
Short URLs expose cloud security holes
Many companies store confidential documents in the cloud, often unknown to companies themselves. Individuals simply use cloud-based services for collaboration because they are convenient.
Many companies store confidential documents in the cloud, often unknown to companies themselves. Individuals simply use cloud-based services for collaboration because they are convenient.
Unfortunately, security and privacy are not necessarily high priorities for many technology companies. There are also the issues of licensing and supply of services, which come down to vendor trust.
The San Bernardino court case may be over, but the encryption debate is still very much alive.
A draft of the US senate encryption bill has been leaked, and it makes for unpleasant reading. It's called the Compliance with Court Orders Act of 2016.
WhatsApp was acquired by Facebook a couple of years ago, and they have just announced that their messenger application is now fully encrypted, end-to-end.
We've recently released CompleteFTP 9.0, and it has many enhancements and fixes that are explained in more detail below.
The UK's now infamous "snoopers' charter" (officially the Investigatory Powers Bill) was debated in parliament recently and has proceeded to the committee stage.
Last week we reported that the FBI thought that they may be able to unlock the infamous iPhone without the help of Apple. Apparently, they were approached by a third party who had a solution.
It's obvious that the IoT offers us a great deal when it comes to efficient management of our devices, for consumers, government and business. But there are significant reasons for concern, too.
Today Apple and the FBI were to face each other in court over Apple's refusal to provide a build of iOS to unlock a domestic terrorist's iPhone.