10th Indian Delegation to Dubai, Gitex & Expand North Star – World’s Largest Startup Investor Connect
Cyber Security

The UK will neither confirm nor deny that it’s killing encryption


The United Kingdom dealt a significant blow in its war on encryption last week that, aside from blemishing Apple’s meticulously curated privacy commitments, could have worldwide ramifications for personal data protections. And while several days have passed since Apple pulled its Advanced Data Protection (ADP) feature from UK customers, other end-to-end encryption providers like Meta, Signal, and Telegram have yet to meaningfully take an official stand beyond some of their execs posting about it on social media.

The UK may have set a precedent for other global governments to follow when it reportedly ordered Apple to give it backdoor access to iCloud data. Under the 2016 Investigatory Powers Act (IPA), the British government can legally demand user data be handed over for the purpose of national security and crime prevention. That seemingly includes worldwide data access, even if it’s tightly encrypted.

Some of these demands would be facilitated by controversial changes that were made to the IPA in April 2024 to expand its surveillance capabilities, like allowing intelligence services to access bulk personal datasets held by third parties and the UK government to interfere with communications companies that want to offer encryption services.

We don’t know specifically how the UK’s order was worded. The Washington Post reported that Apple received a “technical capability notice” under the IPA that demanded it create a “backdoor” to its iCloud service that provides “blanket capability to view fully encrypted material, not merely assistance in cracking a specific account.”

This may be an interpretation of the order. According to Home Office state minister Dan Jarvis, a technical capability notice itself does not require specific information to be disclosed. Instead, it forces companies “to have the capability to respond to an individual warrant or authorisation.” In other words, it prevents operators from having technology in place — such as full encryption services with user-only access — that could block the UK from snooping when it chooses to.

The order given to Apple is believed to be the first such demand made since the IPA was updated last year. We don’t really know if other companies have been slapped with similar orders because it’s illegal to publicly acknowledge if they’ve received one. Britain insidiously designed its war against data encryption to happen almost entirely behind locked doors. Apple can appeal the ruling in secret but can’t reveal if it exists. It can’t even say if it’s complying. The only reason we know about the order is because it was leaked to The Washington Post.

We don’t really know if other companies have been slapped with similar orders because it’s illegal to publicly acknowledge if they’ve received one

The British Home Office department also won’t confirm or deny its involvement. The statement it gave to The Verge said, “We do not comment on operational matters, including for example confirming or denying the existence of any such notices.”

Instead, the Cupertino, California-based company pulled its highest-level data security tool from the country without explanation after The Washington Post article was published. The ADP feature expands the end-to-end encryption provided on passwords, health data, and payment information to include iCloud drives and backups, Notes, Photos, Voice memos, and more.

“The UK government put Apple in an untenable position by demanding a backdoor in end-to-end encryption in iCloud for users everywhere in the world,” Andrew Crocker, surveillance litigation director at the Electronic Frontier Foundation (EEF), told The Verge. “Apple’s decision to disable the feature for UK users could well be the only reasonable response at this point, but it leaves those people at the mercy of bad actors and deprives them of a key privacy-preserving technology.”

Given the UK reportedly demanded global access to data, it’s unclear if withdrawing ADP from the country has appeased the order. It will, however, remove some obstacles that prevent the UK government from spying on its own citizens, which, as Crocker notes, makes people “less safe” from potential security threats and “less free.” Apple had already threatened to withdraw security features from the UK market when it opposed the IPA bill, but the decision to do so still attracted criticism for clashing with the image it’s built around being a self-professed defender of privacy rights.

Apple’s withdrawal of ADP can be interpreted as a call to break an intentionally curated silence around Britain’s bullish efforts to crush end-to-end encryption services. It’s a call that other encryption service providers don’t seem to be answering, however. Meta, Signal, and Telegram haven’t made any announcements about their own services that provide full encryption and haven’t responded to our requests to comment on the situation. Their silence and the ongoing availability of encryption features in the UK would suggest that nothing is amiss.

Thorin Klosowski, a security and privacy activist at the EEF, says that this is likely the case because the encryption services provided by most communications companies aren’t as broad as Apple’s ADP offering.

“Few companies offer anything exactly like Advanced Data Protection, and as it stands, Apple is saying it believes it can still offer the end-to-end encryption of iMessage,” Klosowski told The Verge. “If history is any indication, if the end-to-end encryption of the other communication apps, like Signal or WhatsApp, was targeted, those companies would make noise about it.”

“Few companies offer anything exactly like Advanced Data Protection”

WhatsApp and Signal have both previously threatened to leave the UK if their services were forced to weaken encryption standards under the country’s Online Safety Bill. WhatsApp chief Will Cathcart has also commented on the UK versus Apple situation directly on social media, but neither WhatsApp nor its parent company, Meta, has provided an official statement.

“Encryption is absolutely critical for keeping people safe, and governments should encourage it,” Cathcart said on X. “Banning encryption is a dangerous gift to hackers and hostile foreign governments.”

