encryption
ISIS operation security guide gives insight into group’s cybersecurity practices
Do ISIS terrorists use encryption, and if so, what tools do they favour?The Combating Terrorism Centre (CTC), an academic institution at the US Military Academy in West Point, …
University implies they helped FBI break Tor protection because of a subpoena
Carnegie Mellon University has finally issued a statement commenting on the recent accusations that their researchers have aided the FBI to unmask a subset of Tor users …
Secure messaging service Telegram blocks 78 ISIS-related channels
Telegram, the popular instant messaging service that offers end-to-end encryption, announced on Wednesday that they have “blocked 78 ISIS-related channels across 12 …
A Jihadi Help Desk assists ISIS terrorists and sympathizers with encryption?
The recent Paris attacks by ISIS have become the perfect pretext for governments to resume their attack on encryption.Even though the New York Times pulled an article blaming …
Researchers hack Vizio Smart TVs to access home network
Not only do Vizio’s Smart TVs track users’ viewing habits by default (and that information is sold to third parties who can then use it to deliver targeted ads to …
Tor Project claims FBI paid university researchers $1m to unmask Tor users
Have Carnegie Mellon University researchers been paid by the FBI to unmask a subset of Tor users so that the agents could discover who operated Silk Road 2.0 and other …

Ivan Ristic and SSL Labs: How one man changed the way we understand SSL
Ivan Ristic is well-known in the information security world, and his name has become almost a synonym for SSL Labs, a project he started in early 2009. Before that, he was …
UK parliament’s secure network hit with crypto-ransomware
The UK parliament’s secure network has been breached and several computers on it have been compromised by hackers, The Times has reported. The newspaper makes is sound …
New crypto-ransomware targets Linux web servers
There’s a new piece of crypto-ransomware out there, but unlike most malware of this particular type, this one is mainly directed at web servers running on Linux.The …
Crypto-ransomware encrypts files “offline”
Ransomware comes in various forms, and not all ransomware encrypts files – some just block computers until the ransom is paid. When the file encryption feature is …
Four ways organizations can prevent PII from becoming black market public record
Personally Identifiable Information (PII) is worth 10 times more than credit card information on the black market, making it imperative to have strong policies and safeguards …
Signal for Android finally out, offers end-to-end encrypted calls and messages
Open Whisper Systems (formerly Whisper Systems) has finally released the Android version of its popular free, open source iOS app for end-to-end encrypted voice calls.Signal …
Featured news
Resources
Don't miss
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance