encryption

Apple Mail stores parts of encrypted emails in plaintext DB

The Apple Mail app available on macOS stores leaves a portion of users encrypted emails in plaintext in a database…

6 years ago

Hackers are poisoning the PGP SKS keyserver network poisoned

Threat actors targeted two high-profile PGP project contributors with the intent to poison certificates used by the SKS keyserver network. …

7 years ago

Google expert disclosed details of an unpatched flaw in SymCrypt library

Tavis Ormandy, a white hat hacker Google Project Zero announced to have found a zero-day flaw in the SymCrypt cryptographic…

7 years ago

Hacker broke into super secure French Government’s Messaging App Tchap hours after release

A white hat hacker discovered how to break Tchap, a new secure messaging app launched by the French government for…

7 years ago

Slack Launched Encryption Key Addon For Businesses

Slack announced today to launch encryption keys that will help businesses to protect their data. Slack announced today to launch…

7 years ago

GCHQ implements World War II cipher machines in encryption app CyberChef

UK intelligence agency GCHQ released emulators for World War II cipher machines (Enigma, Typex and The Bombe) that can be…

7 years ago

Adiantum will bring encryption on Android devices without cryptographic acceleration

Google announced Adiantum, a new encryption method devised to protect Android devices without cryptographic acceleration. Google announced Adiantum, a new encryption…

7 years ago

Flaws in several self-encrypting SSDs allows attackers to decrypt data they contain

The encryption system implemented by popular solid-state drives (SSDs) is affected by critical vulnerabilities that could be exploited by a…

7 years ago

Expert found a flaw that affects all OpenSSH versions since 1999

Security expert discovered a username enumeration vulnerability in the OpenSSH client that affects all versions of the software that was released…

7 years ago

Key Reuse opens to attacks on IPsec IKE, Cisco, Huawei, ZyXEL products are affected

Security expert demonstrated that reusing a key pair across different versions and modes of IPsec IKE open the doors to…

7 years ago

This website uses cookies.