encryption

Encryption Ban: U.S., UK, Australia Try to Change How Math Works (Again)

Governments are yet again attacking end-to-end encryption. As if passing new laws somehow stops criminals breaking existing ones ...
Security Boulevard
When Privacy is Missing From Security

When Privacy is Missing From Security

This summer, Governor Ricardo Rossello was forced to resign after a massive information leak from a messaging application he had been using exposed various levels of corruption and other embarrassing details. Earlier ...

End-to-End Encryption with Max Krohn from Keybase.io

You’re listening to the Shared Security Podcast, exploring the trust you put in people, apps, and technology…with your host, Tom Eston. In episode 86 for September 16th 2019: All about end-to-end encryption ...

The Only Way to Truly Protect Data in the Cloud: End-To-End Encryption

In May of this year, it was reported that a misconfiguration in an Amazon S3 bucket allowed the Magecart cartel to compromise over 17,000 domains. This attack was but one example of ...
Encrypted Email for Securing the Enterprise

Email encryption and protecting executive communications

Verizon’s recent Data Breach Investigations Report (DBIR) notes that company executives are six times more likely than regular employees to be targets of a social engineering attack. Social engineering is often the ...
Encrypted Email for Securing the Enterprise

Cloud Services Are Vulnerable Without End-To-End Encryption

The growth of cloud services has been one of the most disruptive phenomena of the Internet era. However, even the most popular cloud services (including Yahoo, Gmail, Microsoft Outlook 365, and Dropbox) ...
Five Things You Should Know About the WhatsApp Hack

Five Things You Should Know About the WhatsApp Hack

The recent WhatsApp™ hack is pretty alarming: all the hackers had to do was drop a missed encrypted WhatsApp call to their target and—boom—spyware was installed. The hack didn’t require the user ...
What are public and private key pairs and how do they work

What are public and private key pairs and how do they work

Public and private key pairs lie at the core of how we do encryption here at PreVeil. They are the basis for the end-to-end encryption we use as well as asymmetric cryptography ...

Facebook’s adoption of end-to-end encryption has changed the world.

Written by PreVeil founders Sanjeev Verma and Randy Battat Last week, Facebook CEO Mark Zuckerberg wrote a blog that changed the world. His 3200-word missive announced that Facebook will pivot its messaging ...
Facebook to Merge WhatsApp, Instagram, Facebook Messenger by 2020

Facebook to Merge WhatsApp, Instagram, Facebook Messenger by 2020

Looking to gain more control over the company’s communication platforms and prevent users from switching to competitors, Facebook CEO Mark Zuckerberg will merge WhatsApp, Instagram and Facebook Messenger, writes The New York ...
Loading...