Articles about Encryption

Apple can't give real time iMessage data to the FBI because texts are encrypted

black_white_apple_logo

Despite a court order instructing the company to hand over text conversations between iMessage accounts to the FBI, Apple says that its own encryption system means it cannot do so. The Justice Department obtained a court order that required Apple to provide real time access to text messages sent between suspects in an investigation involving guns and drugs.

Apple has responded by saying that the fact iMessage is encrypted means that it is simply not able to comply with the order. The stand-off between the US government and Apple could last for some time as neither side is willing -- or possibly able -- to back down.

Continue reading

NSA wants to future-proof encryption standards against quantum computers

nsa_gchq

The NSA is concerned that current methods of cryptography, used to encrypt data and ensure that if it does fall into the wrong hands it’s not readable or usable, are going to be woefully inadequate and easily broken when quantum computers come into play.

Of course, this isn’t going to be something that happens in the near future, as quantum computers -- which instead of bits, use qubits that can hold three states instead of the usual binary 0 or 1 -- are still merely conceptual in nature, and won’t be fully realized for many decades yet.

Continue reading

84 percent of enterprises have considered encrypting all sensitive data

Encryption

Security professionals are naturally concerned with protecting sensitive data within their organization and elsewhere, particularly given the increasing numbers of threats.

A new survey of more than 100 information security professionals by data security specialist Vormetric and risk management research organization IANS reveals that 84 percent of respondents had considered a security strategy of encrypting all their sensitive data.

Continue reading

Security is weakened because random numbers are not random enough

random_numbers

A lot of security systems are based on random numbers, prime numbers, or a combination of the two. But generating random numbers is not as random as you might expect -- or hope -- and it relies on sources of broadly random data that can be used as a starting point. The problem is that these sources of data are not large enough.

The entropy of data generated by Linux servers -- which are the backbone of much of the internet -- is, says security expert Bruce Potter, too low. Speaking at Black Hat USA 2015 -- an event which has already seen the unveiling of the Thunderstrike 2 firmware malware and the Stagefright-beating Certifi-Gate Android vulnerability -- Potter warns that the low entropy problem means that seemingly random numbers could in fact be easier to guess or crack than first thought.

Continue reading

Silent Circle's ultra-secure Blackphone 2 joins Google's Android for Work program

silent_circle_logo

The security of mobile communications is of paramount importance to many people, but it is particularly high on the list of priorities for business and enterprise customers. Silent Circle is a company that caters to those concerned with privacy and security, billing its work as the 'world's first enterprise privacy platform'.

The company's original Blackphone generated some interest, and earlier in the year we learned about the follow-up -- the Blackphone 2. Kitted out with a customized version of Android, the security-focused handset is the latest addition to Android for Work, Google's own security-focused program.

Continue reading

VeriFyle reveals Cellucrypt, a new multi-layer encryption key management technology

encryption_padlock

VeriFyle, the company headed by Hotmail inventor and co-founder Jack Smith, has a new encryption key management technology which it believes will "re-invent how the world thinks about secure sharing and messaging". The major difference is that any object that is shared to the cloud using the system is encrypted for individual users rather than in bulk.

Cellucrypt offers such a high level of security that VeriFyle believes that it "makes illicit bulk-access to customer data virtually impossible." It's a bold claim, but Cellucrypt builds on the traditional public-key system with the addition of password-derived keys.

Continue reading

Banning encrypted messaging apps is a stupid idea

Messaging service smartphone WhatsApp

In light of the recent news that the UK government is pushing harder for a legislation which would allow it to monitor all digital communications, and ban those apps that use encryption, a huge debate has sparked on whether the government should be allowed to do this or not.

Professor of Law at the London School of Economics, Andrew Murray, has had his say on the matter in a Huffington Post article, arguing that banning communications apps to curb the work of terrorist groups would be similar to banning cars in order to stop terrorists from using them.

Continue reading

Hacking Team to conjure up new surveillance software after security breach

hacking_team_hacked

Following a massive security breach, Italian security firm Hacking Team warned that its government-strength surveillance tools could have fallen into the hands of terrorists. The company advised its customers -- including governments and law agencies around the world -- to stop using its software, and is now launching something of a damage-limitation exercise.

