article thumbnail

Australian Police Arrest Alleged Head of Ghost Encrypted App

Data Breach Today

International Law Enforcement Dismantles End-to-End Encrypted Messaging Service An international law enforcement operation dismantled the Ghost encrypted messaging service in a takedown that resulted in the arrest of 51 suspects across three continents including alleged members of the Italian Mafia and motorcycle gangs.

article thumbnail

ISMG Editors: How Arrest of Telegram CEO Affects Encryption

Data Breach Today

Also: AI's Role in Cybersecurity; New Fraud Prevention Rules In the latest weekly update, ISMG editors discussed the implications of the recent arrest of Telegram's CEO in Paris for encrypted messaging services, the transformative impact of artificial intelligence in cybersecurity, and the latest regulations designed to curb fraud in electronic payments. (..)

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Indictment of Telegram CEO Threatens End-to-End Encryption

Data Breach Today

Telegram Messages Hard to Encrypt But CEO Faces Charges for Noncompliant Cryptology The arrest and indictment of Telegram CEO Pavel Durov is sparking concerns about the viability of encrypted communications in France.

article thumbnail

Quantum Computing: A New Dawn for Encryption Vulnerabilities

Data Breach Today

They highlight the need for proactive measures to protect digital assets from future breaches, deliver long-term data security and ensure the integrity of encryption. Expert Perspectives on Protecting Data and Developing Quantum-Safe Cryptography As quantum computing looms, experts emphasize the urgency of embracing quantum-safe strategies.

article thumbnail

The Modern Encryption Software Checklist: The Secret to Understanding Your Data Security Needs

The following checklist is built to help you evaluate the scope of services offered by various encryption solutions on the market and covers questions on the following topics: Encryption. Understanding your data security needs is tough enough, but what can be even more difficult is choosing the right software to fit your company.

article thumbnail

Australia Threatens to Force Companies to Break Encryption

Schneier on Security

In 2018, Australia passed the Assistance and Access Act, which—among other things—gave the government the power to force companies to break their own encryption. Examples include certain source code, encryption, cryptography, and electronic hardware. We in the encryption space call that last one “ nerd harder.”

article thumbnail

European Telecom Body to Open-Source Radio Encryption System

Data Breach Today

ETSI Will Publicize Its Encrypted Protocol TETRA Used in Radio Systems The European telecom standards body behind a widely used radio encryption system will soon open-source its encryption protocols.