encryption

Defence Controls Could Criminalise Teaching Encryption

Encryption, the word has been used a lot recently in news reports and in virus attacks, It is a technology…

10 years ago

Logjam Can Hijack Your HTTPS Connections

There are a lot of techniques involving malware, trojans or other sort of attacks, but this one seems to affect…

10 years ago

Metadata Spying Not Covered by the Patriot Act

Edward Snowden. A name that is known in most households, the guy that blew the whistle on the giant listening…

10 years ago

Netflix Soon to Secure Video Streams via HTTPS

The video streaming giant, Netflix will soon be using the HTTPS protocol to encrypt its customer streams. A great plan that…

10 years ago

Firefox 37 to Encrypt Non-HTTPS Traffic

Mozilla is making great strides towards making user experience as secure as possible, and with the release of Firefox 37…

10 years ago

Toshiba TransMemory EX II 64GB USB 3.0 Encrypted Flash Drive Review

Introduction Toshiba has a lot of experience in the storage area and it's a pleasure to take a closer look…

10 years ago

BlackPhone Maker Rakes in Its Target $50 Million in Funding

Silent Circle now owns the encrypted Android-based handset, BlackPhone, thanks to its crowdfunding success that brought the company the means…

10 years ago

Data Sharing between Major Video Game Companies and US Government Coming

In the wake of the recent hacks, President Obama is doing his best to increase data sharing between all major…

10 years ago

Apple’s Tim Cook Warns Obama That Sacrificing Privacy Will Have “dire consequences”

Tim Cook, CEO of Apple, has criticised US President Barrack Obama’s executive order for enhanced cybersecurity, saying the move will…

10 years ago

Toshiba Launches USB Flash Drive With Built-In Keypad Encryption

Toshiba has unveiled a new encrypted USB flash drive with a built-in keypad. The Toshiba Encrypted USB Flash Drive is…

10 years ago

Intel Announced 5th Gen Core vPro Processor Family Availability

Intel officially announced the availability of its 5th generation Intel Core vPro 14nm processor family that's designed for the rapidly…

10 years ago

Worried About Online Security? Then Here’s the Top 25 Passwords to Avoid

The easiest way for a hacker to gain access to another person’s online account is to crack a weak passwords,…

10 years ago

Twitter Reacts to David Cameron’s Encryption Ban Plan

On Monday, UK Prime Minister David Cameron announced plans to essentially ban end-to-end internet encryption and to grant British intelligence…

10 years ago

Kim Dotcom to Launch Secure Video Chat Service

Internet entrepreneur Kim Dotcom has announced plans to release an encrypted, in-browser video chat service through his Twitter account. The…

10 years ago

Data Sent Between Smartphones and Smartwatches Vulnerable to Hacking

Researchers from security firm Bitdefender have discovered that data sent between smartphones and smartwatches is susceptible to hacking. The transmission…

10 years ago