encryption

Government wiretaps – You can’t stop what you can’t see

Report on wiretaps in 2015 suggests Americans are using less encryption to hide their activities online, is it really true.…

10 years ago

WhatsApp vs Telegram in Terms of Encryption and Features

Compare and contrast WhatsApp and Telegram, so as to see which of the two messaging apps offers the best option…

10 years ago

Breaking Android Full-Disk Encryption, not so hard on Qualcomm devices

The Android full-disk encryption can be easily cracked with a brute force attack, hundreds of millions of Android mobile are…

10 years ago

Apple confirms iOS 10 kernel source code left unencrypted intentionally

Apple confirms iOS 10 kernel code left unencrypted intentionally to improve OS performance and ensures that it will have no…

10 years ago

How to steal encryption keys from the air through a PC’s noises

A group of Israeli researchers demonstrated how to steal RSA encryption keys through a PC's noises during cryptographic operations. If…

10 years ago

CVE-2016-2107 OpenSSL Flaw still affects many Alexa Top Sites

According to the security firm High-Tech Bridge many of the Alexa Top 10,000 websites are still vulnerable to the OpenSSL…

10 years ago

Next-gen Tor is arriving and it will include a distributed random number generator

The researchers at the Tor project are working on a new distributed random number generator that will be included in…

10 years ago

Slovenian hacker who reported issues in Tetra Protocol gets prison sentence

A Slovenian student who reported configuration errors in the Tetra protocol used by the local Police gets a prison sentence.…

10 years ago

How terrorists abuse online services for propaganda?

Researchers at TrendMicro have analyzed online activities of terrorists identifying the techniques and tools used for their propaganda. Using vulnerabilities…

10 years ago

A High-Severity flaw in OpenSSL allows the HTTPS Traffic decryption

OpenSSL has the patches for six flaws including two high-severity bugs that could allow attackers to decrypt HTTPS traffic and…

10 years ago

This website uses cookies.