Новости

August 2017

A former head of MI5 has argued against undermining end-to-end encryption in messaging apps like WhatsApp, claiming it will damage broader cybersecurity efforts.

Jonathan Evans, who left the secret service in 2013 and is now a crossbencher in the House of Lords, made the comments in an interview with BBC Radio 4’s Today program on Friday.

Read more: Source Infosecurity Magazine

August 2017

The pressure is now on for UK organizations to comply with the EU’s General Data Protection Regulation (GDPR) after the government announced its intention to write the legislation officially into law in the form of a new Data Protection Bill.

The proposed bill will upgrade the UK’s privacy laws for the digital age, providing consumers with sweeping new rights while mandating strict requirements on businesses which handle their data.

Read more: Source Infosecurity Group

August 2017

The refreshing thing about the recent encryption debate is how politicians cheerfully admit that their plans have no basis in reality.

Take Malcolm Turnbull, the Australian Prime Minister. Last month he proposed legislation that would force internet companies to remove end-to-end encryption, saying: "The laws of mathematics are very commendable, but the only law that applies in Australia is the law of Australia."

Read More: Source Sky News

August 2017

German police are set to make use of new laws to hack the devices of criminal suspects in order to monitor communications, bypassing the need to force tech companies to provide encryption backdoors.

Read more: Infosecurity Group

July 2017

Using photos of young women and Hebrew slang, the Palestinian militant group Hamas chatted up dozens of Israeli soldiers online, gaining control of their phone cameras and microphones, the military said on Wednesday.

Read more: source Reuters

July 2017

Reports show that soldiers in the US military who send emails that are not classified are leaving themselves open to attack as there is no encryption. After receiving a mountain of criticism the pentagon have finally given the order to start encrypting all emails within a year.

Read more, Source engadget

July 2017

The governemnets in the intelligence sharing partnership between Australia, Canada, New zealand, the United Kingdom and the United States commonly known as "The Five eyes" are to meet in Ottawa to discuss how to bypass encryption.

Read more, Source Human Rights watch

July 2017

Research showing how accelerometers can be hacked has recently come to attention. Accelerometers which are present in most smartphones of today are used to detect motion of a phone. Recent studies have shown how they can be manipulated using sound waves. This combined with previously reported issues with accelerometers such as using them as a basic microphone or as a method to decipher words from a nearby computer keyboard highlights an important challenge for cyber security.

Read more source: New York Times

June 2017

Information collected by Context Information Security (CIS) has shown that some conference call systems typically used in boardrooms are at risk to hackers. They were able to take root control of a market leading conference and video phone which would allow them to listen to meeting and gain potentially sensitive information undetected.

Read more; source Vanilla Plus

June 2017

A new cleaner, more informative look we hope that our new website will help you to be informed about mobile voice and message security and of course our products. There is much going on so please do watch this site.  Very soon you will also see our social media feeds light up with information about us and our products.  Please do browse around and see why Enigma products are the best in their class