encryption

ROBOT Attack: RSA TLS crypto attack worked against Facebook, PayPal, and tens of 100 top domains

ROBOT ATTACK - Security experts have discovered a 19-year-old flaw in the TLS network security protocol that affects many software…

8 years ago

Tor Project fixed TorMoil, a critical Tor Browser flaw that can leak users IP Address

The Tor Project fixed a critical vulnerability dubbed TorMoil that could leak users real IP addresses to potential attackers. Tor users must…

8 years ago

DUHK Attack allows attackers recover encryption keys used to secure VPN connections and web browsing sessions

DUHK is a vulnerability that allows attackers to recover secret encryption keys used to secure VPN connections and web browsing sessions…

8 years ago

China widely disrupted WhatsApp in the country, broadening online censorship

The popular instant messaging application WhatsApp has been widely blocked in mainland China by the Government broadening online censorship. Bad news…

8 years ago

Chrome will label Resources delivered via FTP as “Not Secure”

Google continues the ongoing effort to communicate the transport security status of a given page labeling resources delivered via FTP…

8 years ago

Experimental Mozilla Send service allows users share encrypted copy of huge files

Mozilla Send service allows users to make an encrypted copy of a local file, store it on a remote server,…

9 years ago

Facebook COO Sheryl Sandberg on Crypto weakening: Crypto War 2.0

Sheryl Sandberg on crypto weakening. The new Crypto war being started where government agencies are wanting a reduction in encryption…

9 years ago

How encryption can help startups in protecting their data

The deployment of encryption in modern businesses does not only guarantee hundred percent security but it also reduces the surface of…

9 years ago

GMR-2 issues allow satellite phone communications decryption in near real-time

Researchers have exploited vulnerabilities in the implementation of the GMR-2 cipher decrypt satellite phone communications in fractions of a second. Two…

9 years ago

The author of the original Petya ransomware released the master key

The author of the original variant of the Petya ransomware has made the master key available online, all the victims can decrypt…

9 years ago

This website uses cookies.