Hacking Team has released a statement indicating that far from giving up and admitting defeat, a new, more powerful version of its software will be released soon. The replacement for Galileo, called Remote Control System 10, is described as a "complete revision" of the old system and "not simply an update". The security firm also stresses that not all of its source code was compromised, only code which is considered obsolete.

Continue reading

No shit! Experts say backdoors and encryption limits are security risks

bunch_of_keys

Adding backdoors so governments can access data is a "major security risk". This is the (perhaps slightly obvious) conclusion of security experts and cryptographers writing in a report entitled Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications.

The report from the Massachusetts Institute of Technology’s Computer Science and Artificial Intelligence Lab criticizes plans to allow law enforcement agencies unfettered access to encrypted data through the use of either front doors or backdoors. More importantly it poses the question: "if we want to maintain the security of user information, is this sort of access even technically possible?"

Continue reading

Hacking Team hacked as tables turn on notorious surveillance company

hacking_team_hacked

Italian security and surveillance firm Hacking Team appears to have itself fallen victim to a security breach. Hacking Team produces software which is used by governments around the world as part of their surveillance programs. The company has been criticized for facilitating invasions of privacy, and, over the weekend, its Twitter feed was taken over, resulting in its name and profile picture being changed to read Hacked Team.

But this is far from being the end of the story. Whoever is responsible for the security breach also released a torrent file that provides access to 400GB of company data. Included in the cache are emails, source code, and confidential documents. The files reveal who the company has been dealing with including a number of countries known for their oppressive regimes.

Continue reading

Washington Post implements encryption to protect site visitors

washington_post_magnifying_glass

Heightened awareness about online security means that more and more websites are using encryption to boost privacy and security. A few weeks after Wikimedia announced it was using HTTPS to encrypt traffic to its site, The Washington Post has followed suit.

It's a move designed to stop snooping on readers' browsing habits. The news outlet explains that it will make it "more difficult for hackers, government agencies and others to track the reading habits". For those concerned about privacy, this will come a good news, but there's a catch; encryption does not apply to the entire site.

Continue reading

How to encrypt your emails

cloud encryption

If there’s one thing that Edward Snowden left us with, it’s the notion that our digital data isn’t all that safe and that the government knows what we did last summer. But in essence, that only applies to that data being created and used using standard tools -- emails, browsers, etc.

However, if you really want to keep your data private, including browsing history and email, there are ways to do it. They’re simple to use, accessible and close to impossible to crack.

Continue reading

Microsoft will encrypt all Bing search traffic

lulz

In a post-Edward Snowden world, privacy and security are huge concerns. While many people call him a traitor to his country, many others -- myself included -- consider him a hero. Snowden shone a light on government programs that were arguably illegal and unconstitutional. The ultimate win from his actions is that people that were ignorant to privacy issues before, are now interested in them. He planted a seed of curiosity and concern.

As a result of this new interest in privacy, many companies have been reacting to show customers that they are safe and secure. One of the most vocal of these companies is Microsoft. Today, the company announces that it will soon start encrypting all Bing web searches. Whoa. This is huge.

Continue reading

Snowden files hacked by China and Russia

snowden

UK secret services say that the encrypted files Edward Snowden held from his time working at the NSA have been accessed by intelligence agencies in China and Russia. The Sunday Times reports that the top secret files have been hacked meaning that British and American spies could be identified and located.

Wanted by US authorities, Snowden has been in hiding for some time now. It is believed that the time he spent seeking refuge in Hong Kong and Moscow may have given security official the opportunity to access the data he held. Although the data was protected, it is thought that the encryption was hacked, and US and UK intelligence services have been "forced to intervene and lift their agents from operations to prevent them from being identified and killed".

Continue reading

Wikimedia secures connections with HTTPS encryption by default

wikipedia

There is a movement calling for the encryption of all web traffic. The cause of this could be laid at Edward Snowden's door, but there's no getting away from the fact that in recent years there is an increased interest in security and privacy. To this end, Wikimedia has announced that it is now using HTTPS to encrypt all of its traffic -- including that to Wikipedia.

We've already seen the US government embrace HTTPS, and companies like Google and Facebook are making it easier to control privacy settings. Apple has hit out at companies that fail to do enough to protect users' privacy, and Wiki media is taking the extra step of also implementing HSTS, just days after Microsoft announced that this would be supported by Internet Explorer 11 under Windows 7 and 8.1.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.