i><p><i>Better Manage</i> …

Cybersecurity

Who's In Control of Tezos? That Answer Is About to Change

"To me, it kind of feels similar to the beginning of ethereum."<p>Andrew Paulicek, founder of Happy Tezos, isn't the only one excited about the upcoming …

Cryptocurrency

Police Force Seizes and Sells 295 Bitcoins from Criminal in UK First

A British county police force has become the first in the country to seize and exchange bitcoins discovered during a criminal investigation.<p>According …

Price Index

TSMC Says Crypto Mining Demand Will Fall in Q3

Semiconductor manufacturing giant TSMC said Thursday that it expects demand for cryptocurrency mining-related products to cool off during the third …

Cryptocurrency

How To: Use MDK3 for Advanced Wi-Fi Jamming

You may have heard of a signal jammer before, usually referring to a device that blasts out a strong enough radio signal to drown out the reception …

Computer Hacking

Ethereum's Most Heated Tech Debate Is Proving It's Far From Over

Ethereum's most polarizing debate is back – and, arguably, as complex as ever.<p>Largely undiscussed since April, the question of whether the world's …

Cryptography

ProtonVPN

<b>Pros</b><p>Free version. Flexible, low-cost plans. Focus on physical security. Excellent privacy policies. Slick, accessible client. Multi-hop VPN to secure …

Tech Trends

What is a 'blockchain phone' and how does it work?

HTC plans to release the Exodus this October, and it will be the world's first blockchain phone. We know the project is spearheaded by Phil Chen, the …

Blockchain

Samsam infected thousands of LabCorp systems via brute force RDP

LabCorp, one of the largest clinical labs in the U.S., said the Samsam ransomware attack that forced their systems offline was contained quickly and …

Information Security

FBI director: Without compromise on encryption, legislation may be the 'remedy'

FBI Director Christopher Wray said Wednesday that unless the U.S. government and private industry are able to come to a compromise on the issue of …

Privacy

Ethereum Scaling Solution Raiden Releases Last Testnet Before Launch

A new test network has been launched for Raiden, the ethereum payments channel project.<p>Announced at the Dappcon developer conference in Berlin on …

Cryptography