CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Encryption
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Encryption

Man holding Samsung phone with virtual lock showing encryption
Cyber SecurityNews

100 Million Samsung Phones Shipped With Flawed Encryption; Galaxy S8 to S21 Series Cryptographic Keys “Trivial” To Expose

March 2, 2022
Encryption vulnerability renders Samsung phones in the Galaxy line from 2017 to 2021 completely insecure, at least until they are updated to security patches from July 2021 and beyond.
Read More
Man with fingers pointing at mail icons showing ProtonMail reveal of IP logs
Data PrivacyNews

Request From French Police Compelled ProtonMail to Reveal IP Logs

September 23, 2021
ProtonMail has built its reputation in no small part because of its pledge to not keep user IP logs except in "extreme criminal cases." A recent case indicates that the circumstances may not need to be all that extreme.
Read More
Finger touch smartphone screen with lock showing end-to-end encryption for chat backups
Data PrivacyNews

WhatsApp Adds Additional Layer of Security With End-to-End Encryption for Chat Backups

September 22, 2021
WhatsApp will soon roll out end-to-end encryption for chat backups, shutting down a favorite loophole exploited by law enforcement agencies, and giving WhatsApp an edge of market appeal.
Read More
Man holding mobile smartphone showing data transfer to the cloud with encryption
Cyber SecurityInsights

Both Sides Now – An Insider’s View of Privacy Protection in the Cloud

May 27, 2021
They key to having a safe working environment is maintaining control over the data. Hardware based secure enclaves, including those inside CPUs, have become a rising trend for encryption on the cloud.
Read More
Padlock icon on LED computer display screen with binary code moving in the background showing need for encryption beyond password
Cyber SecurityInsights

More Than Strong Passwords, Companies Need Next-Level Encryption

May 6, 2021
Weak and compromised passwords are responsible for about 80% of hacking-related breaches. Today, there are more encryption options available to stop bad actors in their tracks.
Read More
Relaxed man sitting in an autonomous car showing increasing importance of security
Cyber SecurityInsights

Fully Autonomous Cars Are Moving Forward Fast, So Are Efforts To Secure Them

November 19, 2020
Today there's a big difference between safety and security. But in the coming era of autonomous vehicles, there will be no difference between the two as electronic security becomes more important.
Read More
Panoramic night view of the Moscow Kremlin showing blocking of encrypted email providers
Tech

Russia Blocks Encrypted Email Providers, Issues Ultimatums on Facebook And Twitter

February 26, 2020
Several encrypted email providers including ProtonMail and Tutanota have come under government restrictions as part of Kremlin's crackdown on encrypted communication.
Read More
Engineer working on hardware chip on motherboard showing Crypto AG using encryption backdoor on cryptographic equipment for CIA to spy on foreign affairs
Data PrivacyNews

Crypto AG Shows That U.S. Concern Over Huawei Encryption Backdoors Comes From Long Experience Doing the Same Thing

February 25, 2020
For decades, U.S.-controlled Crypto AG helped the CIA spy on governments around the world by inserting encryption backdoor in cryptographic equipment.
Read More
iPhone 8 with lock screen on table showing Apple refusal to provide iPhone backdoor for FBI
Data PrivacyNews

The Apple vs. Dept. of Justice Battle Rages On; Company Refuses New Request for an iPhone Backdoor

January 27, 2020
The contentious ongoing battle between Apple and the Department of Justice continues, as the company has refused yet another request for an iPhone backdoor.
Read More
Image of digital padlock questioning the need for encryption backdoors with the use of surveillance technology
Data PrivacyInsights

With New Surveillance Technology, Are Encryption Backdoors Still Needed?

November 18, 2019
With the use of surveillance technology by law enforcement to target suspected criminals and terrorists, is the argument for encryption backdoors still valid?
Read More
Load More

Latest

Police car with roof mounted strobe lightbar showing law enforcement data breach

Data Breach on DEA Law Enforcement System Grants Cyber Criminals Access to 16 Databases

VPN logo on smartphone lying on laptop showing VPN providers to hand over customer data

VPN Providers Ordered by Indian Government To Hold All Customer Data for Five Years, Hand Over to Government Upon Request

National Stadium and residential buildings with mountains in the background in San Jose, Costa Rica showing Conti ransomware

Could a Cyber Attack Overthrow a Government? Conti Ransomware Group Now Threatening To Topple Costa Rican Government if Ransom Not Paid

USA map on digital display showing privacy regulations

Data Privacy Conundrum: When Different States Play by Different Rules. . .

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results