WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > Connection
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
Arstechnica | October 15, 2015
For years, privacy advocates have pushed developers of websites, virtual private network apps, and other cryptographic software to adopt the Diffie-Hellman cryptographic key exchange as a defense against surveillance from the US National Security Agency and other state-sponsored spies...
None | March 25, 2014
Now it has made two announcements. Firstly, use of HTTPS is now mandatory for all Gmail users all of the time, and secondly, HTTPS is also used between its data centers. On the first, Nicolas Lidzborski, Gmail security engineering lead explained in a blog, "Today's change means that no one can listen in on your messages as they go back and forth between you and Gmail’s servers—no matter if you're using public WiFi or logging in from your computer, phone or tablet....
None | January 20, 2016
"The Green Party has added a privacy notice to a Freedom of Information (FOI) website which asks users to provide names and email addresses, although the website does not run SSL security. Spotted by NADPO Chairman Jon Baines, who pointed out on Twitter that the Greens were “defending” FOI by gathering personal data on a page without any privacy notices, the political party has told Infosecurity that it would discuss the HTTPS issue “with our IT team straigh...
abc6onyourside | January 15, 2020
A cybersecurity firm tested the security of Tik Tok and found "multiple vulnerabilities" in the app's code, allowing for security loopholes and hacking accounts. Check Point Research published their findings on the app, showing the security concerns. The firm's research shows they were able to manipulate code to mess with accounts' contents, delete and upload videos without the account owner's consent, make previously "hidden" videos public, and access persona...
Enterprise Identity
Whitepaper
Software Security
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE