Please turn on your JavaScript for this page to function normally.
skull
ZCryptor ransomware spreads via removable drives

The newly spotted ZCryptor ransomware has also the ability to spread like a worm, Microsoft warns. Once it infects a system, it also copies itself on removable drives, in the …

ProtonMail
Review: ProtonMail

ProtonMail is an email service developed by a team of scientists who met while working at the European Organization for Nuclear Research (CERN) in Switzerland. The idea behind …

Google Allo messaging app offers end-to-end crypto, but not as default

On Wednesday, at its annual developer-focused conference, Google introduced two new cross-platform apps: Allo and Duo. Google Allo is a messaging app, and Duo is a video …

teslacrypt
The end of TeslaCrypt: Master decryption key released

The operators of TeslaCrypt ransomware have decided to close up shop and have published a master key that decrypts the files encrypted by the malware. They also wrote that the …

bitly
Bitly partners with Let’s Encrypt for HTTPS links

Bitly processes data associated with more than 12 billion clicks per month, leading to massive troves of intelligence. Now, they’re partnering with Let’s Encrypt …

Gmail
Google drops support for old crypto on Gmail, SMTP servers

In less than a month, Google will stop supporting SSLv3 and RC4 on its SMTP and Gmail’s web servers. The end of support is not unexpected, as the Internet giant announced the …

Apache Milagro
Milagro: A distributed cryptosystem for the cloud

A new open source project within the Apache Incubator aims to create an alternative to outdated and problematic monolithic trust hierarchies such as commercial certificate …

prison cell jail
Suspect refuses to decrypt hard drives, is detained indefinitely

A former Philadelphia Police Department sergeant suspected of possessing child pornography has spent seven months in a detention center without being charged of any particular …

key
Defend encrypted data from quantum computer threat

If an exotic quantum computer is invented that could break the codes we depend on to protect confidential electronic information, what will we do to maintain our security and …

Tor
Former Tor developer helped the FBI unmask Tor users

A developer who used to work at Tor Project is the mastermind behind “Torsploit” (aka “Cornhusker”), the malware that was used by the FBI in 2012 to …

encryption
PGP-encrypted comms network allegedly used by criminals shuts down

The Dutch police has announced on Tuesday that they have pulled a system of encrypted communications used by Dutch and possible foreign criminals off the air, and that they …

Opera hand
Opera browser’s VPN is just a proxy, here’s how it works

Yesterday, Opera announced they’ve added a free VPN client with unlimited data usage in the latest developer version of their browser. Sounds great, doesn’t it? …

Don't miss

Cybersecurity news