iPhone Trump criticises Apple’s encryption stance on Pensacola phones

President Donald Trump lashed out at Apple Inc on Tuesday, castigating the iPhone maker for what he said was its …

Encryption Encrypted app aims to boost anonymous sex crime reporting in India

Women in India will be able to anonymously report sexual abuse, seek medical or legal aid and create private journals …

WhatsApp Critical security flaw in WhatsApp allows manipulation of messages

Security researchers at Checkpoint have revealed the existence of a critical security flaw in messaging platform WhatsApp that allows anyone …

Threats US agencies batting for new legislation to enable encryption backdoors

Top federal officials in the United States are debating whether to introduce a new legislation to outlaw end-to-end encryption that …

News Passwords of G Suite enterprise users were stored in plain text since 2005

Google recently announced that an error in functionality in G Suite that allowed domain administrators to set and recover passwords …

Information Security What does an effective strategy for encryption entail?

Simon Keates, Business Development Director, EMEA at Thales eSecurity, highlights what the best approach for an effective encryption strategy is …

Threats Researchers uncover 180 vulnerabilities in 30 financial services apps

A widespread absence of application security controls and secure coding along with weak encryption standards have rendered a large number …

Threats Encryption backdoors will increase the risk of nation-state attacks

Nearly three in four IT security professionals believe that forcing organisations to create encryption backdoors to sensitive data could place …

Threats Real-time locations of 238,000 Family Locator app users exposed via unsecured server

Real-time locations of as many as 238,000 users of the Family Locator app were left exposed for external access after …

News Hacker behind €10 million IOTA cryptocurrency theft arrested in Oxford

A hacker suspected of being behind the theft of €10 million in IOTA cryptocurrency from 85 victims since January last …

Threats Widely-used PremiSys access control system features four zero-day vulnerabilities

The popular PremiSys access control system, which is used by Fortune 500 companies, universities, medical centres and government agencies to …

Threats Employees didn’t enjoy access to customers’ private videos, Ring clarifies

Ring, the small doorbell-maker that Amazon acquired last year, gave several employees unrestricted access to videos recorded by customers and …