Encryption Archives | Hacked: Hacking Finance
Hacked: Hacking Finance

Hacked: Hacking Finance


Archives


Navigation
TagEncryption
Featured

Cybersecurity

Scotland Yard Charge Man for Terrorism Over Encrypted Blog

Posted on October 12th, 2016.

U.K.’s Scotland Yard is accusing a Cardiff man on six counts of terrorism after he was arrested last month by Scotland Yard’s counterterrorism squad. In a pre-planned and pro-active investigation by the MPS Counter Terrorism Command, which is supported by the Wales Extremism and Counter Terrorism Unit (WECTU), 33-year-old Samata Ullah,...

Featured

Cybersecurity

FBI Paid Hackers Over $1.3 Million to Hack iPhone

Posted on April 22nd, 2016.

The iPhone belonging to one of the San Bernardino shooters has been at the center of stand-off between the FBI and Apple in recent times. While Apple stuck to its no-backdoor policy, the FBI eventually recruited the help of grey-hat hackers to crack the iPhone. The cost for such a hack-job? Over $1.3 million. The highest ever publicly...

Featured

Cybersecurity

The FBI Hacks the iPhone; Apple Exempt from Creating Backdoor

Posted on March 29th, 2016.

The case of the United States Government via the FBI vs Apple is finally over. Following months of work in trying to find a way to break into the San Bernardino terrorist’s iPhone, the FBI has finally found a way through. The government has withdrawn its case against Apple. The court case and the very public tussle between the FBI and...

Featured

Cybersecurity

Apple Vice President: FBI Backdoor Request Will Cause Hacker Havoc

Posted on March 7th, 2016.

Apple’s chief software engineer and vice president, Craig Federighi has, in an op-ed in the Washington Post, echoed Apple CEO Tim Cook’s take on the fierce encryption backdoor debate between the FBI and Apple. The chief software engineer at Apple and senior vice president of software engineering at the company, Craig Federighi has spoken...

Featured

Cybersecurity

Bill Gates Backs FBI Demand for Apple iPhone Backdoor

Posted on February 23rd, 2016.

Microsoft co-founder and former CEO Bill Gates has voiced his opinion on the encryption debate surrounding an FBI demand seeking Apple to create a backdoor for an iPhone belonging to one of the terrorists in the San Bernadino shooting. It’s an opinion that’s bound to surprise many. In a rare instance of a tech community veteran agreeing...

Featured

Cybersecurity

Mark Zuckerberg Supports Apple’s Stance on Encryption

Posted on February 22nd, 2016.

Facebook CEO Mark Zuckerberg has weighed in on the encryption debate engulfing Apple, the US Government and the FBI in recent weeks by backing Apple in its unrelenting pro-encryption stance. Speaking at the Mobile World Congress in Barcelona today, Facebook CEO Mark Zuckerberg publicly stated his support for Apple in the technology...

Featured

Cybersecurity

Apple Reveals FAQs Answering Questions about Pro-Encryption Stance

Posted on February 22nd, 2016.

Following Tim Cook’s all-encompassing open letter that revealed the US Government’s request to create a backdoor for an iPhone, Apple has released a new FAQ that answers questions that followed the original open letter. Once again, Apple has reiterated its stance on being for encryption as well as dispelling doubts and concerns on its...

Featured

Cybersecurity

Apple CEO Tim Cook: Building iPhone Backdoor is ‘Dangerous’; Govt Demand is ‘Chilling’

Posted on February 17th, 2016.

        Apple CEO Tim Cook, easily among the most vocal advocators of encryption in the world has, in an open letter today, passionately vowed to fight the US government over a court order that demands unrestricted backdoor access to an iPhone. When the government comes knocking with a court order to demand that a...

Featured

Eavesdropping

Policymakers Sharpen Their Sights On Encryption

Posted on December 28th, 2015.

Former Assistant FBI Director Steve Pomerantz agreed with a Fox News show host’s determination that terrorism and technology had outpaced legislation. “Yes, particularly to clear up what the FBI director talks about, that we have the authority to do something, in this case, to listen to  certain telephone calls, and to monitor...

Featured

Tutorials

Virtual Private Network (VPN): Everything You Need to Know

Posted on December 16th, 2015.

To put it simply, a Virtual Private Network (VPN) is a service or program that allows a device to connect to a secure offsite server over a network using an encrypted, “tunnel-like” connection. It allows the user’s IP address to be masked, providing a layer of all-important privacy and anonymity. Besides, the encryption of the connection...

Featured

Opinion

Encryption, “Dark Spaces” Demonized on Both Sides of the Aisle

Posted on December 8th, 2015.

Good intentions will always be pleaded for every assumption of authority. It is hardly too strong to say that the Constitution was made to guard the people against the dangers of good intentions. There are men in all ages who mean to govern well, but they mean to govern. They promise to be good masters, but they mean to be masters. The...

