encryption

Generalized RSA (GRSA) Using 2k Prime Numbers with Secure Key Generation

In this blog, we introduce a generalized algorithm over RSA which is advanced, adaptable and scalable in using the number of…

9 years ago

Chrome will mark HTTP connections to websites as non-secure from January 2017

From January 2017, Chrome will indicate connection security with an icon in the address bar labeling HTTP connections to sites…

9 years ago

Dutch Police seized two servers of the VPN provider Perfect Privacy

The Dutch Police has seized two servers belonging to Switzerland-based Virtual Private Network (VPN) provider Perfect Privacy, as part of…

9 years ago

Safe Browsing, Gmail will warn of emails from unauthenticated senders

Google announced a new feature in the Safe Browsing warning set, it will warn users when they will receive an…

10 years ago

ISIS members shared a list of targets in Kuwait, Bahrain, Saudi Arabia on a Telegram group

The Israeli intelligence firm Intsights has breached a Telegram ISIS group, members shared info on US bases in Kuwait, Bahrain,…

10 years ago

Telegram massive hack in Iran, what is happened?

Hackers accessed Telegram accounts in Iran, a security duo investigated the security breach and will present its findings at the…

10 years ago

Proxy PAC hack allows for intercept of HTTPS URLS

Israeli experts discovered a vulnerability within the JavaScript that proxy PAC files that allows HTTPS URLs interception via Proxy Attacks.…

10 years ago

KeySniffer – How to remotely hack wireless Keyboards

Experts discovered that Wireless keyboards from several vendors don’t use encryption when communicating with USB dongle being opened to KeySniffer…

10 years ago

OpenSSH is affected by a user enumeration bug

The popular OpenSSH is affected by a user enumeration bug that could be exploited by a remote attacker to check…

10 years ago

Unmasking malware’s use of TLS without flow decryption

Researchers devised a method to unmask malware's use of TLS without decrypting the data flow. The technique relies on analysis…

10 years ago

This website uses cookies.