encryption

DDoS attacks via WordPress now come with encryption
Kaspersky Lab experts have noted an emerging trend – a growth in the number of attacks using encryption. Such attacks are highly effective due to the difficulty in identifying …

OpenVPN to get two separate security audits
VPN service Private Internet Access (PIA) announced that they have contracted noted and well-reputed cryptographer Dr. Matthew Green to perform a security audit of OpenVPN. …

Announced: Independent OpenVPN security audit
VPN service Private Internet Access (PIA) has just announced that they have contracted noted and well-reputed cryptographer Dr. Matthew Green to perform a security audit of …

Corporate data left unprotected in the wild
A new survey conducted by YouGov has highlighted the risks to corporate data from poor encryption, and employee use of unauthorised and inadequately protected devices. The …

Dailymotion urges users to reset passwords in wake of possible breach
Breach notification service LeakedSource has added information about over 87 million Dailymotion users to its search index. The information includes 87+ million email …

AirDroid app opens millions of Android users to device compromise
Tens of millions of users of AirDroid, a remote management tool for Android, are vulnerable to man-in-the-middle attacks that could lead to data theft and their devices being …

35% of websites still using insecure SHA-1 certificates
35 percent of the world’s websites are still using insecure SHA-1 certificates, according to Venafi. This is despite the fact that leading browser providers, such as …

Final warning: Popular browsers will soon stop accepting SHA-1 certificates
Starting with Chrome 56, planned to be released to the wider public at the end of January 2017, Google will remove support for SHA-1 certificates. Other browser makers plan to …

The new age of quantum computing
Quantum encryption is the holy grail of truly secure communications. If and when quantum computing becomes a widespread reality, many public-key algorithms will become …

New users flock to ProtonMail in wake of Trump’s victory
Following Donald Trump’s victory in the latest US presidential election, many people begun to worry about the surveillance capabilities that will now effectively be left …

Telecrypt ransomware uses Telegram for command and control
Telecrypt, a newly spotted piece of crypto ransomware that uses Telegram’s communication protocol to deliver the decryption key to the crooks, is targeting Russian-speaking …

Signal Protocol’s crypto core has no major flaws, researchers find
A group of computer science and cryptography professors and doctoral students has effected a security analysis of the secure messaging Signal Protocol – specifically, of …
Featured news
Resources
Don't miss
- Cybersecurity research is getting new ethics rules, here’s what you need to know
- InterceptSuite: Open-source network traffic interception tool
- Cyber defense cannot be democratized
- Attackers are exploiting critical SAP S/4HANA vulnerability (CVE-2025-42957)
- Stealthy attack serves poisoned web pages only to AI agents