FTC warns tech giants not to bow to foreign pressure on encryption

The Federal Trade Commission (FTC) has issued a strong warning to major technology companies, urging them not to succumb to foreign governments' demands to weaken encryption. Encryption is a critical component of cybersecurity, protecting user data and communications from unauthorized access. The FTC emphasizes that yielding to such pressures could compromise user privacy and security, potentially exposing sensitive information to malicious actors. This stance highlights the ongoing global debate between maintaining robust encryption standards and governmental calls for backdoors or weakened encryption for law enforcement access. The FTC's position reinforces the importance of strong encryption in safeguarding digital infrastructure and user trust. Tech giants are encouraged to resist foreign pressures and prioritize the security and privacy of their users, ensuring that encryption remains a robust defense against cyber threats. This development is significant in the context of increasing cyberattacks and the growing sophistication of threat actors worldwide. Maintaining strong encryption standards is essential for protecting critical data and supporting the broader cybersecurity ecosystem. The FTC's warning serves as a reminder of the delicate balance between national security interests and individual privacy rights in the digital age.

This Cyber News was published on www.bleepingcomputer.com. Publication date: Sun, 24 Aug 2025 20:59:04 +0000


Cyber News related to FTC warns tech giants not to bow to foreign pressure on encryption

Strong Encryption Explained: 6 Encryption Best Practices - Strong encryption protects data securely from unauthorized access, but the specific algorithms that qualify as strong encryption change over time as computing power increases and researchers develop new ways to break encryption. Even the strongest ...
2 years ago Esecurityplanet.com
What Is Encryption? Definition, How it Works, & Examples - To understand how encryption works, we need to understand how it fits into the broader realm of cryptology, how it processes data, common categories, top algorithms, and how encryption fits into IT security. Symmetric encryption will typically be ...
2 years ago Esecurityplanet.com
Types of Encryption, Methods & Use Cases - Encryption category types will explain the overarching and basic categories of classification for encryption, including the two most important: symmetric and asymmetric encryption. Encryption tool types will discuss the major classifications of ...
2 years ago Esecurityplanet.com
Data broker's "staggering" sale of sensitive info exposed in unsealed FTC filing - One of the world's largest mobile data brokers, Kochava, has lost its battle to stop the Federal Trade Commission from revealing what the FTC has alleged is a disturbing, widespread pattern of unfair use and sale of sensitive data without consent ...
2 years ago Arstechnica.com
FTC warns tech giants not to bow to foreign pressure on encryption - The Federal Trade Commission (FTC) has issued a strong warning to major technology companies, urging them not to succumb to foreign governments' demands to weaken encryption. Encryption is a critical component of cybersecurity, protecting user data ...
6 months ago Bleepingcomputer.com
Business Data Encryption: Protecting Sensitive Information - In addition to implementing encryption technologies and policies, organizations should prioritize employee training on data encryption. By selecting the appropriate encryption technologies, implementing strong encryption policies, and training ...
2 years ago Securityzap.com
Symmetric vs. Asymmetric Encryption in the Cloud: Choosing the Right Approach - Asymmetric and symmetric encryptions are the modes of encryption typically used in cryptography. There is a single key involved with symmetric encryption used both for encryption and decryption. Symmetric and asymmetric encryption as ways of ...
1 year ago Cybersecurity-insiders.com
Encrypting Data Using Asymmetric Encryption - Asymmetric encryption, commonly known as public-key encryption, is an important technique for safeguarding data transport and storage. Asymmetric encryption's multi-step process involving key generation, encryption, transmission, decryption, and key ...
2 years ago Feeds.dzone.com
The 6 Best Encryption Software - Though encryption could still be broken or cracked, strong encryption is nearly impenetrable. Top encryption software: Comparison table Top encryption software BitLocker: Best for Windows environments. It's an excellent choice for encryption software ...
1 year ago Techrepublic.com
FTC Bans Online Mental Health Firm From Sharing Certain Data - The Federal Trade Commission has proposed restricting a mental telehealth service firm from sharing consumer data and requiring it to pay a $7 million penalty to settle allegations that the firm used online tracking tools to unlawfully disclose ...
