encryption
Beware of Starbucks Phishing Scam and China using Quantum tech to break encryption
Starbucks Coffee Lovers Box Phishing Scam Alert Starbucks is making headlines due to a phishing scam targeting its customers with a promise of a free “Coffee Lovers Box.” However, this offer is entirely fraudulent. According to an update from Action Fraud, this ongoing scam has already victimized over 900 individuals, and that number continues to […]
Is Telegram safer than WhatsApp when it comes to Data Security
These days, online users are increasingly seeking messaging applications that provide end-to-end encryption, allowing them to communicate without the prying eyes of governments and other interested parties. This feature has become a significant selling point for major companies like WhatsApp, Signal, and Telegram. WhatsApp, owned by Meta (formerly Facebook), proudly offers end-to-end encryption by default […]
Symmetric vs. Asymmetric Encryption in the Cloud: Choosing the Right Approach
Asymmetric and symmetric encryptions are the modes of encryption typically used in cryptography. There is a single key involved with symmetric encryption used both for encryption and decryption. The key needs to be shared among the parties who are involved who wish to encrypt or decrypt data. Asymmetric encryption uses two separate keys related to […]
Facebook end to end encryption a Boon or a Bane
Meta, encompassing Facebook and its subsidiaries, has staunchly advocated the end-to-end encryption safeguarding its messaging platforms, assuring users of protection against government surveillance, individual snooping, or corporate intrusion. However, the allure of highly encrypted messaging services can inadvertently provide sanctuary for criminal activities, thriving under the guise of anonymity these platforms offer. Graeme Biggar, leading […]
Unraveling the Differences: Hashing, Salting, and Encryption Explained
In the realm of cybersecurity, understanding the nuances between hashing, salting, and encryption is crucial for safeguarding sensitive data. Each method serves a distinct purpose in protecting information, and grasping their disparities is essential for implementing robust security measures. Hashing: The Digital Fingerprint Hashing is a one-way process that transforms input data into a fixed-size […]
Sensitive data loss is due to lack of encryption
In an era where data is the lifeblood of businesses, safeguarding sensitive information has become paramount. Cybersecurity lapses have historically been a cause of data breaches, but a recent study sheds light on a new dimension of vulnerability – the lack of encryption. The Operationalizing Encryption and Key Management study, conducted by Fortanix Inc., reveals […]
Biden administration passes bill against Quantum Computing Data Breaches
Joe Biden and his administration seems be on a forward thinking gear for quantum technology linked cyber attacks leading to data breaches. On December 21st,2022, the Senate passed a bipartisan bill to prevent data breaches emerging from quantum computing. The Quantum Computing Cybersecurity Preparedness Act was made into a legislation that prevents usage of quantum […]
WhatsApp starts offering password enabled encryption to user backups
From now on, all WhatsApp backups will be protected by a password enabled encryption method offering an extra layer of security protection to users from spying eyes. The Facebook giant’s subsidiary has notified to all its global iOS and Android users that it will provide a 64 digit key to secure the messages stored on […]
Bitglass API Gateway Encryption
This post was originally published by Juan Lugo. Enterprises are adopting infrastructure as a service (IaaS) en masse in pursuit of enhanced flexibility, productivity, and cost savings. These platforms allow organizations to upload and download data via custom applications, machines, scripts, and other automated processes. This simplifies and automates certain business processes; however, it can lead to security […]
YES! Encrypted Traffic Can (and Must) Be Classified
Encryption Trends Why is Traffic Encryption on the Rise? Everywhere you look, the use of encryption is rising: on the Internet, in public and private Clouds, within enterprises, and across personal devices. One driver of this trend is the global demand for better protection of personal privacy on the Internet. It is a demand […]