Please turn on your JavaScript for this page to function normally.
Newly disclosed Logjam bug might be how the NSA broke VPNs

Another vulnerability courtesy of 1990s-era US export restrictions on cryptography has been discovered, and researchers believe it might be how the NSA managed to regularly …

BitTorrent releases free P2P private voice and text app

After an initial pre-alpha release in July 2014, BitTorrent’s peer-to-peer private voice and text app Bleep is finally available for curious Windows, Mac, iOS and …

Tor Cloud project reaches the end of the line

The Tor Project has discontinued the Tor Cloud project due to a lack of dedicated software developers and maintainers.The Tor Cloud project was started in late 2011, with the …

Flawed crypto endangers millions of smart grid devices

The cryptography used in the Open Smart Grid Protocol (OSGP), one of the most widely used smart meter and smart grid device networking standards, can be easily cracked, …

Mozilla pushes for full HTTPS use

Mozilla has announced they are planning to deprecate non-secure HTTP.“After a robust discussion on our community mailing list, Mozilla is committing to focus new …

Tor Browser 4.5. is out, with new security and privacy upgrades

The Tor Project has released version 4.5 of its popular Tor Browser, and this new version comes with a number of security and privacy improvements.Users can now use a Security …

There’s now a decryption tool for TeslaCrypt ransomware

“Here’s some very good news for victims of the TeslaCrypt ransomware: Cisco researchers have created a tool for them to decrypt the files themselves and avoid …

WinMagic
SecureDoc Cloud removes security concerns related to cloud file sharing

WinMagic introduced at RSA Conference 2015 security software that encrypts and manages how files are shared via cloud file sharing services such as Dropbox or Box. SecureDoc …

Use of encryption continues to rise

The use of encryption continues to grow in response to consumer concerns, privacy compliance regulations and on-going cyber-attacks and yet there are still major challenges in …

binary
BlackVault CYNR: Code and document signing appliance

Engage Black introduced the BlackVault CYNR security appliance at RSA Conference 2015. The BlackVault CYNR integrates a Layer 3+ Hardware Security Module (HSM) with …

Upatre malware gets full SSL comms encryption

“The extremely popular Upatre Trojan downloader has undergone considerable changes that will make it and its communication more difficult to spot and block. The changes …

TorLocker victims can decrypt most files without paying ransom

Crypto-ransomware rarely means good news for targets, but when it comes to TorLocker malware (detected as Trojan-Ransom.Win32.Scraper by Kaspersky Lab), the victims can …

Don't miss

Cybersecurity news