#rcs-encryption

[ follow ]
Mobile UX
fromEngadget
11 hours ago

Samsung will discontinue its Messages app in July and replace it with Google's

Samsung Messages app will be discontinued by July, urging users to switch to Google Messages for enhanced features.
Privacy technologies
fromTNW | Insights
16 hours ago

LinkedIn secretly scans 6,000+ browser extensions and fingerprints your device

LinkedIn's hidden JavaScript routine collects extensive user data without disclosure, raising concerns about covert surveillance practices.
EU data protection
fromEngadget
1 day ago

Ireland is testing out a digital wallet that conducts age verification for social media users

Ireland is trialing a Government Digital Wallet to verify user age for social media access, aiming for user-friendly design before its 2026 EU deadline.
#quantum-computing
Information security
fromnews.bitcoin.com
1 day ago

The Retroactive Decryption Trap: Why Post-Quantum Upgrades Can't Save Your Past Privacy

Google's whitepaper on quantum threats urges immediate post-quantum preparations, shifting the migration deadline to 2029 and highlighting vulnerabilities in blockchain security.
Information security
fromTechRepublic
4 days ago

Google Warns Quantum Computers Could Crack Crypto Sooner Than Expected

Quantum computing poses an imminent threat to cryptocurrency security, with fewer resources needed to break current cryptographic protections than previously estimated.
Information security
fromComputerWeekly.com
5 days ago

Shrinking PQC timeline highlights immediate risk to data security | Computer Weekly

Google's accelerated timeline for post-quantum cryptography highlights urgent data security risks posed by quantum computers that need immediate attention.
Information security
fromSecurityWeek
5 days ago

Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption

Google's Quantum AI warns that cryptocurrencies are more vulnerable to quantum attacks than previously believed, shortening the timeline for potential threats.
Information security
fromnews.bitcoin.com
1 day ago

The Retroactive Decryption Trap: Why Post-Quantum Upgrades Can't Save Your Past Privacy

Google's whitepaper on quantum threats urges immediate post-quantum preparations, shifting the migration deadline to 2029 and highlighting vulnerabilities in blockchain security.
Information security
fromTechRepublic
4 days ago

Google Warns Quantum Computers Could Crack Crypto Sooner Than Expected

Quantum computing poses an imminent threat to cryptocurrency security, with fewer resources needed to break current cryptographic protections than previously estimated.
Information security
fromComputerWeekly.com
5 days ago

Shrinking PQC timeline highlights immediate risk to data security | Computer Weekly

Google's accelerated timeline for post-quantum cryptography highlights urgent data security risks posed by quantum computers that need immediate attention.
Information security
fromSecurityWeek
5 days ago

Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption

Google's Quantum AI warns that cryptocurrencies are more vulnerable to quantum attacks than previously believed, shortening the timeline for potential threats.
Apple
fromMail Online
2 days ago

Apple issues warning to iPhone users over stealthy attack: Act NOW

Apple has released critical iOS updates to protect against the DarkSword cyberattack method targeting vulnerable devices.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
#data-privacy
Roam Research
fromThe Verge
3 days ago

PSA: Anyone with a link can view your Granola notes by default

Granola's AI note-taking app makes user notes viewable by default, raising privacy concerns for sensitive information.
Wearables
fromMakeUseOf
5 days ago

Your phone's Bluetooth is broadcasting more than you think - here's how to limit it

Bluetooth remains active and broadcasts data even when not connected, potentially allowing for tracking without user consent.
Marketing tech
fromAndroid Authority
5 days ago

The Google Play Store has a serious problem with shady cast-to-TV apps

A small number of developer networks dominate the cast-to-TV app category on Google Play, operating over 280 apps with 1.8 billion installs.
Information security
fromArs Technica
2 days ago

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
#privacy
Privacy technologies
fromBitcoin Magazine
3 days ago

What If Your VPN, Phone Number, And AI Chat Left Zero Trace? Meet Nadanada.me - The "Nothing At All" Privacy Revolution

LNVPN has evolved into a comprehensive privacy infrastructure service offering anonymous eSIM data plans, disposable phone numbers, and AI chat tools.
Privacy technologies
fromBitcoin Magazine
3 days ago

