Digital ID

Microsoft maintains the recovery key of your new PC

If you login to Windows 10 using your Microsoft account you have to know that your computer automatically uploaded a…

9 years ago

xboxlive digital certificate exposed opens users to MITM attacks

Microsoft has issued an advisory to notify customers that the private keys for an SSL/TLS digital certificate for *xboxlive.com have…

9 years ago

Is he Satoshi Nakamoto? Australian Police raid home of the alleged Bitcoin father

While media announced to have found the real identity of the Bitcoin creator Satoshi Nakamoto, Australian police raided his home…

9 years ago

EFF Scoreboard – Secure Messaging, stay safe online

Learn more about the EFF scoreboard for secure, encrypted communication options online and what the future holds. Online communications have…

9 years ago

The Hello Barbie doll, lights and shadows

Mattel's Hello Barbie has finally arrived in stores, but security experts have raised questions about security and privacy issues related…

9 years ago

Tor Messenger is arrived, the secure Tor instant messaging

Today the TorProject has released a new beta version of Tor Messenger, based on Instantbird, an instant messaging client developed…

9 years ago

The US DoD still uses SHA-1 signed certificates for use by military agencies

The United States Department of Defense is still issuing SHA-1 signed certificates for its military agencies, despite they are considered…

9 years ago

WhatsApp collects phone numbers, call duration, and a lot of metadata

A group of experts  has conducted a research that demonstrates the type of data that can be gathered through the…

9 years ago

18,000 Android Apps include SMS stealing Library

Nearly 18,000 Android apps built using the Taomike SDK, and used in China, have been found to include a malicious…

9 years ago

Businesses Using Millions of insecure SHA-1 Certificates

Experts at Netcraft discovered that nearly a million SSL SHA-1 certificates were signed with the potentially vulnerable SHA-1 hashing algorithm.…

9 years ago

This website uses cookies.