end-to-end encryption
Head of MI5 Calls on Tech Companies to Let Law Agencies Access Encrypted Messages
The UK’s domestic counter-intelligence and security agency, MI5, and Sir Andrew Parker, the general director, are pressing companies that provide end-to-end encryption for their messaging apps to offer law enforcement a way ...
Defending the Perimeter Isn’t Enough on Election Hacking
The following article by PreVeil board member Admiral James Stavridis originally appeared in Bloomberg: The U.S. is now just a year from the 2020 presidential election. In 2016, we saw foreign interests ...
End-to-End Encryption: The Good, the Bad and the Politics
Here’s what you need to know about the debate over end-to-end encryption It’s that time of the year when we grab our popcorn and witness another chapter in the age-old... The post ...
Encryption Ban: U.S., UK, Australia Try to Change How Math Works (Again)
Governments are yet again attacking end-to-end encryption. As if passing new laws somehow stops criminals breaking existing ones ...
When Privacy is Missing From Security
This summer, Governor Ricardo Rossello was forced to resign after a massive information leak from a messaging application he had been using exposed various levels of corruption and other embarrassing details. Earlier ...
End-to-End Encryption with Max Krohn from Keybase.io
You’re listening to the Shared Security Podcast, exploring the trust you put in people, apps, and technology…with your host, Tom Eston. In episode 86 for September 16th 2019: All about end-to-end encryption ...
The Only Way to Truly Protect Data in the Cloud: End-To-End Encryption
In May of this year, it was reported that a misconfiguration in an Amazon S3 bucket allowed the Magecart cartel to compromise over 17,000 domains. This attack was but one example of ...
Email encryption and protecting executive communications
Verizon’s recent Data Breach Investigations Report (DBIR) notes that company executives are six times more likely than regular employees to be targets of a social engineering attack. Social engineering is often the ...
Cloud Services Are Vulnerable Without End-To-End Encryption
The growth of cloud services has been one of the most disruptive phenomena of the Internet era. However, even the most popular cloud services (including Yahoo, Gmail, Microsoft Outlook 365, and Dropbox) ...
Five Things You Should Know About the WhatsApp Hack
The recent WhatsApp™ hack is pretty alarming: all the hackers had to do was drop a missed encrypted WhatsApp call to their target and—boom—spyware was installed. The hack didn’t require the user ...
