Apple end-to-end encryption far from bulletproof
Apple won't provide experts with details of encryption architecture, so what it means by 'cannot decrypt"' data is unclear, expert says
View ArticleHold the phone: iMessage spam not all it's cracked up to be
Is Apple's iMessage the new favorite tool of spammers worldwide? A widely-quoted recent article written by Wired's Robert McMillan suggests it is, even going so far as to claim that iMessage "is being...
View ArticleWhen it comes to security, who can you trust?
In previous columns, I've explained the chain of trust and the weak links in various methods of security. But reader Duane asked a few days ago, regarding my column on using VPNs to protect coffeeshop...
View ArticleApple adds two-step verification to iMessage and FaceTime
Apple has now enabled two-step verification for FaceTime and iMessage, making it harder for hackers to compromise accounts if they've learned a user's password.
View ArticlePrivate I: Encrypting email with public keys
In recent weeks, I've written about protecting data stored locally on a hard drive, against both people with physical access and potential remote attacks. But your data is much more vulnerable in...
View ArticleWhatsApp switches on end-to-end encryption for all messages
Facebook’s WhatsApp has completed the roll out of end-to-end encryption for the messaging app to protect all content transmitted between contacts.
View ArticleApple end-to-end encryption far from bulletproof
Apple won't provide experts with details of encryption architecture, so what it means by 'cannot decrypt"' data is unclear, expert says
View ArticleHold the phone: iMessage spam not all it's cracked up to be
Is Apple's iMessage the new favorite tool of spammers worldwide? A widely-quoted recent article written by Wired's Robert McMillan suggests it is, even going so far as to claim that iMessage "is being...
View ArticleWhen it comes to security, who can you trust?
In previous columns, I've explained the chain of trust and the weak links in various methods of security. But reader Duane asked a few days ago, regarding my column on using VPNs to protect coffeeshop...
View ArticleApple adds two-step verification to iMessage and FaceTime
Apple has now enabled two-step verification for FaceTime and iMessage, making it harder for hackers to compromise accounts if they've learned a user's password.
View ArticlePrivate I: Encrypting email with public keys
In recent weeks, I've written about protecting data stored locally on a hard drive, against both people with physical access and potential remote attacks. But your data is much more vulnerable in...
View ArticleWhatsApp switches on end-to-end encryption for all messages
Facebook’s WhatsApp has completed the roll out of end-to-end encryption for the messaging app to protect all content transmitted between contacts.
View ArticleThe week in security: Encryption law could cripple Australia’s security exports
A new report into the controversial ‘Encryption Bill’ has warned that it could damage Australia’s security industry for many years to come, pushing innovators offshore and crippling Australia’s export...
View Article
More Pages to Explore .....