What If Your VPN, Phone Number, And AI Chat Left Zero Trace? Meet Nadanada.me - The "Nothing At All" Privacy Revolution

LNVPN has evolved into a comprehensive privacy infrastructure service offering anonymous eSIM data plans, disposable phone numbers, and AI chat tools.
Privacy professionals
fromSilicon Canals
2 days ago

A money-transfer app stored customer passports on an unencrypted, publicly accessible server for nearly five years - Silicon Canals

Fintech companies face regulatory pressure to collect identity documents but lack enforceable obligations to protect them, leading to data breaches.
#apple
Apple
fromSecurityWeek
3 days ago

Apple Rolls Out DarkSword Exploit Protection to More Devices

Apple is updating older iOS devices to protect against the DarkSword exploit kit targeting vulnerabilities in its mobile platforms.
Apple
fromTechCrunch
4 days ago

Apple releases security fix for older iPhones and iPads to protect against DarkSword attacks | TechCrunch

Apple released security updates for older iPhones and iPads to protect against the DarkSword hacking toolkit that steals user data.
Privacy professionals
fromTechCrunch
6 days ago

Apple will hide your email address from apps and websites, but not cops | TechCrunch

Apple provided federal agents with identities of customers using its email privacy feature, revealing limitations in its privacy assurances.
Apple
fromSecurityWeek
3 days ago

Apple Rolls Out DarkSword Exploit Protection to More Devices

Apple is updating older iOS devices to protect against the DarkSword exploit kit targeting vulnerabilities in its mobile platforms.
Apple
fromTechCrunch
4 days ago

Apple releases security fix for older iPhones and iPads to protect against DarkSword attacks | TechCrunch

Apple released security updates for older iPhones and iPads to protect against the DarkSword hacking toolkit that steals user data.
Privacy professionals
fromTechCrunch
6 days ago

Apple will hide your email address from apps and websites, but not cops | TechCrunch

Apple provided federal agents with identities of customers using its email privacy feature, revealing limitations in its privacy assurances.
#bitcoin
fromFast Company
4 days ago
Cryptocurrency

Bitcoin could fall victim to quantum computers sooner than expected. Now crypto investors are turning to these alternative coins

Cryptocurrency
fromBitcoin Magazine
5 days ago

Google's New Quantum Research Renews Push To Secure Bitcoin

Bitcoin's reliance on elliptic curve cryptography faces potential threats from quantum computing advancements, necessitating urgent preparation among developers and investors.
Cryptocurrency
fromFast Company
4 days ago

Bitcoin could fall victim to quantum computers sooner than expected. Now crypto investors are turning to these alternative coins

Bitcoin's security is threatened by quantum computers, prompting a shift towards quantum-resistant tokens.
Cryptocurrency
fromBitcoin Magazine
5 days ago

Google's New Quantum Research Renews Push To Secure Bitcoin

Bitcoin's reliance on elliptic curve cryptography faces potential threats from quantum computing advancements, necessitating urgent preparation among developers and investors.
#cybersecurity
Information security
fromSecurityWeek
2 days ago

In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware

New Android malware targets banking users, Italy fines Intesa Sanpaolo for data breach, Apple updates Mac security against ClickFix attacks.
Information security
fromThe Hacker News
4 days ago

Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass

A new campaign uses WhatsApp to distribute malicious VBS files, enabling multi-stage infections and remote access through social engineering techniques.
Information security
fromThe Hacker News
6 days ago

Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

A critical Citrix vulnerability is actively exploited, and the FBI confirms a hack of Director Kash Patel's email account by an Iran-linked group.
Information security
fromSecurityWeek
2 days ago

In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware

New Android malware targets banking users, Italy fines Intesa Sanpaolo for data breach, Apple updates Mac security against ClickFix attacks.
Information security
fromComputerWeekly.com
3 days ago

NCSC warns high-risk individuals of Signal and WhatsApp social engineering attacks | Computer Weekly

High-risk individuals must reduce exposure to social engineering attacks targeting encrypted messaging apps like Signal, WhatsApp, and Facebook Messenger.
Information security
fromThe Hacker News
3 days ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Information security
fromThe Hacker News
4 days ago

Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass

A new campaign uses WhatsApp to distribute malicious VBS files, enabling multi-stage infections and remote access through social engineering techniques.
Information security
fromThe Hacker News
6 days ago

Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

A critical Citrix vulnerability is actively exploited, and the FBI confirms a hack of Director Kash Patel's email account by an Iran-linked group.
#whatsapp
fromTechCrunch
4 days ago
Privacy professionals

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

Privacy professionals
fromTechCrunch
4 days ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
Information security
fromTheregister
5 days ago

Don't open that WhatsApp message, Microsoft warns

WhatsApp messages are being exploited to deliver malicious files that allow attackers to control victims' machines and access their data.
#rcs
Mobile UX
fromThe Verge
6 days ago

A new RCS update could connect iPhone and Android video calls, someday

Interoperable video calls between iPhone and Android users may become possible with the RCS Universal Profile 4.0 standard.
Mobile UX
fromThe Verge
6 days ago

A new RCS update could connect iPhone and Android video calls, someday

Interoperable video calls between iPhone and Android users may become possible with the RCS Universal Profile 4.0 standard.
#meta
Information security
fromWIRED
2 days ago

Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk

Meta has paused work with Mercor due to a major security breach affecting data used for AI training.
Privacy technologies
fromWIRED
2 weeks ago

The Danger Behind Meta's Decision to Kill End-to-End Encrypted Instagram DMs

Meta's retreat from end-to-end encryption on Instagram chat raises concerns about user privacy and sets a troubling precedent for big tech.
Information security
fromWIRED
2 days ago

Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk

Meta has paused work with Mercor due to a major security breach affecting data used for AI training.
Privacy technologies
fromWIRED
2 weeks ago

The Danger Behind Meta's Decision to Kill End-to-End Encrypted Instagram DMs

Meta's retreat from end-to-end encryption on Instagram chat raises concerns about user privacy and sets a troubling precedent for big tech.
Privacy professionals
fromZDNET
3 days ago

I turned to PrivacyBee to clean up my data - here's how it made me disappear

PrivacyBee is preferred for its comprehensive data removal services and user-friendly management tools.
Privacy technologies
fromZDNET
5 days ago

Proton Workspace boasts privacy-first alternative to Google, Microsoft

Proton Workspace offers a private alternative to Google and Microsoft productivity suites, focusing on security and data protection.
Privacy professionals
fromSilicon Canals
3 days ago

Fintech apps demand your passport for verification - then leave it on an unprotected server - Silicon Canals

Duc's exposed server revealed unprotected sensitive personal data, highlighting significant gaps in fintech data protection practices.
Privacy technologies
fromEngadget
5 days ago

Proton adds a secure video conferencing service called Meet to its toolbox

Proton launches Meet, a privacy-focused video-calling service, competing with Microsoft and Google while ensuring user anonymity and security.
Information security
fromSecurityWeek
2 days ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
Privacy professionals
fromSecurityWeek
4 days ago

FBI Warns of Data Security Risks From China-Made Mobile Apps

Foreign-developed mobile applications pose significant data security risks, particularly those from China, according to an FBI alert.
Privacy technologies
fromZDNET
5 days ago

The best way to protect your phone from a warrantless search in 2026

US authorities are increasingly aggressive in detaining and seizing devices, with biometrics remaining vulnerable.
#malware
#android
Privacy technologies
fromThe Hacker News
5 days ago

Android Developer Verification Rollout Begins Ahead of September Enforcement

Google is rolling out Android developer verification to combat harmful app distribution by requiring identity confirmation for developers.
Privacy technologies
fromThe Hacker News
5 days ago

Android Developer Verification Rollout Begins Ahead of September Enforcement

Google is rolling out Android developer verification to combat harmful app distribution by requiring identity confirmation for developers.
Law
fromAbove the Law
1 month ago

Hate To Say I Told You So Again: Your Chats Ain't Private - Above the Law

Communications with GenAI platforms lack attorney-client privilege protection because they occur between a client and a machine, not a lawyer, and are not confidential under platform terms of service.
Privacy professionals
fromHer Campus
5 days ago

Who's Watching The Watchers? AI, Age Verification, And Online Privacy

Parents are increasingly concerned about children's exposure to harmful online content despite regulations like CIPA and platforms like YouTube Kids.
Privacy technologies
fromZDNET
1 week ago

5 telltale signs that your phone has been compromised (and how to combat them)

