Please turn on your JavaScript for this page to function normally.
lighter
TeslaCrypt: New versions and delivery methods, no decryption tool

TeslaCrypt ransomware was first spotted and analyzed in early 2015, and soon enough researchers created a decryption tool for it. The malware has since reached versions 4.0 …

ransomware
The many faces and tactics of Jigsaw crypto-ransomware

The Jigsaw crypto-ransomware got its name from the main bad guy from the popular horror movie franchise Saw, as its initial ransom note (either in English or Portuguese) shows …

world in hand
After issuing 1.7M certificates, Let’s Encrypt CA officially leaving beta

Let’s Encrypt, the non-profit Certificate Authority (CA) backed by the Electronic Frontier Foundation, Mozilla, Cisco, Akamai, and others, is ready to be considered a …

petya ransomware
Petya ransomware encryption has been cracked

Petya ransomware hit companies hard, but the good news is that there are now tools available to get the encrypted files and locked computers back. The ransomware not only …

Apple
Bug in OS X Messages client exposes messages, attachments

When in March Apple pushed out security updates for its many products, much attention has been given to a zero-day bug discovered by a team of Johns Hopkins University …

WordPress
Million-plus sites hosted on WordPress.com get free SSL

Friday brought some very good news for existing and future owners of sites hosted on WordPress.com: they will be getting HTTPS protection without having to pay for an SSL …

WhatsApp encryption
WhatsApp implements end-to-end encryption by default

Over 1 billion users will get end-to-end encryption by default once they update to the latest version of the software. WhatsApp, the most popular messaging app in the world, …

Security
PHP, Python still fail to spot revoked TLS certificates

In 2012, a group of researchers demonstrated that SSL certificate validation is broken in many applications and libraries, and pointed out the root causes for that situation: …

Lock
Encryption we can trust: Are we there yet?

Encryption is arguably the most important single security tool that we have, but it still has some serious growing up to do. The current debate about the pros and cons of …

credit cards secure
NIST security standard to protect credit cards, health information

For many years, when you swiped your credit card, your number would be stored on the card reader, making encryption difficult to implement. Now, after nearly a decade of …

lock
US govt has unlocked San Bernardino gunman’s iPhone

The US Department of Justice has found a way to get into the iPhone 5C owned by Syed Farook, one of the San Bernardino shooters. With a short status report filed with the …

facepalm
Cyber crooks spread Surprise ransomware via TeamViewer

A new ransomware family has been encrypting users’ files and appending the .surprise extension to them. The malware itself doesn’t differ much from other similar …

Don't miss

Cybersecurity news