Google has now announced that E2EMail is no more a Google product, instead, it has become a “fully community-driven open…
Experts at Google and CWI conducted the first real world collision attack against popular SHA-1 hashing algorithm, so called shattered-attack.…
More than two years after the disclosure of the HeartBleed bug, 200,000 services are still affected. Systems susceptible to Heartbleed…
Security experts from Emsisoft spotted a new strain of malware, the Spora ransomware, that allows potential victims to pay for…
Google released the Project Wycheproof, an open source tool designed to test most popular cryptographic software libraries against known attacks.…
Unfortunately, many smartphones have never been designed with security in mind, which are the most secure smartphones? Enjoy it! In…
The CVE-2016-4484 vulnerability can be exploited to gain a Linux Root shell by simply pressing the Enter Key for 70…
Researchers demonstrated how to crack GSM A5/1 Stream Cipher using a general-purpose graphics processing unit computer with 3 NVIDIA GeForce…
"VeraCrypt is much safer after this audit, and the fixes applied to the software mean that the world is safer…
Experts from Kaspersky have spotted a new threat in the wild written in Python, the CryPy ransomware that uses a…
This website uses cookies.