Please turn on your JavaScript for this page to function normally.
Netflix
Netflix confirms it will start blocking proxies and unblockers

Netflix recently expanded its streaming services to nearly every country in the world. This good news for potential users in those countries has dampened the spirits of those …

OpenSSH
Flaw allows malicious OpenSSH servers to steal users’ private SSH keys

Qualys researchers have discovered two vulnerabilities in the popular OpenSSH implementation of the secure shell protocol, one of which (CVE-2016-0777) could be exploited by …

Keyboard
SLOTH attacks weaken secure protocols because they still use MD5 and SHA-1

Researchers Karthikeyan Bhargavan and Gaëtan Leurent from INRIA, the French national research institute for computer science, have discovered a new class of transcript …

https
HTTPS Bicycle attack reveals password length, allows easier brute-forcing

Dutch security researcher Guido Vranken has come up with a new attack that could allow attackers to discover the length of a user’s password – and therefore make …

Kingston DataTraveler 2000
Kingston releases encrypted USB with keypad access

Kingston released the DataTraveler 2000 encrypted USB 3.0 Flash drive, which offers hardware encryption and PIN protection with access through an onboard alphanumeric keypad. …

Tor project
The Tor Project announces bug bounty program

Representatives of the Tor Project, the non-profit organization that maintains the software needed for using the Tor anonymity network and operates the Onion network, have …

lock
New date for migrating off vulnerable SSL and early TLS encryption

Following significant feedback from the global PCI community and security experts, the Payment Card Industry Security Standards Council (PCI SSC) announced a change to the …

encryption
Human error reduces security offered by encryption apps

Crypto phones – whether they are hardware devices or mobile apps – are a great way to assure that your VoIP communications remain private, but the security and …

binary
New threats will demand new approaches such as micro-segmentation and quantum encryption

Leading security professionals around the world will adopt a new mindset in 2016, embracing advanced approaches such as micro-segmentation to counter increasingly …

How to eliminate encryption silos

Working in the encryption business, you’ll quickly learn that there are a number of problems that organizations can run into while deploying the technology. The …

Keyboard
Vuvuzela: An untraceable messaging system aimed at thwarting powerful adversaries

A group of scientists from the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) believe they have created an effective and scalable text-messaging system …

End-to-end encrypted database ZeroDB is now open source

ZeroDB, an end-to-end encrypted database whose release was announced earlier this year, is now open source. Developers MacLane Wilkison and Michael Egorov changed the license …

Don't miss

Cybersecurity news