Phone hacking can be detected through signs like battery drain, slow performance, unfamiliar logins, and reduced storage space.
Information security
fromTelecompetitor
4 days ago

Quantum network supports high-security QKD: How it works, why it matters

Quantum technology presents both risks and benefits for network security, particularly through quantum key distribution (QKD) as a solution to encryption vulnerabilities.
Privacy professionals
fromZDNET
6 days ago

This privacy-first chatbot is taking off - here's why and how to try it

DuckDuckGo's privacy-focused chatbot, Duck.ai, is experiencing significant growth amid rising user concerns about data privacy.
Privacy professionals
fromWIRED
1 week ago

Using a VPN May Subject You to NSA Spying

Using commercial VPNs may expose Americans to foreign surveillance laws, risking their constitutional protections against warrantless government spying.
Information security
fromSecurityWeek
5 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
#ai-privacy
Privacy technologies
fromWIRED
2 weeks ago

Signal's Creator Is Helping Encrypt Meta AI

Moxie Marlinspike's privacy platform Confer will integrate its encryption technology into Meta's AI systems to protect user data in AI conversations.
Privacy professionals
fromSlashGear
2 weeks ago

Apps That Track You: 17 Of The Worst Offenders In Privacy Invasion - SlashGear

Online privacy is compromised by data collection from apps, with Meta's platforms being significant offenders.
fromZDNET
1 month ago

The iPhone in your pocket is now trusted for classified NATO data

The devices are now officially approved to handle classified NATO information up to the 'restricted' level. This is not about specialized, rugged phones built for the military or locked-down, government-only hardware. It applies to regular iPhones and iPads running standard iOS 26 and iPadOS 26. According to Apple, no other consumer devices currently have this distinction.
Apple
#end-to-end-encryption
Privacy technologies
fromwww.theguardian.com
2 weeks ago

Instagram to remove end-to-end encryption for private messages in May

Instagram will disable end-to-end encryption on direct messages from May 2026, allowing Meta to access all message contents due to low user adoption of the feature.
Privacy technologies
fromThe Verge
3 weeks ago

Instagram is getting rid of end-to-end encrypted DMs that 'very few' people used

Instagram discontinues end-to-end encrypted messages on May 8th due to low user adoption, redirecting users to WhatsApp for encrypted messaging.
Privacy technologies
fromTechCrunch
1 month ago

TikTok won't add end-to-end encryption to direct messages, report says | TechCrunch

TikTok deliberately rejects end-to-end encryption for direct messages, citing safety concerns and the need for law enforcement access to protect users from harm.
fromZDNET
2 months ago
Privacy technologies

Worried about AI privacy? This new tool from Signal's founder adds end-to-end encryption to your chats

Privacy technologies
fromwww.theguardian.com
2 weeks ago

Instagram to remove end-to-end encryption for private messages in May

Instagram will disable end-to-end encryption on direct messages from May 2026, allowing Meta to access all message contents due to low user adoption of the feature.
Privacy technologies
fromThe Verge
3 weeks ago

Instagram is getting rid of end-to-end encrypted DMs that 'very few' people used

Instagram discontinues end-to-end encrypted messages on May 8th due to low user adoption, redirecting users to WhatsApp for encrypted messaging.
Privacy technologies
fromTechCrunch
1 month ago

TikTok won't add end-to-end encryption to direct messages, report says | TechCrunch

TikTok deliberately rejects end-to-end encryption for direct messages, citing safety concerns and the need for law enforcement access to protect users from harm.
fromZDNET
2 months ago
Privacy technologies

Worried about AI privacy? This new tool from Signal's founder adds end-to-end encryption to your chats

Privacy technologies
fromTechRepublic
2 weeks ago

Instagram Users Urged to Save Encrypted DMs Before Feature Disappears

Meta will discontinue end-to-end encrypted messaging for Instagram DMs on May 8, 2026, citing low adoption rates and directing users to download conversations beforehand.
fromTheregister
1 month ago

Matrix messaging gaining ground in government IT

FOSDEM 2026 Amid growing interest in digital sovereignty and getting data out of the corporate cloud and into organizations' ownership, the Matrix open communication protocol is thriving. The project was co-founded by Matthew Hodgson and Amandine le Pape, and The Reg FOSS desk met both at this year's FOSDEM for a chat about what's happening with Matrix. The Register has covered Matrix and its commercial Element side quite a few times over the years,
Software development
Privacy technologies
fromMedium
3 weeks ago

Your phone isn't eavesdropping. The reality is stranger.

