Encryption

The 4 Best Phones for Privacy and Security

Cell phones — particularly smartphones — are inherently bad for privacy. You've basically got a tracking device in your pocket, pinging off cell …

Security

FBI Director: unbreakable encryption is a “huge, huge problem” | Ars Technica

“I get it, there’s a balance that needs to be struck,” Christopher Wray said.<p>FBI Director Christopher Wray told a conference of law enforcement …

Privacy

Amazing Free And Open Source Android Apps Every User Should Try

Android has been known as an open-source operating system, with its source code available for everyone to tinker around. However, that’s not the case …

Software

Encryption stops the FBI from accessing over half the devices it tries to look at

The statistic was revealed at the International Association of Chiefs of Police<p>Encryption has prevented the FBI from accessing over half of the …

Privacy

FBI Chief Says Encryption Is ‘Huge Problem’

Almost 7,000 devices were inaccessible to the FBI due to encryption, Director Christopher Wray said.

Privacy

Windows 10's "Controlled Folder Access" Anti-Ransomware Feature Is Now Live

With the release of Windows 10 Fall Creators Update last week, the "Controlled Folder Access" that Microsoft touted in June is now live for millions …

Microsoft

FBI failed to break into nearly 7000 mobiles due to encryption

Law enforcement agencies have a problem.<p>They know that more and more of us use our cellphones and other devices to communicate, and that they contain …

Privacy

The FBI Can't Stop Fearmongering About Encryption

Never in the past century has the FBI ever had greater access to consumer data than it does today. It has never been easier to locate a person of …

Privacy

Phone crypto shut FBI out of 7,000 devices, complains chief g-man

The FBI has been locked out of almost 7,000 seized mobile phones thanks to encryption, director Christopher Wray has said.<p>Speaking at the …

Security

ROCA 'round the lock: Gemalto says IDPrime .NET access cards bitten by TPM RSA key gremlin

Some Gemalto smartcards can be potentially cloned and used by highly skilled crooks due to a cryptography blunder dubbed ROCA.<p>Security researchers …

Information Security

Google: More of the web is protected with HTTPS

It has been over a year since Google announced its commitment to provide a more secure web with HTTPS, and today the company is announcing it is …

Google App Engine

Third man charged in celebrity iCloud, Gmail hacking investigation

An Illinois man was on Monday charged with a felony computer hacking offense for his role in a phishing scheme that targeted more than 550 Apple …

Security

Android getting “DNS over TLS” support to stop ISPs from knowing what websites you visit

A DNS (Domain Name Server) is what translates a website address from a URL that you enter to an IP address which your computer actually connects to. …

Information Security

Encrypted phones are “a huge, huge problem” for FBI

FBI director Christopher Wray made the comments at the International Association of Chiefs of Police conference in Philadelphia on Sunday, reports the BBC. <b>There he revealed that the FBI has been unable to access the data on 7,000 phones in their possession.</b> The FBI’s frustrations came to a head …

Privacy

13.8 lakh bio-metric devices used for Aadhaar authentication made compliant with UIDAIs new encryption norms

Nearly 13.8 lakh <b>biometric devices</b> in use by the telecom sector for Aadhaar authentication have been made compliant with <b>UIDAIs</b> new encryption norms, …

Technology (India)

PM's stance on encryption will compromise technology of the future, expert says

Prime Minister Malcolm Turnbull has been reprimanded by one of the world's most respected internet security professionals for his comments on …

Security

5 Amazing iphone & Android Apps Like Simply Hired Download

1. Wickr Me<p>With Wickr Me, you can instantly connect with your friends in groups or 1:1, share end-to-end encrypted messages, files, photos and videos …

Amazing

10 things you didn’t know you can do with a VPN

A VPN, or Virtual Private Network, is a remarkably useful tool for anyone who goes online. On a fundamental level, a VPN consists of a tunnel that …

Cybersecurity

The Week in Crypto: Bad News for SSH, WPA2, RSA Privacy

Between KRACK, ROCA, new threats to SSH keys, and the European Commission's loosey-goosey stance on encryption backdoors, it's been a difficult time …

Information Security

Latest Tor Alpha Release Includes New Traffic Scheduler

The most recent Tor Alpha release comes with a new element that seeks to address traffic congestion within the Tor network.<p>This latest edition …

Security

64 percent of Android devices protected with enhanced security on Chrome

Google's efforts to enhance security by extending "not secure" warning to websites not encrypted with "HTTPS in Chrome" has yielded the desired …

Cybersecurity

Hypocritical Ted Cruz Attacks Apple's Hypocritical Concession To Chinese Censors

US senator Ted Cruz, who just last year expressed his support for a governmental backdoor into the iPhone, is absolutely outraged that Apple would …

Privacy

Can I resume a failed (ZoL) ZFS send over netcat? [on hold]

Update:This question was moved here: Unix & Linux - Can I resume a failed (ZoL) ZFS send over netcat?Please vote to be closed. <b>You don't have to</b> …

Google's annual report shows more web traffic is encrypted

For several years now, Google has been exerting pressure to increase the usage of HTTPS across the internet. By defaulting to secure connections on both ends, users can be protected from anyone who may intercept or even manipulate data as it flows back and forth -- quite useful in a world where you …

Technology (India)

Why MegaCrypter is a ‘MegaFail’

A Windows script file is basically a format that allows the Windows Scripting Host (Wscript.exe) to provide a wrapper around a number of other …

Python Programming

What to consider when choosing a VPN

Virtual Private Networks (or VPNs) have long been a favourite of the enterprise IT world, because they give employees a completely secure way to …

Wi-Fi

Keybase: Crypto for (Almost) Everyone)

Encryption has been written about on ProfHacker a few different times but, in light of the really bad week we’re having security-wise, it seems like …

Security

WhatsApp grants Indian members access to live location sharing

Indian WhatsApp users now have the capability to share their live location to connections in the latest feature update to the Android and iOS app.<p>The …

WhatsApp

Deputy Attorney General Calls for Government Backdoors

Deputy Attorney General Rod Rosenstein told cadets at the Naval Academy in Annapolis that “warrant proof” encryption posed a threat to law …

Deputy Attorney General

iPhone X Facial Recognition: Security, Convenience And The User Experience

Most readers are probably aware of Apple’s big reveal last month of its next-generation iPhone, with one of the primary talking points being how facial recognition is replacing the fingerprint scanner for secure authentication. Regardless of the glitch that took place during the product demo, this …

UX Design