Please turn on your JavaScript for this page to function normally.
Competition to crack a virtual terrorist HDD, break into CCTV systems

Sophos is calling amateur security talent to turn sleuth and to investigate confiscated crime scene computer systems belonging to a cyber terrorist group as part of the latest …

BitTorrent’s decentralized chat app keeps content, metadata safe

BitTorrent, the company that develops the eponymous peer-to-peer protocol and two popular clients that use it, has announced the release of Bleep, an online communication …

Free iPhone app for encrypted phone calls released

There is finally a free alternative for all iOS users who are looking to encrypt their voice calls: the app is called Signal, and has been developed by the Open Whisper …

I2P patched against de-anonymizing 0-day, Tails integration still to follow

Developers of the I2P anonymous networking tool have released a new version (0.9.14) of the tool that fixes XSS and remote execution vulnerabilities reported by Exodus …

Russian government offers money for Tor-cracking tech

The Russian Ministry of Internal Affairs (MVD) has published a tender offering $111,000 to any Russian company or organization that can provide technology that can …

Intel unveils SSD Pro 2500 self-encrypting drives

Intel announced the Intel SSD Pro 2500 Series, which offers IT departments peace of mind with advanced security features and capabilities. Managing data security is critical …

Private contact, calendar sync service for Android

Open Whisper Systems has released Flock, a private cloud service for securely and privately syncing contacts and calendars between multiple mobile Android devices, and is …

Metadata-hiding Dark Mail protocol soon to be reality

At the Hackers on Planet Earth X (HOPE X) conference held this weekend in New York, NSA whistleblower Edward Snowden called for hackers, coders and developers to “help …

63% of businesses don’t encrypt credit cards

In its third study on unencrypted card data, SecurityMetrics found that 63.86% of businesses store the unencrypted 16-digit sequence on the front of credit cards, also known …

NIST releases report on cryptography expertise

NIST’s primary external advisory board released a report calling for the agency to increase its staff of cryptography experts and implement more explicit processes for …

Google catches India with fake certificates

As the world becomes more dependent, and some might say blindly so, on digital certificates it’s only natural that attackers will seek to circumvent this trust. Whether …

DPAPI vulnerability allows intruders to decrypt personal data

Passcape Software has discovered a DPAPI vulnerability that could potentially lead to unauthorized decryption of personal data and passwords of interactive domain users. The …

Don't miss

Cybersecurity news