WhatsApp has announced that it will begin offering end-to-end encryption on chats backed up to Google Drive and iCloud on Android and iOS phones. This comes after the messaging service was discovered to be testing encrypted backups in WhatsApp beta for Android in early summer. Although WhatsApp has offered end-to-end protection by default on messages since 2016 (although some might beg to differ), backed-up messages have not been encrypted.
The difference between AWS Certificates and Public CA Certificates
Using cloud-based platforms and services has become increasingly popular among businesses over the past few years, with Amazon Web Services (AWS) dominating the market. From website hosting and app development to storage and database management, AWS is a go-to source for those looking to dip their toe into the ever-expanding online space.
European bodies make calls to ban AI biometric surveillance
As technology becomes more sophisticated, so too, it seems, do surveillance methods. Unfortunately, with improved surveillance methods comes increased intrusiveness. Basically, what was once the stuff of science-fiction is now a reality.
Chinese hacking groups accused of coordinating recent cyber attacks
It seems like hacking incidents have become more and more prevalent in recent times, and they show no signs of letting up. Several recent attacks have something in common: the alleged perpetrators are hacker groups operating out of China.
Will vaccine passports permanently impact digital identity?
The COVID-19 pandemic has changed the way the world works in many ways, from how we work to living more socially distanced lives. Another way it may impact society is helping pave the way for more widespread use of digital passports, specifically vaccine and immunity passports. Some speculate that they may even transform digital identity as we know it, making some kind of streamlined worldwide digital identity pass the norm in the years to come. For that to happen, though, there would need to be serious consideration given to privacy and ethical concerns.
Defining brute force attacks and how they work
Whether you’re a website owner or web user, it always pays to be vigilant online, particularly when it comes to authentication and logins. Hackers have many ways of compromising online accounts and systems, and if you don’t practice good password hygiene, you’ll likely be a victim sooner or later. One of these methods, which we’ll be talking about today, is brute force attacks.
Read moreAmazon Web Services has shut down accounts linked to Pegasus spyware
Following investigations by Amnesty International and The Pegasus Project in mid-July, Amazon Web Services has banned all accounts and infrastructure linked to NSO Group, an Israeli surveillance vendor. These investigations laid bare some damning revelations and human rights implications concerning NSO’s Pegasus software, a type of surveillance spyware that has been sold to governments around the world.
Read more