Please turn on your JavaScript for this page to function normally.
OpenSSL site hack wasn’t the result of vulnerability exploitation

After a few days of speculations fuelled by a not clear enough explanation, the OpenSSL Foundation has confirmed that the late December defacement of its Openssl.org website …

Sophisticated and targeted attacks on the horizon

As 2013 draws to a close, Gavin Millard a security expert from Tripwire gazes into his crystal ball and predicts what 2014 has in store for us. Targeted mobile attacks will …

Will 2014 be the year of encryption?

Security experts at Unisys predicted that the coming year will usher in broad-based adoption of encryption as enterprises respond to recent disclosures that unencrypted data …

BitTorrent introduces secure, serverless messaging system

Back in September, the company behind the BitTorrent P2P protocol and the BitTorrent and μTorrent file-sharing software announced that they have started working on …

Bomb-threatening student caught because he used Tor on school Wi-Fi

20-year-old Harvard student Eldo Kim has been accused of sending fake bomb threats to Harvard University on Monday. What makes this case interesting is that he used the Tor …

FreeBSD ditches suspect hardware-based crypto

Buried in the “Security” section of a report on the FreeBSD Developer Summit held in September in Malta is a small but important note about the FreeBSD …

CyanogenMod introduces built-in SMS encryption

CyanogenMod developers have announced the fruit of several months of labor headed by Open Whisper Systems’ Moxie Marlinspike: a seamless implementation of TextSecure, …

Microsoft promises wide-reaching encryption, more transparency

It took them a while, but Microsoft is finally announcing a concentrated effort to protect its customers and their data from unauthorised government surveillance. “Like …

Can we expect a cyberwar resurgence?

Neohapsis security experts predict that next year there will be a cyberwar resurgence, the cloud will begin to show its hidden costs, and privacy will continue to lose in the …

Open source crypto server for thwarting malicious insiders

Edward Snowden’s successful exfiltration of mountains of data from NSA systems and databases has once more put the spotlight back on the threat that insiders pose to …

Do large companies follow encryption best practices?

Following last month’s revelations of the existence of the MUSCULAR program, in which the NSA and the British GCHQ have collaborated in tapping the overseas fiber-optic …

Lavabit founder submits final arguments in potentially game-changing privacy case

The saga surrounding secure email provider Lavabit and its legal fight against the US government continues with a reply brief filed last Friday by the former, arguing that …

Don't miss

Cybersecurity news