Please turn on your JavaScript for this page to function normally.
Major increase in Filecoder malware

The ESET HQ malware research lab is reporting an unusual spike in the actvity of Filecoder malware – Trojans that encrypt user files and try to extort a ransom from the …

RSA advises customers to stop using NSA-influenced encryption algorithm

In the wake of the disclosure that the NSA has influenced NIST to adopt an encryption standard that includes one random bit generator with a weakness known only to the …

Clever email campaign delivers deadly ransomware to orgs

A new type of ransomware that obviously concentrates on targeting organizations instead of home users has been spotted by Emsisoft researchers. Dubbed CryptoLocker, the …

30 Percent of transactions conducted from Tor are fraudulent

iovation announced that 30.2 percent of transactions conducted from Tor (the onion router) in August were fraudulent. This compared with an overall fraud rate of 1 percent for …

What CISOs must learn from Bitcoin and a research team at Georgia Tech

It has been an eventful time in the mobile world with two recent breaking stories revealing vulnerabilities in the security infrastructure for Android and iOS respectively. …

Backdoored NIST standard revealed, will be reopened for review

Following last week’s revelation that the NSA has, among other things, influenced the US National Institute of Standards and Technology (NIST) to adopt an encryption …

Is BEAST still a threat?

Yesterday I changed the SSL Labs rating criteria to stop penalizing sites that do not implement server-side mitigations for the BEAST attack. That means that we now consider …

With crypto being insecure, whom do you trust?

Last week’s revelation that the NSA has for years now concentrated on subverting the encryption that protects commerce and banking transactions, sensitive data, e-mails, …

New discovery will allow large-scale quantum cryptography networks

Researchers from Toshiba have discovered a method to build quantum cryptography communication networks with a far greater scale than ever before. It will allow quantum …

NCP engineering enhances Android VPN clients

New features have been added to NCP engineering’s four Android-compatible IPsec VPN clients, available here. Their software features the addition of Full Network …

Persistent adversaries can identify Tor users

Using the Tor network will not you grant perfect anonymity – in fact, a group of researchers from the US Naval Research Laboratory and Georgetown University say that …

Tor usage more than doubles

Roger Dingledine, one of the original developers of Tor and current director of the Tor Project, has noted on the tor-talk mailing list that the number of Tor clients running …

Don't miss

Cybersecurity news