Please turn on your JavaScript for this page to function normally.
ISIS operation security guide gives insight into group’s cybersecurity practices

Do ISIS terrorists use encryption, and if so, what tools do they favour?The Combating Terrorism Centre (CTC), an academic institution at the US Military Academy in West Point, …

University implies they helped FBI break Tor protection because of a subpoena

Carnegie Mellon University has finally issued a statement commenting on the recent accusations that their researchers have aided the FBI to unmask a subset of Tor users …

Secure messaging service Telegram blocks 78 ISIS-related channels

Telegram, the popular instant messaging service that offers end-to-end encryption, announced on Wednesday that they have “blocked 78 ISIS-related channels across 12 …

A Jihadi Help Desk assists ISIS terrorists and sympathizers with encryption?

The recent Paris attacks by ISIS have become the perfect pretext for governments to resume their attack on encryption.Even though the New York Times pulled an article blaming …

Researchers hack Vizio Smart TVs to access home network

Not only do Vizio’s Smart TVs track users’ viewing habits by default (and that information is sold to third parties who can then use it to deliver targeted ads to …

Tor Project claims FBI paid university researchers $1m to unmask Tor users

Have Carnegie Mellon University researchers been paid by the FBI to unmask a subset of Tor users so that the agents could discover who operated Silk Road 2.0 and other …

Ivan Ristic, SSL Labs
Ivan Ristic and SSL Labs: How one man changed the way we understand SSL

Ivan Ristic is well-known in the information security world, and his name has become almost a synonym for SSL Labs, a project he started in early 2009. Before that, he was …

UK parliament’s secure network hit with crypto-ransomware

The UK parliament’s secure network has been breached and several computers on it have been compromised by hackers, The Times has reported. The newspaper makes is sound …

New crypto-ransomware targets Linux web servers

There’s a new piece of crypto-ransomware out there, but unlike most malware of this particular type, this one is mainly directed at web servers running on Linux.The …

Crypto-ransomware encrypts files “offline”

Ransomware comes in various forms, and not all ransomware encrypts files – some just block computers until the ransom is paid. When the file encryption feature is …

Four ways organizations can prevent PII from becoming black market public record

Personally Identifiable Information (PII) is worth 10 times more than credit card information on the black market, making it imperative to have strong policies and safeguards …

Signal for Android finally out, offers end-to-end encrypted calls and messages

Open Whisper Systems (formerly Whisper Systems) has finally released the Android version of its popular free, open source iOS app for end-to-end encrypted voice calls.Signal …

Don't miss

Cybersecurity news