HackDig : Dig high-quality web security articles for hackers

How a VPN can protect your online privacy

Have you ever experienced the feeling of relief that comes when you do something silly, but you’re glad you did it where people don’t know you? Or maybe you wished you were somewhere like that, but alas… That is what a Virtual Private Network (VPN) can do for you: it can put you in a place where you are unknown. To determine if and w
Publish At:2021-01-15 14:12 | Read:120 | Comments:0 | Tags:Privacy end-to-end encryption ISP privacy provider restricte

Switching to iPhone 12 – Should WhatsApp users be worried?

If you are a WhatsApp user planning on purchasing one of the newly released touchscreen-based smartphones by Apple, you may be up for a lousy privacy surprise. Transferring WhatsApp messages to your new iPhone 12 will likely compromise WhatApp’s most important feature – the end-to-end messages encryption. Even though both apps, Messages and WhatsApp, are own
Publish At:2020-10-26 11:51 | Read:535 | Comments:0 | Tags:Mobile News Mobile Security Technology end-to-end encryption

Zoom now supports end-to-end encrypted (E2EE) calls

The Video conferencing platform Zoom announced the implementation of end-to-end encryption (E2EE) and its availability starting next week. The popular Video conferencing platform Zoom announced the availability of the end-to-end encryption (E2EE) starting next week. The new E2EE feature will be made available for both paid and free accounts. “We’
Publish At:2020-10-15 12:23 | Read:518 | Comments:0 | Tags:Breaking News Security End-to-end Encryption Hacking hacking

EncroChat system eavesdropped on by law enforcement

Due to the level of sophistication of the attack, and the malware code, we can no longer guarantee the security of your device. This text caused a lot of aggravation, worries, and sleepless nights. No one wants to hear the security of their device has been compromised by a malware attack. The good news is that the actual victims of this malware attack wer
Publish At:2020-07-22 16:05 | Read:738 | Comments:0 | Tags:Hacking cryptophone encrochat encryption end-to-end encrypti

Kinda sorta weakened version of EARN IT Act creeps closer

byLisa VaasThere are gut-churning tales of online child sexual abuse material (CSAM). Last week, when a bill designed to strip legal protection from online abusers sailed through the Senate Judiciary Committee, UC/Berkeley Professor Hany Farid passed on this example from investigators at the Department of Justice’s Child Exploitation and Obscenity Section:
Publish At:2020-07-08 08:00 | Read:718 | Comments:0 | Tags:Cryptography Government security Law & order #nobackdoors Ba

Going dark: encryption and law enforcement

UPDATE, 05/22/2020: In the advent of the EARN IT Act, the debate on government subversion of encryption has reignited.  Given that the material conditions of the technology have not changed, and the arguments given in favor of the bill are not novel, we’ve decided to republish the following blog outlining our stance on the subject. Originally published
Publish At:2020-05-24 07:20 | Read:867 | Comments:0 | Tags:Government Privacy Security world backdoor Department of Jus

European Commission has chosen the Signal app to secure its communications

The popular cross-platform encrypted messaging service Signal has been chosen by the European Commission for its communications. The European Commission has decided to adopt for its staff the popular cross-platform encrypted messaging service Signal for its communications. The news was first reported earlier this month by the Politico website, a messa
Publish At:2020-02-25 08:59 | Read:1124 | Comments:0 | Tags:Breaking News Security End-to-end Encryption information sec

Why all organizations must better protect sensitive data

About two weeks ago, National Cybersecurity Awareness Month (NCSAM) kicked off with a new message stressing personal responsibility for users keeping themselves safe online: “Own IT. Secure IT. Protect IT.” NCSAM asked users to consider best practices for both securing their own devices and protecting sensitive data. But personal responsibility in cyberse
Publish At:2019-10-17 23:20 | Read:2476 | Comments:0 | Tags:Business cybersecurity cybersecurity awareness data security

15 Easy, Effective Ways to Start Winning Back Your Online Privacy

Someone recently asked me what I wanted for Christmas this year, and I had to think about it for a few minutes. I certainly don’t need any more stuff. However, if I could name one gift that would make me absolutely giddy, it would be getting a chunk of my privacy back. Like most people, the internet knows way too much about me — my age, address, phone
Publish At:2019-10-12 11:20 | Read:1999 | Comments:0 | Tags:Family Safety ad blockers children's privacy cloud security

The apparent difficulty of implementing email encryption in Gmail

It’s been almost three years since Google first announced its intention to add end-to-end encryption to Gmail. However, the free email service is yet to provide users with that feature. Despite the Internet giant insists that it was never a bluff, one of the company’s latest movements has reignited the criticism. Recently, a spokesperson from Goo
Publish At:2017-06-14 11:50 | Read:4831 | Comments:0 | Tags:Security end-to-end encryption Gmail Google Privacy technolo

A Backdoor to WhatsApp to Prevent Terrorism?

The recent tragedy in London has rekindled the debate surrounding privacy in the age of terrorism, specifically in the UK, where Home Secretary Amber Rudd is voicing harsh criticism of end-to-end encryption messaging services. It is believed that Khalid Masood, the terrorist responsible for the deaths of four people on Westminster Bridge, had connected to Wh
Publish At:2017-04-21 08:45 | Read:5107 | Comments:0 | Tags:News end-to-end encryption Privacy WhatsApp

Just one picture would have used to take over WhatsApp and Telegram accounts

A single picture could have been used by attackers to hack the popular secure messaging applications WhatsApp and Telegram. Security experts from Checkpoint have discovered a vulnerability that was present in both messaging services. The hack only affected the browser-based versions of both WhatsApp and Telegram. The flaw affected the way both apps process
Publish At:2017-03-16 01:20 | Read:4293 | Comments:0 | Tags:Breaking News Hacking Mobile End-to-end Encryption messaging

Facebook Messenger implements End-to-End Encryption

Facebook Messenger Starts Testing End-to-End Encryption with Secret Conversations, it is already available for a limited number of users. Facebook is planning to use end-to-end encryption for its Messenger app and has begun rolling out the feature. Facebook has called the new feature ‘Secret Conversations’ and will allow Messenger users to exchan
Publish At:2016-07-09 11:20 | Read:4412 | Comments:0 | Tags:Breaking News Digital ID Social Networks End-to-end Encrypti

WhatsApp vs Telegram in Terms of Encryption and Features

Compare and contrast WhatsApp and Telegram, so as to see which of the two messaging apps offers the best option for encrypted chat. Messaging apps have been increasing rapidly in popularity. WhatsApp has gone over one billion users and Telegram claims to have over 350,000 people a day signing up for its services. So, it seems that there is a great need to co
Publish At:2016-07-04 21:50 | Read:4346 | Comments:0 | Tags:Breaking News Digital ID Security encryption End-to-end Encr

Hackers find a way to send massive messages on Telegram

Security researchers have found a vulnerability that could allow attackers to send massive messages on Telegram bypassing its limitations. Security researchers have devised a method to send massive messages on Telegram. The experts have found a flaw that allows them so send messages of any size as showed in the proof-of-concept provided by the researchers. T
Publish At:2016-06-14 08:30 | Read:4605 | Comments:0 | Tags:Cyber Crime Hacking End-to-end Encryption Pierluigi Paganini


Tag Cloud