1 year ago Bankinfosecurity.com
An overview of storage encryption for enterprises - Storage encryption is a key element in keeping enterprise data safe. Most enterprises use a combination of encryption methods to protect their data on premises, in motion and in the cloud, so it's important to understand the different types and best ...
1 year ago Techtarget.com
Hip Hip Hooray For Hipster Antitrust - The wheels of justice grind slowly, so many of the actions the FTC has brought are still pending. In tandem with the Department of Justice, it is suing over fake apartment listings, blocking noncompete clauses, targeting fake online reviews, and ...
2 years ago Eff.org
Beijing fosters foreign influencers to spread its propaganda The Register - China is offering foreign influencers access to its vast market in return for content that sings its praises and helps to spreads Beijing's desired narratives more widely around the world, according to think tank the Australian Strategic Policy ...
2 years ago Theregister.com
FTC fires 'shot across the bow' at automakers over connected-car data privacy - The Federal Trade Commission warned auto manufacturers on Tuesday that it is closely watching their data collection and sales activities, citing several recent enforcement actions which it suggested could apply to the industry's practice of sharing ...
1 year ago Therecord.media
How secure is the "Password Protection" on your files and drives? - People in certain professions, such as healthcare, law, and corporations, often rely on password protection when sending files via email, believing it provides adequate security against prying eyes. Protecting files with passwords without encrypting ...
1 year ago Helpnetsecurity.com
FTC bans Rite Aid from using facial recognition surveillance for five years - Pharmacy chain Rite Aid is getting a timeout from AI facial recognition surveillance tech thanks to federal regulators. The U.S. Federal Trade Commission today announced a settlement with Rite Aid stating the chain recklessly deployed AI biometric ...
2 years ago Venturebeat.com
FTC Chair Urges Tech Giants to Rethink Encryption Policies - The Federal Trade Commission (FTC) Chair has called on major technology companies to reconsider their encryption strategies, emphasizing the balance between user privacy and law enforcement access. This article explores the ongoing debate around ...
6 months ago Darkreading.com
CVE-2025-39881 - In the Linux kernel, the following vulnerability has been resolved: ...
5 months ago
FTC Bars X-Mode from Selling Sensitive Location Data - Phone app location data brokers are a growing menace to our privacy and safety. Now the app tracks your every move and sends it to a broker, which then sells your location data to the highest bidder, from advertisers to police. The FTC's complaint ...
2 years ago Eff.org
FTC investigation shuts down suspected antivirus scam The Register - A pair of tech support businesses accused of swindling marks out of their hard-earned cash have agreed to cough up a $26 million settlement following an undercover probe by the FTC. Restoro and Reimage - both headquartered in Cyprus and, based on the ...
2 years ago Go.theregister.com
Americans lost record $10 billion to fraud in 2023, FTC warns - The U.S. Federal Trade Commission says Americans lost over $10 billion to scammers in 2023, marking a 14% increase in reported losses compared to the previous year. To put this into context, Chainalysis says ransomware gangs also had a record year, ...
2 years ago Bleepingcomputer.com
FTC will send $25.5 million to victims of tech support scams - Restoro Cyprus Limited and Reimage Cyprus Limited were fined $26 million one year ago for violating the FTC Act and the Telemarking Sales Rule after using online ads and pop-ups impersonating Windows pop-ups and system warnings saying the consumers' ...
1 year ago Bleepingcomputer.com
Click Profit blocked by the FTC over alleged e-commerce scams - Click Profit is an online business paltform promoted on social media and through websites that claims to help consumers generate passive income by setting up and managing e-commerce stores on Amazon, Walmart, and other platforms. The US Federal Trade ...
11 months ago Bleepingcomputer.com
Wearable Tech Future: Where Fashion Meets Function - From fitness trackers and smartwatches to augmented reality glasses, the future of wearable tech is full of potential. In this article, we will explore the current benefits and challenges of wearable technology, uncover its different types and ...
2 years ago Securityzap.com
Big Tech to EU: "Drop Dead" - There's just one wrinkle: the Big Tech companies don't want that future, and they're trying their damndest to strangle it in its cradle. Right from the start, it was obvious that the tech giants were going to war against the DMA, and the freedom it ...
1 year ago Eff.org Inception