ROBOT ATTACK - Security experts have discovered a 19-year-old flaw in the TLS network security protocol that affects many software…
The Tor Project fixed a critical vulnerability dubbed TorMoil that could leak users real IP addresses to potential attackers. Tor users must…
DUHK is a vulnerability that allows attackers to recover secret encryption keys used to secure VPN connections and web browsing sessions…
The popular instant messaging application WhatsApp has been widely blocked in mainland China by the Government broadening online censorship. Bad news…
Google continues the ongoing effort to communicate the transport security status of a given page labeling resources delivered via FTP…
Mozilla Send service allows users to make an encrypted copy of a local file, store it on a remote server,…
Sheryl Sandberg on crypto weakening. The new Crypto war being started where government agencies are wanting a reduction in encryption…
The deployment of encryption in modern businesses does not only guarantee hundred percent security but it also reduces the surface of…
Researchers have exploited vulnerabilities in the implementation of the GMR-2 cipher decrypt satellite phone communications in fractions of a second. Two…
The author of the original variant of the Petya ransomware has made the master key available online, all the victims can decrypt…
This website uses cookies.