search slide
search slide
pages bottom
Currently Browsing: Results for Tag "encryption"

Could the Bitcoin blockchain one day run your entire city?

Could the Bitcoin blockchain one day run your entire city? The smart city is not a pipe dream, but it is a big, intimidating problem.At this point, it seems more likely that personal objections to the invasiveness of the programs will do more to block smart city functionality than technological barriers.

NIST report says we urgently need more work in post-quantum cryptography

NIST report says we urgently need more work in post-quantum cryptography The study of how to keep encrypting messages even in the face of exponentially increased computing power is called “post-quantum cryptography,” or “quantum-resistant cryptography,” and the reality is that nobody knows quite how urgent it really is.Perhaps real, programmable quantum computers will never be a reality — but perhaps they will, and if they will, we’d better be ready.

Hospital pays ransomware, but doesn’t get files decrypted

Hospital pays ransomware, but doesn’t get files decrypted Rather than unlock the hospital’s files, they asked for more money.It doesn’t matter if you’re a regular internet user or the IT guy at a hospital, a ransomware infection has the same consequences.

Samsung plans to add intrusive advertising to its smart TVs

Samsung plans to add intrusive advertising to its smart TVs As a result, it’s reportedly testing programs that would add new advertisements to the main menu bar of its higher-end televisions.When Samsung introduced advertising in 2012, the ads were only shown if the user first clicked the apps button.

Apple opens iPhone kernel to improve performance without reducing security

For the last few years, Apple has made security and privacy cornerstones of its iOS development process.That outcome may have been partly behind Cupertino’s recent decision to open part of its iOS operating system.

Computer coughs up passwords, encryption keys through its cooling fans

Computer coughs up passwords, encryption keys through its cooling fans (The term pre-dates wireless internet, and a Wi-Fi-connected computer is not air-gapped, despite the literal gap of air around it.) So how do you hack your way into an air-gapped computer?

Facebook Messenger getting end-to-end encryption via Secret Conversations feature

Facebook Messenger getting end-to-end encryption via Secret Conversations feature According to an announcement posted on Facebook’s Newsroom blog, the company soon plans to begin rolling out a version of end-to-end encryption for its Messenger app and service.During the roll out, Facebook will be testing out its ability to foster one-to-one Secret Conversations within in Messenger while keeping the singular chats encrypted and only viewable by the parties involved.

Google is testing a Chrome browser that adds post-quantum encryption

Google is testing a Chrome browser that adds post-quantum encryption So, we need a new algorithms for key exchange, or a new way of getting around the requirement for key exchange.Enter, post-quantum cryptography and, in the case of this new experiment from Google, a software solution called CECPQ1.

iOS 10 & MaS Sierra abandon PPTP VPN; focus on better encryption

iOS 10 & MaS Sierra abandon PPTP VPN; focus on better encryption It seems that iOS 10 and macOS Sierra users may have trouble using PPTP VPNs, after it was discovered that the new systems no longer support older security protocols.The company says that although PPTP was originally one of the first security protocols, it's now considered weak and not recommended.

Microsoft: Saying goodbye to passwords and saying 'Hello' to better encryption

Microsoft: Saying goodbye to passwords and saying 'Hello' to better encryption Molly Dalton, has a very specific role at Microsoft: She and her team are working to say goodbye to traditional passwords and 'hello' to Windows Hello.And Dalton says there are much better ways to do things now.

In bid to achieve quantum encryption, China set to finish 2,000-kilometer 'quantum link'

In bid to achieve quantum encryption, China set to finish 2,000-kilometer 'quantum link' Now, China is nearing completion of another major facet in its push for a quantum phone at the capital building: a 2,000-kilometer fiber-optic line for ferrying quantum encryption keys.It’s the beginning of China’s roll-out of true quantum encryption technology.

New ransomware offers to restore your files for free - if you infect two friends

New ransomware offers to restore your files for free - if you infect two friends These pieces of malware encrypt your files and won’t unlock them unless you pay, but the new “Popcorn Time” ransomware offers an alternative: Just infect some friends and you get your files back free.If you can get two other people to install that file — thus encrypting their files — and pay the ransom, you get your files decrypted for free.

​Can you ever be truly anonymous online?

​Can you ever be truly anonymous online? That’s the word of NordVPN, who is offering some advice on how to enhance anonymity online.However, NordVPN says using cryptocurrency can help users stay anonymous to some extent.

This article about WhatsApp made security experts furious

This article about WhatsApp made security experts furious Last week, The Guardian published a bombshell "exclusive" report claiming to reveal disturbing information about a "backdoor" into WhatsApp's encrypted messaging platform.The article was met with near-immediate backlash from information security experts and cryptologists, who took to Twitter to voice their complaints.

Symantec caught once again improperly issuing illegitimate HTTPS certificates

Symantec caught once again improperly issuing illegitimate HTTPS certificates Roughly 16 months ago, Symantec was caught distributing improperly signed cryptographic certificates that could be used to break HTTPS protection and put users’ at risk.Now, the company has been caught once again doing something similar — even though such activity is directly against the agreements it made when caught breaking things last time.

Keep your texts private in Trump's America (and everywhere else, too)

Keep your texts private in Trump's America (and everywhere else, too) After Trump's election, there was a surge in downloads for Signal, a private messenger that works on smartphones.Sure, but I have yet to see one as proven and accepted in the infosec community as Signal," he added.

Jeff Sessions, Trump's pick for attorney general, will likely renew fight against strong encryption

Jeff Sessions, Trump's pick for attorney general, will likely renew fight against strong encryption But Apple’s staunch defense and widespread dissent in the court of public opinion led the bureau to back down.Jeff Sessions (R-AL), President Trump’s choice for attorney general, is unlikely to let that decision stand once he is confirmed — and he’s expected to be confirmed with strong Republican support.

Why isn't Trump using the self-destructing phone Obama had all the time?

Why isn't Trump using the self-destructing phone Obama had all the time? Over the past few days, some of the biggest questions about our national cybersecurity have centered on one device: President Donald Trump's phone.Shortly after he reportedly traded in his main Twitter machine, an old-model, unsecured Android phone, for a "secure, encrypted device approved by the Secret Service," the famously tech averse executive appeared to still be using the unsecured device.

Signal, Snowden's favorite private messenger, is testing a video call feature

Signal, Snowden's favorite private messenger, is testing a video call feature A beta version of the secure messaging platform is now available on Google Play, which includes an additional toggle for "video calling beta" when you go into settings.Any messages you send will be scrambled and can only be "unscrambled" by the intended recipient.