Most of the outcry hasn’t been from at-risk companies but, rather, from privacy rights groups and government officials. The US is also investigating whether the UK’s Apple notice violated the CLOUD Act, an agreement between both countries that bars the other from issuing demands for citizen data.

“If a company offered a backdoor without its customers knowing about it, it would be a massive violation of privacy and trust,” said Klosowski. “Even taken at face value, these sorts of backdoors put everyone at risk of hacking, identity theft, and fraud, because there is no way to ensure only the ‘good guys’ would have access. As we’ve seen in the past, bad actors will find a way into these backdoors.”

The full ramifications of Apple’s decision to withdraw ADP from the UK have yet to unfold. Britain isn’t the only nation that has a beef with end-to-end encryption — several EU countries and other “Five Eyes” alliance members have expressed interest in weakening the security method, arguing that it hampers efforts to crack down on child sexual abuse material and criminal activity.

This situation could be seen as a successful test of the UK’s overreaching surveillance powers that may inspire other governments to adopt the same approach. The US and Australia have already proposed laws with similar powers to the IPA’s technical capability notices, and the US, in particular, has tried and failed to crack open Apple’s user security before.

Unless a company impacted by these notices dares to violate legally binding gag orders, the IPA can either force targets to provide secretive snooping access or force them to remove the very barriers it installed to prevent it from happening in the first place. Either way, they have nothing to lose — we do.



Source link

by 9to5mac

As the world becomes more digital, the requirement for cyber defense has never been greater. As businesses, governments, and citizens depend greatly on technology, the cybersecurity practice is expanding very quickly in 2025. From data theft to ransomware attacks, the danger has evolved to be sophisticated, forcing companies to invest in innovative cybersecurity measures. Consequently, career prospects in this area are flourishing. Whether you are a student, IT personnel, or an individual thinking of changing their vocation, learning the cybersecurity scope in the future will prepare you for a very rewarding and sought-after profession. Why Cyber Security Matters More Than Ever With sudden digitization in all sectors, cyberattacks have also kept pace. Be it any organization, a small startup, or a multinational corporation, everything is now a cybercriminal target. With increasing threats, the scope of cybersecurity widens to include everything from network security to cloud security and ethical hacking. In 2025, cybersecurity is no longer an IT problem — it’s a business necessity. This evolution guarantees that experts with cybersecurity knowledge will continue to be in greater demand.  Cyber Security Scope in India: Rising Demand and Opportunities   India is one of the fastest-growing digital economies and is seeing a higher demand for cyber protection. The government is promoting initiatives like Digital India, and more businesses are going online. As a result, the cybersecurity scope in India has expanded significantly. Every sector, from banking and healthcare to e-commerce and education, is vulnerable to cyber threats.   Major Indian cities like Bangalore, Hyderabad, Pune, and Delhi are becoming hubs for cybersecurity. They offer attractive job roles and competitive salary packages to skilled professionals.   Key Areas Expanding Cyber Security Scope in the Future   Here are the major areas contributing to the growing scope of cybersecurity in the future:   1. Cloud Security   As companies move to cloud platforms like AWS, Azure, and Google Cloud, protecting data on these platforms is crucial.   2. IoT Security   As smart devices increase, so do vulnerabilities. IoT security ensures that everything from smart homes to industrial sensors is protected.   3. AI and Machine Learning in Cyber Security   Artificial intelligence is used to detect threats in real time, predict attacks, and automate responses. This technology is reshaping the scope of cybersecurity dramatically.   4. Blockchain Security   With the rise of Web3 and decentralized finance (DeFi), blockchain security is becoming an important area within the future scope of cybersecurity. Careers in Cyber Security (2025) The increasing cybersecurity scope in India has created many exciting job roles across industries. Below you will see some high-demand roles in 2025: Job Roles  Average Security salary (per annum)  Security Analyst ₹6–8 Lakhs Penetration Tester (Ethical Hacker) ₹8–12 Lakhs Cyber Security Consultant ₹10–15 Lakhs Security Architect ₹20–25 Lakhs Chief Information Security Officer (CISO) ₹40 Lakhs and above Each of these job roles contributes in its unique way to bolster the total digital defense of an organization, further expanding the cybersecurity scope nationally and globally. In-Demand Skills for Cybersecurity Roles You will need a strong skillset, both technical and …

