5 Ways to Make Your Instant Messaging More Secure

5 Ways to Make Your Instant Messaging More Secure

    25 Jun 2023

The actual number of chat messages sent each day is hard to come by, but with WhatsApp alone accounting for billions of users, you can imagine the sheer volume of ongoing conversations. Not all of those messages involve anything particularly sensitive or private, but a lot of them do—and you don’t want those chats to

Apple Expands Its On-Device Nudity Detection to Combat CSAM

Apple Expands Its On-Device Nudity Detection to Combat CSAM

    05 Jun 2023

In December, Apple announced that it was killing a controversial iCloud photo-scanning tool the company had devised to combat child sexual abuse material (CSAM) in what it said was a privacy-preserving way. Apple then said that its anti-CSAM efforts would instead center around its “Communication Safety” features for children, initially announced in August 2021. And

The U.S., U.K. and Germany rank top in ransomware attacks

The U.S., U.K. and Germany rank top in ransomware attacks

    27 Apr 2023

The U.S., U.K. and Germany rank top in ransomware attacks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use

How to Encrypt any File, Folder, or Drive on Your System

How to Encrypt any File, Folder, or Drive on Your System

    23 Jan 2023

Encrypting files, folders, and drives on your computer means that no one else can make sense of the data they contain without a particular decryption key—which in most cases is a password known only to you.  So while someone could get at your files if they know your password (the decryption key), they won’t be

LastPass breach affects Virginia Tech security posture

LastPass breach affects Virginia Tech security posture

    16 Jan 2023

LastPass breach affects Virginia Tech security posture | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you

The difference hardware encryption makes

The difference hardware encryption makes

    27 Dec 2022

The difference hardware encryption makes | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to

Apple to encrypt iCloud backups to boost security & privacy

Apple to encrypt iCloud backups to boost security & privacy

    08 Dec 2022

Apple to encrypt iCloud backups to boost security & privacy | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use

How to Use Passkeys in Google Chrome and Android

How to Use Passkeys in Google Chrome and Android

    17 Oct 2022

These passkeys use public-key cryptography, so if they’re involved in a data breach, they’re useless to bad actors without your face or your fingerprint. Similarly, if your laptop or phone gets stolen, your accounts can’t be accessed because you’re not going to be around to provide the necessary authentication. This isn’t just a Google initiative.

Period-Tracking Apps, Ranked by Data Privacy: Flo, Clue, Stardust, Period Calendar, Period Tracker

Period-Tracking Apps, Ranked by Data Privacy: Flo, Clue, Stardust, Period Calendar, Period Tracker

    20 Jul 2022

This not only shifts the burden of risk assessment to individual users, but also makes evaluating the privacy and security of apps difficult to begin with. To do so, we consulted evaluation frameworks pioneered by the Beth Israel Deaconess Medical Center (MIND) and The Digital Standard to arrive at four core questions to guide our

NIST reveals 4 quantum-resistant cryptographic algorithms to prevent future attacks

NIST reveals 4 quantum-resistant cryptographic algorithms to prevent future attacks

    11 Jul 2022

NIST reveals 4 quantum-resistant cryptographic algorithms to prevent future attacks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use