The present state of Internet security is inadequate to handle the threat posed by future quantum computers that are expected to be far more powerful than today’s conventional systems. This means that the digital systems we have come to rely on for online banking, ecommerce, healthcare, email and other applications may one day be rendered […]
The cloud has become a popular way to store huge amounts of data, giving you the ability to conveniently upload and access your files, sync them across your devices, and share them with others. Often, however, this convenience comes at the expense of your security and privacy. As it turns out, cloud storage providers can […]
The U.S. government is again trying to convince tech firms against using end-to-end encryption to keep user communications private and out of the prying eyes of law enforcement. The Department of Justice asserted during a recent “Lawful Access Summit,” that law enforcement must be able to view all conversations on all messaging platforms so it […]
When browsing the web you have probably noticed that many sites have a padlock next to the browser’s address bar. This indicates that the website has been issued a security certificate. If you click on the padlock, you can verify that the website connection is secure and view the source of the certificate. You might […]
The Senate Judiciary Committee is conducting hearings on a bill that would strong arm companies that use encryption into altering their technologies to make them “subpoena compatible.” Under the proposed legislation – Eliminating Abusive and Rampant Neglect of Interactive Technologies (EARN IT) – Internet technology companies would be forced to hand over user information upon […]
As the country finds new ways of communicating during the COVID-19 pandemic, many people have turned to online conferencing platforms like Zoom to stay in touch with family and friends, as well as colleagues at remote work locations, while sheltering in place. Zoom Bombing Zoom claims 200 million daily users worldwide, but according to the […]
In the aftermath of every terrorist attack or high-profile cybercrime, it is usually revealed by security professionals through the media that the terrorists or criminals used encrypted communications, enabling them to plan and coordinate their activities without raising suspicion among the intelligence and law enforcement communities.