Most people believe phones listen to conversations for targeted ads, but research suggests the actual explanation is more complex and potentially more troubling than simple audio eavesdropping.
Miscellaneous
fromenglish.elpais.com
1 month ago

Telegram, the platform favored by cybercriminals and disinformation

Telegram is linked to hoaxes, disinformation, and criminal use while founder Pavel Durov faces serious legal accusations including complicity in child pornography distribution.
Privacy technologies
fromEngadget
3 weeks ago

Meta is killing end-to-end encryption in Instagram DMs

Meta is discontinuing end-to-end encryption in Instagram DMs by May 8, 2026, citing low user adoption of the optional feature.
fromComputerWeekly.com
1 month ago

The European offensive against encrypted phone evidence | Computer Weekly

Over the past four years, I have handled numerous international cases involving SkyECC, Ennetcom, EncroChat, and other PGP- or crypto-phone networks. These networks were designed to guarantee privacy through end-to-end encryption and were allegedly used by criminals for secure communication, but they quickly attracted the attention of law enforcement. What initially appeared to be an airtight weapon for prosecutors - massive hacks of encrypted messages that seemed to dismantle entire criminal networks - is becoming a legal minefield.
EU data protection
fromTechCrunch
1 month ago

Google looks to tackle longstanding RCS spam in India - but not alone | TechCrunch

We had not onboarded Google because we first wanted RCS messages to be routed through the Airtel spam filter. Under the partnership, Airtel's network intelligence will be combined with Google's RCS platform to enable real-time checks on business messaging, including sender verification, spam detection, and enforcement of users' do-not-disturb preferences.
Privacy professionals
Privacy technologies
fromComputerworld
1 month ago

3 Android theft protection additions you should absolutely activate

Android devices have built-in security layers and permission systems that prevent unauthorized app access to sensitive data without explicit user approval.
Privacy professionals
fromIrish Independent
1 month ago

Telegram messaging app was fastest growing source of fraud in 2025, Revolut says

Telegram fraud cases in Ireland surged 135% in 2025, becoming the fastest-growing source of authorised push payment scams, accounting for one-fifth of all reported scams globally.
Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

Strong encryption, especially AES-256-GCM, is essential as the last line of defense to protect sensitive personal data against modern cyber threats.
Information security
fromZDNET
1 month ago

7 apps I use to lock down, encrypt, and store my private files - and most are free

Use dedicated file-and-folder security apps across devices, stay vigilant about sharing and access, and keep operating systems and apps up to date.
fromZDNET
2 months ago

Your phone is sharing data without your knowledge - how to stop it ASAP

Much of this information needs to be sent to the manufacturer to keep your device up to date and functioning properly. With that goal in mind, your phone might share any of the following tidbits: Device identifiers such as IMEI numbers, hardware serial numbers, and SIM details Telemetry data about the device's system status or health Service checks for push notifications and operating system updates Crash logs or diagnostic analytics The connectivity state, such as Wi-Fi vs. mobile Content updates, including news, social feeds, and synced emails
Privacy technologies
#smartphone-privacy
fromZDNET
1 month ago

Is spyware hiding on your phone? How to find out and remove it - fast

Spyware is one of the top threats to your mobile security and can severely impact your handset's performance if you are unlucky enough to become infected. It is a type of malware that typically lands on your iPhone or Android phone through malicious mobile apps or through phishing links, emails, and messages. While appearing to be a legitimate software package or useful utility, spyware will operate quietly in the background to monitor your movements,
Privacy technologies
Privacy technologies
fromFast Company
2 months ago

This new privacy-focused phone service is designed to keep your phone from getting hacked

Cape is a US-wide privacy-focused cellphone carrier that prevents SIM swapping and IMSI-catcher surveillance while minimizing customer data collection and encrypting voicemails.
Privacy technologies
fromEngadget
2 months ago

How to use a VPN on iPhone

Install reputable VPNs on iPhone and iPad to secure public Wi‑Fi, mask location for streaming, and prefer researched, transparent providers over App Store ads.
[ Load more ]