Published 16 July 2021
Researchers have completed a substantial security analysis of the encryption protocol used by the popular messaging platform, Telegram, with over half a billion monthly active users. The researchers found several cryptographic weaknesses in the protocol that ranged from technically trivial and easy to exploit, to more advanced.
Cryptography is the science protecting information from eavesdropping or tampering. We use it every day when we browse the web, make a bank transaction or chat on WhatsApp or Telegram. Cryptographers secure computer and information technology systems by creating and studying, for example, algorithms for encryption or for digital signatures.
As a result of their work, the researchers found several cryptographic weaknesses in the protocol that ranged from technically trivial and easy to exploit, to more advanced.
Big problems with Telegram security mybroadband.co.za - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from mybroadband.co.za Daily Mail and Mail on Sunday newspapers.
Rory Hopcraft theconversation.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from theconversation.com Daily Mail and Mail on Sunday newspapers.
Published December 18, 2020, 6:00 AM
The Securities and Exchange Commission (SEC) is preparing new rules to beef up cybersecurity in publicly listed companies (PLCs), exchanges and other capital market participants amid the surge in digital transactions in the country.
The Commission has released a draft memorandum circular seeking to require all securities market participants, including broker-dealers, assets managers, transfer agents and self-regulatory organizations (SROs) to adopt best practices in dealing with cyber security risks.
These include the identification of critical assets, information and systems, adoption of organizational or technical measures to protect information systems, as well as the formulation of a response plan and recovery plan in the event of cybersecurity breaches.