Featured

Communication

ISIS’ Digital Caliphate Going Dark – Darknet, That Is

Posted on November 18th, 2015.

The digital propaganda machine of ISIS has run into trouble staying afloat on the clear net, and so like most other banned information, they’re heading to the deep web. While this may severely limit the ability of the group to dutifully indoctrinate new members who aren’t skilled in the arts of Tor, the group hopes the sites...

Featured

Cybersecurity

UK Set to Ban Internet Companies from Providing Total Encryption to Its Users

Posted on November 3rd, 2015.

The UK government is set to ban companies like Apple from providing complete, unbreakable encryption to end users in a new law set to be introduced under the Investigatory Powers Bill. In a sweeping overbearing move, the likes of Apple and Google will no longer be allowed to offer total end-user encryption wherein customer communications...

Featured

Communication

Department of Justice Still Determined to Force Apple to Decrypt Its Consumer Technology

Posted on October 24th, 2015.

A methamphetamine distribution case in the District Court for the Eastern District of New York has the government trying a new approach in its fight against strong cryptography. Prosecutors believe there is strong evidence on an iPhone 5s belonging to an alleged drug dealer. They requested and were granted a warrant that a warrant be...

Featured

Bugs

Apps approved by NHS Leaking Personal Data

Posted on October 2nd, 2015.

Some apps approved by England’s National Health Service have found to be leaking personal information about users online according to a study. The study was done by a group of individuals from the Imperial College of London and their results showed that the apps they tested leaked ID data, reported by BBC.  The NHS was founded in 1948...

Featured

Cybersecurity

Acronis and ID Quantique to Bring Quantum-Safe Encryption to Cloud Data Protection

Posted on September 30th, 2015.

Acronis, a company specialized in new generation data protection, and ID Quantique, a company specialized in quantum-safe crypto solutions, announced a collaboration to help protect companies from future security threats related to advances in decryption techniques and the arrival of quantum computing.

Featured

Software

ProtonMail Goes Open Source, Launches Mobile Apps

Posted on August 20th, 2015.

ProtonMail released version 2.0 of its encrypted email service and announced that ProtonMail is now open source. The ProtonMail apps for iOS and Android are scheduled for release later today.

Featured

Companies

CNN: “Encryption a Growing Threat to Security.”

Posted on August 4th, 2015.

CNN’s Mike Rogers went a bit off the rails recently, headlining a piece “encryption is a threat to security.” Now, excuse you, do what? That makes no sense. Encryption is a tool of security. It cannot be a threat to security at the same time as it is a tool. The other guy could potentially use it, but he can also use a...

Featured

Cybersecurity

How to Encrypt & Decrypt Any File On Your System (Video Tutorial)

Posted on July 20th, 2015.

This tutorial assumes that you understand the purpose of cryptography, know how to install software, and learn best by doing. You may also find our guide on creating a secure password useful. We hope you find this tutorial useful and encourage any feedback directly to the author or in the comments field.

Featured

Cybersecurity

UK Government Will Not Pursue an Encryption Ban

Posted on July 15th, 2015.

In an unexpected turn, the UK government has decided to not push for an encryption ban as the British Prime Minister David Cameron earlier promoted for in the UK Parliament. The information has been verified by a Number 10 representative. David Cameron can not be comfortable with the decision as he has previously said: “… the...

The team:
Dmitriy Lavrov
Analyst
Dmitriy Lavrov is a professional trader, technical analyst and money manager with 10 years of trading experience. He covers Forex, Commodities and Cryptocurrencies. He is among the top 10 most Read More
Jonas Borchgrevink
Founder
Jonas Borchgrevink is the founder of Hacked.com and CryptoCoinsNews.com. He is a serial entrepreneur, trader and investor. He shares his own personal journey on Hacked.com.
P.H. Madore
ICO Analyst
P. H. Madore lives in Arkansas with his wife and children. He has covered the cryptocurrency beat over the course of hundreds of articles for Hacked’s sister site, CryptoCoinsNews, as Read More
Mate Csar
Analyst
Trader and financial analyst, with 10 years of experience in the field. An expert in technical analysis and risk management, but also an avid practitioner of value investment and passive Read More
Justin O’Connell
Journalist
Justin O’Connell is a cryptocurrency journalist who works have appeared in the U.S.’s third largest weekly, the San Diego Reader & VICE.
Mati Greenspan
Analyst
Senior Market Analyst at Etoro.com.
Rakesh Upadhyay
Analyst
Rakesh Upadhyay is a Technical Analyst and Portfolio Consultant for The Summit Group. He has more than a decade of experience as a private trader. His philosophy is to use Read More
Pamela Meropiali
Account Manager
Pamela Meropiali is responsible for users on Hacked.com.
Joseph Young
Journalist
Joseph Young is a finance and tech journalist & analyst based in Hong Kong. He has worked with leading media and news agencies in the technology and finance industries, offering Read More