Encryption
Latest about Encryption

How will the Online Safety Bill change the tech industry?
By Rene Millman published
In-depth The landmark legislation will affect 25,000 companies, and is among the first laws directly regulating the business practices of tech giants

UK safety tech sees another year of growth, amidst backlash
By Rory Bathgate published
News Record investment in the sector has led to widespread implementation of safety measures, but rights groups and some experts still aren't convinced

Zoom adds end-to-end encryption to Zoom Phone and Breakout Rooms
By Bobby Hellard published
News Users will need to be on the same Zoom account for E2EE for Zoom Calls to work

Meta begins encrypting Facebook URLs, nullifying tracking countermeasures
By Rory Bathgate published
News The move has made URL stripping impossible but will improve analytics

UK government puts Online Safety Bill 'on ice'
By Zach Marzouk published
News Delaying the third reading until the autumn gives the next prime minister and digital secretary a chance to revise, or throw out, the legislation

The psychology of secure passwords
By IT Pro published
Sponsored The tricks for overcoming poor security hygiene like weak passwords and password reuse

US unveils next-gen encryption tools to withstand quantum computing attacks
By Zach Marzouk published
News The National Institute of Standards and Technology (NIST) hopes to offer a variety of tools for quantum-proof encryption

Online Safety Bill: Messaging apps 'forced to scan messages' for child abuse content in fresh amendment
By Rory Bathgate published
News Apps utilising end-to-end encryption would require backdoors or new mechanisms to allow user data to be scanned and passed on to authorities
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.