encryption
-
Blog
Google adds end-to-end email encryption to Gmail
Restricted view allows for more control By default, Gmail users won’t have to go through this restricted Gmail experience, and emails will automatically decrypt when they arrive in their inbox if they are the intended recipients. However, administrators can choose to enforce the restricted Gmail view for everyone, including Gmail users, to ensure sensitive communications are not downloaded locally on…
Read More » -
Blog
Google’s Present to Enterprise Gmail Users: End-to-End Encryption
Image: Google All enterprise users of Gmail can now easily apply end-to-end encryption to their emails. Prior to today, this was a luxury reserved for big businesses with significant IT resources, but Google recognises that email attacks are on the rise across the board. Starting today, Gmail users can send end-to-end encrypted emails to others within their organisation; in the…
Read More » -
Blog
Google rolls out easy end-to-end encryption for Gmail business users
Google has started rolling out a new end-to-end encryption (E2EE) model for Gmail enterprise users, making it easier to send encrypted emails to any recipient. While businesses also have the option to configure the Secure/Multipurpose Internet Mail Extensions (S/MIME) protocol to send digitally signed and encrypted messages, this requires significant resources, including deploying certificates to all users and exchanging them…
Read More » -
Blog
Signal threatens to leave France if encryption backdoor required – Computerworld
The underlying issue here is not limited to government encryption backdoors. If either side of an encrypted conversation is intercepted, the same problem occurs. The Ukrainian military, for example, is now fighting an aggressive phishing campaign that plants malware, oftentimes a keylogger, that bypasses the encryption even more effectively than would a backdoor. Endpoint interception has also turned around and…
Read More » -
Blog
Get started on post-quantum encryption, organizations warned
The UK’s national cybersecurity agency is urging companies to begin preparing themselves for quantum threats by 2035. The National Cyber Security Centre (NCSC) has laid out a recommended timeline for transition to quantum-resistant encryption methods, and is strongly encouraging the adoption of post-quantum cryptography (PQC) in the next ten years. “Quantum computing is set to revolutionize technology, but it also…
Read More » -
Blog
What is AES-256 encryption? | Tom’s Guide
You may have seen some VPN providers boasting about using AES-256 encryption, but it’s not immediately apparent what this means or how it helps keep your data safe. Essentially, VPNs use encryption to make sure that third parties can’t read your internet traffic while it’s travelling between your computer and whatever online service you’re accessing. AES-256 is one of the…
Read More » -
Blog
Millions of RSA encryption keys could be vulnerable to attack
Millions of RSA encryption keys contain major flaws, making them vulnerable to attack, according to new research. Analysis from Keyfactor found around 1 in 172 of all certificates found online are susceptible to compromise through a mathematical attack, equating to potentially millions of keys. The vulnerability mainly affects Internet of Things (IoT) devices, but is a risk for any system…
Read More » -
Blog
Apple Fights UK Over Encryption Backdoors as US Officials Warn of Privacy Violations
Image: garloon/Envato Images Senior officials from the U.K. have privately met with their U.S. counterparts to clarify that their request for access to encrypted data in Apple’s iCloud is not a blanket demand; instead, they are seeking access solely to data linked to individuals already involved in crimes such as terrorism, according to Bloomberg. People familiar with the matter told…
Read More » -
Blog
Apple appeals UK encryption backdoor demand – Computerworld
Let’s say that Apple lets the order stand and simply opts out of the UK market, which is essentially what it has already done, he said. That could encourage other governments, especially those in France, Australia, and Canada, to try the same tactic. “If that happens, then the [UK] government has set a precedent,” Chagnon said. But if Apple succeeds…
Read More » -
Blog
Privacy tech firms warn France’s encryption and VPN laws threaten privacy
Privacy-focused email provider Tuta (previously Tutanota) and the VPN Trust Initiative (VTI) are raising concerns over proposed laws in France set to backdoor encrypted messaging systems and restrict internet access. The first case concerns a proposed amendment to France’s “Narcotrafic” law, which would compel providers of encrypted communication services to implement backdoors, enabling law enforcement to access decrypted messages of suspected…
Read More »