Quantcast
Browsing all 164 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

National Encryption Policy: Government Issues Clarification on WhatsApp,...

The government issued an addendum to clarify that “mass use encryption products, which are currently being used in web applications, social media sites, and social media applications such as WhatsApp,...

View Article


Image may be NSFW.
Clik here to view.

Encryption policy poorly worded by officer: Telecom Minister Ravi Shankar Prasad

The government has blamed a junior official – a scientist — for the encryption policy fiasco, saying he was responsible for the poor and confusing wording of the document and failed to seek advice...

View Article


Image may be NSFW.
Clik here to view.

Draft encryption policy: Frequent changes in key positions & talent crunch in...

As the blame game for the fiasco created by the draft National Encryption Policy plays out, experts are asking if frequent changes in key positions and a talent crunch in the Department of Electronics...

View Article

Image may be NSFW.
Clik here to view.

Data encryption policy blamed on lack of talent, key changes: Report

The whole draft encryption policy episode has left netizens with a bitter-sweet taste. And now, the blame game has begun. Soon after the government retracted the policy and said it was simply wrongly...

View Article

Image may be NSFW.
Clik here to view.

National Encryption Policy: Not just privacy, but also feasibility and...

Encryption is an important aspect which governs not just the communications but also the storage. When data is in motion there are some methods/ protocols which facilitate end-to-end encryption: 1....

View Article


Image may be NSFW.
Clik here to view.

CHK File Recovery Has Been Updated to Version 1.09

CHK File Recovery is an excellent recovery tool specialized in recovering CHK files in a quick and easy way, which has been updated to version 1.09 recently. In this new version, we fixed a bug which...

View Article

Image may be NSFW.
Clik here to view.

Risk Analysis, Encryption Stressed in HITECH Act Final Rules

Two final rules for the HITECH electronic health record incentive program strongly emphasize the value of risk assessments and encryption as measures for safeguarding patient information. A new rule...

View Article

Image may be NSFW.
Clik here to view.

Obama administration opts not to force firms to decrypt data — for now

After months of deliberation, the Obama administration has made a long-awaited decision on the thorny issue of how to deal with encrypted communications: It will not — for now — call for legislation...

View Article


Image may be NSFW.
Clik here to view.

Obama administration has decided not to seek a legislative remedy now

FBI Director James Comey told a congressional panel that the Obama administration won’t ask Congress for legislation requiring the tech sector to install backdoors into their products so the...

View Article


Image may be NSFW.
Clik here to view.

US Government Will No Longer Push For User’s Encrypted Data

Last year Google and Apple (and other companies) made some changes to the way encryption was handled. Instead of Google and Apple holding the keys to the encryption, they gave the keys to their...

View Article

Image may be NSFW.
Clik here to view.

Encrypted Smartphones Challenge Investigators

Law-enforcement officials are running up against a new hurdle in their investigations: the encrypted smartphone. Officials say they have been unable to unlock the phones of two homicide victims in...

View Article

Aadhaar encryption protects privacy, will take eons to crack

The Aadhaar system’s data collection and storage is strongly protected by sophisticated encryption processes to ensure biometric data does not leak either through private contractors running enrollment...

View Article

Image may be NSFW.
Clik here to view.

The next steps for the White House on encryption

THE OBAMA administration’s decision not to seek legislation requiring technology companies to give law enforcement access to encrypted communications on smartphones has a certain logic. In this age of...

View Article


Image may be NSFW.
Clik here to view.

The NSA may have been able to crack so much encryption thanks to a simple...

The NSA could have gained a significant amount of its access to the world’s encrypted communications thanks to the high-tech version of reusing passwords, according to a report from two US academics....

View Article

Image may be NSFW.
Clik here to view.

NSA, Apple Chiefs Decode Encryption Views

LAGUNA BEACH, Calif.—The heads of the National Security Agency and the world’s most valuable company appeared to try to make nice Monday night over their contrasting views on encryption—to a point....

View Article


Image may be NSFW.
Clik here to view.

Western Digital’s hard drive encryption is useless. Totally useless

The encryption systems used in Western Digital’s portable hard drives are pretty pointless, according to new research. WD’s My Passport boxes automatically encrypt data as it is written to disk and...

View Article

Image may be NSFW.
Clik here to view.

Your self-encrypting hard drive isn’t nearly as secure as you thought

If you want to keep your information away from hackers and snoops, whether it’s your Internet use, email, hard drive data or your backup, the best thing you can do is use encryption. Encryption...

View Article


Image may be NSFW.
Clik here to view.

Tech Companies and Civil Liberties Groups Force Obama To Weigh In On...

President Obama will now be forced to publicly describe the extent of his commitment to protecting strong encryption, after nearly 50 major technology companies, human rights groups, and civil...

View Article

Image may be NSFW.
Clik here to view.

Biometric data becomes the encryption key in Fujitsu system

Fujitsu says it has developed software that uses biometric data directly as the basis for encryption and decryption of data, simplifying and strengthening security systems that rely on biometrics such...

View Article

Image may be NSFW.
Clik here to view.

Oracle hardwires encryption and SQL hastening algorithms into Sparc M7 silicon

Oracle execs used the final keynote of this week’s OpenWorld to praise their Sparc M7 processor’s ability to accelerate encryption and some SQL queries in hardware. On Wednesday, John Fowler, veep of...

View Article
Browsing all 164 articles
Browse latest View live