Quantcast
Channel: CSO Online - imessage RSS feed
Browsing all 13 articles
Browse latest View live

Apple end-to-end encryption far from bulletproof

Apple won't provide experts with details of encryption architecture, so what it means by 'cannot decrypt"' data is unclear, expert says

View Article



Hold the phone: iMessage spam not all it's cracked up to be

Is Apple's iMessage the new favorite tool of spammers worldwide? A widely-quoted recent article written by Wired's Robert McMillan suggests it is, even going so far as to claim that iMessage "is being...

View Article

When it comes to security, who can you trust?

In previous columns, I've explained the chain of trust and the weak links in various methods of security. But reader Duane asked a few days ago, regarding my column on using VPNs to protect coffeeshop...

View Article

Apple adds two-step verification to iMessage and FaceTime

Apple has now enabled two-step verification for FaceTime and iMessage, making it harder for hackers to compromise accounts if they've learned a user's password.

View Article

Private I: Encrypting email with public keys

In recent weeks, I've written about protecting data stored locally on a hard drive, against both people with physical access and potential remote attacks. But your data is much more vulnerable in...

View Article


WhatsApp switches on end-to-end encryption for all messages

Facebook’s WhatsApp has completed the roll out of end-to-end encryption for the messaging app to protect all content transmitted between contacts.

View Article

Apple end-to-end encryption far from bulletproof

Apple won't provide experts with details of encryption architecture, so what it means by 'cannot decrypt"' data is unclear, expert says

View Article

Hold the phone: iMessage spam not all it's cracked up to be

Is Apple's iMessage the new favorite tool of spammers worldwide? A widely-quoted recent article written by Wired's Robert McMillan suggests it is, even going so far as to claim that iMessage "is being...

View Article


When it comes to security, who can you trust?

In previous columns, I've explained the chain of trust and the weak links in various methods of security. But reader Duane asked a few days ago, regarding my column on using VPNs to protect coffeeshop...

View Article


Apple adds two-step verification to iMessage and FaceTime

Apple has now enabled two-step verification for FaceTime and iMessage, making it harder for hackers to compromise accounts if they've learned a user's password.

View Article

Private I: Encrypting email with public keys

In recent weeks, I've written about protecting data stored locally on a hard drive, against both people with physical access and potential remote attacks. But your data is much more vulnerable in...

View Article

WhatsApp switches on end-to-end encryption for all messages

Facebook’s WhatsApp has completed the roll out of end-to-end encryption for the messaging app to protect all content transmitted between contacts.

View Article

The week in security: Encryption law could cripple Australia’s security exports

A new report into the controversial ‘Encryption Bill’ has warned that it could damage Australia’s security industry for many years to come, pushing innovators offshore and crippling Australia’s export...

View Article

Browsing all 13 articles
Browse latest View live




Latest Images