• WhatsApp implements end-to-end encryption

    WhatsApp announced on Tuesday that it has implemented complete end-to-end encryption which will protect all text, photo, video, and voice communications from eavesdropping. This means hackers and criminals will be shut out, but so will law enforcement and intelligence services, and even the company itself. This means that the company will not able to comply with court orders to allow law enforcement access to the information stored on the encrypted device. Leaders of law enforcement agencies were quick to criticize WhatsApp’s move for creating “warrant-proof” spaces for criminals and terrorists.

  • New cryptographic techniques based on hard mathematical problems

    Cryptographic methods are typically created following the ad-hoc principle: somebody comes up with an algorithm; others attempt to break it — if they do not succeed, it means that the algorithm is secure. researchers develop new cryptographic algorithms that are based on particularly hard mathematical problems. They would be virtually unbreakable.

  • Sen. Wyden said he would filibuster efforts to mandate back doors

    Senator Ron Wyden (D-Oregon), a critic of the NSA domestic spying programs, said he would filibuster any attempt by fellow lawmakers to require U.S. technology companies to weaken the encryption systems with which they equip their devices. Referring to Apple fight against a court order requiring the company to relax the encryption of iPhone used by the two San Bernardino terrorists, Wyden said that consumers were asking: “Are these for the privacy rights of the dead terrorist?”

  • FBI cracks terrorists’ iPhone without Apple's help

    The Justice Department on Monday asked a court to withdraw the government’s request that the court order Apple to help the FBI gain access to the encrypted iPhone used by the San Bernardino terrorists. The Justice Department filed the request after the FBI had successfully accessed data stored on an encrypted iPhone. The FBI wanted the court to compel Apple to relax the 10-attempt limit, which is part of the encryption system which comes with the device. If there are more than ten attempts to guess the password, the phone locks forever and all the data on it is wiped out. The FBI argued that its computers, using brute-force, would be able to break the phone’s password, but that it would take more than ten attempts.

  • “Moving-target” defense against distributed denial-of-service attacks

    Researchers propose a “moving-target” defense against distributed denial-of-service attacks. The defense works by repeatedly shuffling client-to-server assignments to identify and eventually quarantine malicious clients.

  • FBI may be able to break into San Bernardino terrorist’s phone without Apple’s help

    Magistrate Judge Sheri Pym has postponed until 5 April a court hearing about the FBI’s request that the court would order Apple to unlock the phone of one of the San Bernardino terrorists. The FBI asked the judge to postpone the hearing after the agency said it may have found a way to unlock the phone without Apple’s help.

  • Hackers could decrypt iMessage photos, videos

    A team of researchers has poked a hole in Apple’s iMessage encryption software. The bug would enable a skilled hacker to decrypt photos and videos sent as secure instant messages. The details of the vulnerability will be published after Apple has issued an update that corrects the flaw.

  • Using single photons to improve cybersecurity

    With enough computing effort most contemporary security systems will be broken. But a research team has made a major breakthrough in generating single photons (light particles), as carriers of quantum information in security systems.

  • Secure, user-controlled data

    Most people with smartphones use a range of applications that collect personal information and store it on Internet-connected servers — and from their desktop or laptop computers, they connect to Web services that do the same. Some use still other Internet-connected devices, such as thermostats or fitness monitors, that also store personal data online. Generally, users have no idea which data items their apps are collecting, where they’re stored, and whether they’re stored securely. Cryptographic system would allow users to decide which applications access which aspects of their data.

  • Bangladesh central bank governor resigns after discovery of $81 million cybertheft

    Bangladesh’s central bank governor, Atiur Rahman, resigned on Tuesday after $81 million was stolen from the bank’s account at the Federal Reserve Bank of New York. It was one of the largest cyber-heists in history. The Bangladesh central bank said that the hackers had tried to withdraw $951 million from its account at the Federal Reserve Bank of New York, but the other transactions were blocked after a typo in one of the instructions raised alarms.

  • Nations ranked on vulnerability to cyberattacks

    Damaging cyberattacks on a global scale continue to surface every day. Some nations are better prepared than others to deal with online threats from criminals, terrorists, and rogue nations. Data-mining experts ranked the vulnerability of forty-four nations to cyberattacks. The United States ranked 11th safest, while several Scandinavian countries (Denmark, Norway, and Finland) ranked the safest.

  • WhatsApp to add encryption to voice chats

    Reports say that WhatsApp is planning to add encrypted video chats to its app in order to make it impossible for, so that nobody could snoop on its users. Adding encrypted voice chats will mean that all of the messages that pass through WhatsApp will be secure. Text messages are already encrypted.

  • How organizations can secure their teleworkers, data

    As the number of employees who telework trends upward — and new kinds of devices are used in telework — the National Institute of Standards and Technology (NIST) says it is updating its guidance to include the latest technology available to strengthen an organization’s remote-access data security.

  • Social media used to assess damage caused by natural disasters

    A new study concludes that it is possible to determine the damage caused by a natural disaster in just a few hours by using data from social networks. “Twitter, the social network which we have analyzed, is useful for the management, real-time monitoring and even prediction of the economic impact that disasters like Hurricane Sandy can have,” says one of the researchers.

  • U.S. files case against Iranian government hackers behind attack on N.Y. dam

    In 2013 hackers infiltrated the operations center for the Bowman Avenue Dam, a small dam on Blind Brook in Rye Brook, New York. DHS, in a classified report, later identified the attackers r identified the attackers as the same Iranian group responsible for attacks on PNC Financial Services Group, SunTrust, and Capital One Financial. Now the Department of Justice is set to file an indictment against the Iranian hackers behind the intrusion.