Encryption

Hacker Releases Firmware Decryption Key for Apple's Secure Enclave

A hacker released what he claimed to be a firmware decryption key for Apple's Secure Enclave on Thursday, initially sparking fears that iOS security had been compromised.<p>Apple's Secure Enclave Processor (SEP) handles all cryptographic operations for the Apple Watch Series 2, the A7 processor that …

Security

How to set up a VPN on Android

Setting up a VPN on your phone is easier than you think.<p>One of the easiest ways to protect yourself and your privacy while you are using the internet …

VPNs

Encryption key for iPhone 5s Touch ID exposed, opens door to further research

Just prior to a hacker's conference, a participant has revealed that the iPhone 5s Secure Enclave has been hacked, and the decryption key for has …

Security

Deadly Mamba, Locky ransomware set to strike again, including India; here's how to safeguard your devices

In the latest Locky ransomware attack, more 10,000 users have received malware riddled emails from August 9 to 12. Here's how to protect PCs from …

Internet

iCloud security: How (and why) to enable two-factor authentication

Given that so many of the details of our digital lives are either with us (on our smartphones) or easily accessible (via the web), you should be …

Business Technology

Retailers Fear Data Breaches — Here’s How They Can Guard Against Them

It almost seems like data breaches at retailers are inevitable. Several retailers have suffered high-profile data breaches so far in 2017, including …

Business Technology

DEA: ‘There Is No Silver Bullet’ for Going Dark

Law enforcement agencies and lawmakers around the world are trying to wrestle with the spread of encryption. More services offering robust end-to-end encryption has led to what is known as the "going dark" problem, where authorities can no longer intercept communications in more traditional …

Security

Email Provider ProtonMail Says It Hacked Back, Then Walks Claim Back

Hacking back, when companies retaliate against cybercriminals, likely happens a lot more than the public realises. Whether a firm decides to gather intelligence on who is attacking its customers, or perhaps wipe stolen data from a server, hacking back is controversial.<p>And people typically don't …

Security

Reminder: Your “self-destructing” messages do not actually self-destruct

Giving out material nonpublic information is a Bad Idea. Same goes for blindly trusting the encryption of a social-networking app.<p>Yet Daniel Rivas, a …

Tips & Tools To Prevent Your Email From Getting Hacked

<i>Ensure your personal data stays secure.</i><p>These days, we do nearly everything online — from grocery shopping to taking classes, making plans with our …

Security

How Does Microsoft Azure Backup Actually Work?

Over the past few years, Microsoft has added a backup feature for virtual machines to its Azure Infrastructure as a Service offering, as well as</b> …

Virtualization

Securely Storing Password Data in Couchbase With Golang and BCrypt

When writing web applications that store passwords for your users, it is never a good idea to store them as plain text in your database, whether that …

DevOps

Internet of Things: Building Secure Devices

The future is weird: we used to protect our privacy by shying away from microphones and webcams. Nowadays, we install them everywhere and call them …

Internet of Things

Apple's Secure Enclave Chip Has Been Hacked

Image: iStock<p>A hacker, going by the Twitter handle @xerub, claims to have broken part of the security around Apple's Secure Enclave. The hacker has …

Security

Changing the security landscape for entrepreneurs

Throughout the course of human history, disruptive innovation has been required to unleash higher tiers of human potential. Think of Gutenberg and movable type, Edison and electricity or Berners-Lee and the World Wide Web.<p>We are in need of another such breakthrough today. Cloud computing and the …

Security

How to use Firefox Send for secure file sharing

Firefox Test Pilot is now kicking the tires of a new file sharing service. Jack Wallen shows how to use Send and explains why this might be one of …

Software

Hacker Publishes iOS Secure Enclave Firmware Decryption Key

A hacker Thursday afternoon published what he says is the decryption key for Apple iOS’ Secure Enclave Processor (SEP) firmware.<p>The hacker, …

Touch ID

Deals: 60% Off This Award-Winning Password Manager

Cybercrime is growing, and anyone can fall victim to ransomware, data dumping, and the like. That's why it's important now more than ever to ensure …

Technology (Australia)

EV ransomware is targeting WordPress sites

WordPress security outfit Wordfence has flagged several attempts by attackers to upload ransomware that provides them with the ability to encrypt a …

Ransomware

Banning Encryption to Stop Terrorists: A Worse than Futile Exercise

August 16, 2017<p>Author(s): Aaron Brantly<p>Abstract: <i>Terrorist groups are increasingly using encryption to plan and coordinate terrorist acts, leading to</i> …

Security

Protonmail's Beta Version Enables Automated Bitcoin Payments - Bitcoin News

Privacy<p><b>A year ago the popular encrypted email provider, Protonmail, launched its desktop, Android, and iOS platforms that feature end-to-end</b> …

Security

Samsung Portable SSD T5 500GB and 2TB Performance Review

Samsung Portable SSDs Get 64-Layer V-NAND Flash<p>Samsung today announced their newest Portable Solid State Drive (PSSD), the Samsung Portable SSD T5. …

USB Type-C

The best mobile VPNs can ensure your privacy anywhere | ZDNet

Going mobile? Stay secure. Here's how find an effective VPN service. (Hint: You can't trust every VPN provider.)<p><i>VPN: Why you should hide your IP</i> …

Cybersecurity

Someone Appears to Be DDoSing the Dark Web Version of The Daily Stormer

Earlier today, Motherboard reported that some users of the white supremacist site The Daily Stormer had moved to a dark web version of the site. This came after GoDaddy and Google declined to provide domain services for the group.<p>Now, it appears someone is conducting a sporadic …

Security

BlackBerry and Appdome enable codeless integration of Secure Voice, Video and Messaging

<b>BlackBerry and Appdome Enable Codeless Integration of Secure Voice, Video and Messaging</b><p>WATERLOO, ONTARIO and REDWOOD CITY, CALIFORNIA--(Marketwired - …

BlackBerry

End-to-end encryption isn't enough security for 'real people'

Government officials continue to seek technology companies’ help fighting terrorism and crime. But the most commonly proposed solution would severely …

Security

New – Encryption of Data at Rest for Amazon Elastic File System (EFS) | Amazon Web Services

We launched Amazon Elastic File System in production form a little over a year ago (see Amazon Elastic File System – Production Ready in Three …

Cloud Computing

Build an Enigma machine using a Pringles tin at Southport technoJAM

During World war 2 the Germans used the Enigma system to encrypt secret messages that they believed couldn’t be cracked. It was a really good system …

Security

How Australia's backdoor proposal could threaten security for the rest of the world

Australia's Prime Minister recently suggested a proposal that would allow access to information protected by encryption. Access Now's US Policy …

Privacy

How to Use TOR on iPhone and iPad with Onion Browser

TOR is a relay network which aims to increase your online privacy by attempting to anonymize web browsing activity. This is achieved by distributing …

OS X