by Team SNFYI

As senior citizens embrace the digital age, they are finding themselves at a greater risk than ever before. With unfamiliar technology and fast-evolving fraud tactics, it’s no surprise that more and more cybercrime victims are over 50—many losing not just money, but their sense of security and trust.  In response to this growing crisis, Truecaller, the leading global communications platform, has announced a transformative partnership with Khyaal, India’s number one app for senior citizens, committed to the empowerment and well-being of India’s elderly. This collaboration uniquely blends Khyaal’s deep understanding of seniors and expertise in creating meaningful engagement, along with Truecaller’s cutting-edge caller identification technology. Together, they create a robust and secure shield that fosters trusted, reliable communication, building a safer and more connected community for India’s elderly population.  All Khyaal members will receive an exclusive 50% discount on Truecaller Premium membership, ensuring they have access to the most advanced caller identification and spam protection features. Additionally, as part of this comprehensive safety initiative, Khyaal and Truecaller will co-create dedicated educational content. This includes “New Scam Highlights” sessions that decode emerging fraud tactics, interactive “Spot the Scam” workshops and contests, essential guidelines for handling calls from unknown numbers, and powerful testimonials from Khyaal seniors who have successfully identified and avoided scam attempts. These initiatives will be delivered through a mix of digital and on-ground formats. Seniors will have access to the workshops and sessions on the Khyaal app. The partnership will extend beyond digital boundaries through Khyaal’s “50Above50″ event, featuring interactive awareness sessions and dedicated safety booths that offer seniors practical, hands-on education and insights on digital safety.” While the free version of Truecaller is also functional, the Premium subscription includes enhanced spam blocking and several advanced safety features which can better protect senior citizens against fraudulent and unwanted communication. This technology-driven approach provides an additional layer of prevention, complementing Khyaal’s ongoing efforts to empower seniors through education and solutions to create a safer world for seniors. “The digital age holds tremendous promise for our seniors—offering connection, convenience, and community. But it also brings new threats they’re often unprepared for,” said Rishit Jhunjhunwala, Global CEO, Truecaller. “We’ve heard far too many heartbreaking stories of older individuals duped by scams. Our partnership with Khyaal is a meaningful step toward equipping them with the knowledge and tools to navigate this landscape safely.” Commenting on the partnership, Hemanshu Jain, Founder & CEO, Khyaal said, “The statistics are deeply concerning: seniors are losing their hard-earned savings to increasingly sophisticated scammers who exploit their trust and unfamiliarity with digital fraud tactics. The emotional toll of falling victim to such scams can be devastating, often leading to anxiety and a loss of confidence in using digital tools. At Khyaal, we’ve long recognised this silent crisis and have been committed to raising awareness through digital workshops. This partnership with Truecaller takes that commitment further. By learning to identify red flags, equipping themselves with the right tools like Truecaller, and staying informed about emerging scam tactics, seniors can maintain their independence while protecting themselves …

by Team SNFYI

For years, global supply chains have operated on a fundamental faith: that if materials are moving, everything is working. That approach worked — until cybersecurity threats became not only routine, but sophisticated and devastating. Data leaks and ransomware are no longer affecting individual businesses due to the emergence of advanced persistent threats. They send ripples through supply networks and have an impact on national security, financial systems, and basic services. This is particularly true for industries linked to government contracts. Where sensitive defense information passes through hundreds of subcontractors, an individual organization’s approach to security becomes a part of the broader risk. This isn’t just about protecting one company’s data — it’s about protecting entire ecosystems. Acknowledging this, the Department of Defense of the United States introduced a framework-based cybersecurity certification model. Among these, the Cybersecurity Maturity Model Certification — CMMC — is a key cornerstone in the effort to reform how government supply chains can operate securely. With ever-changing policy developments and recent announcements, CMMC updates are now shaking up the landscape for contractors, suppliers, and service providers. Why CMMC News Matters In The Current Scenario The cybersecurity environment for federal contractors is changing. The DoD’s implementation of CMMC, first announced in 2020, remains a work in progress. Changes, updates, and policy updates all mean companies need to be watching the CMMC news to stay compliant. CMMC implements a tiered approach for cybersecurity requirements for businesses doing business with the DoD that have access to FCI and CUI. Unlike self-attestation models, CMMC requires third-party assessments, especially for businesses participating in higher-risk jobs. Recent news updates have included: These shifts are not optional. And not meeting CMMC requirements now can result in disqualification from doing business with the DoD altogether. That should have supply chain companies in manufacturing, technology, logistics, and more reading about CMMC news. Supply Chains On Red Alert for Cybersecurity And big financial institutions, health care providers, and other operators of critical infrastructure are all taking notice. CMMC marks a move to formal, enforceable cybersecurity standards, in contrast to voluntary guidelines. Industry experts also note that CMMC’s configuration, including third-party accreditation and defined levels of maturity, as well as publicly trackable compliance, could serve as a model for future regulatory efforts in various industries. Staying Current on CMMC News: Why It Matters Given that CMMC is rapidly evolving, not being current isn’t an option. Policy changes, interim rules and enforcement updates revise timeframes and alter compliance expectations. Firms that are constantly kept abreast of the CMMC can enjoy several benefits, some of which are mentioned in the rundown: Final Thoughts As cyber threats become increasingly sophisticated, organized certification frameworks such as CMMC are becoming the rule rather than the exception. For contractors, suppliers and service providers, keeping up to date with CMMC news is about more than checking compliance boxes. This is a matter of future-proofing business activity and staying up to date to continue operating in markets that are becoming increasingly security-aware. As the bar for …