Please turn on your JavaScript for this page to function normally.
Blackphone to put privacy and control first

Silent Circle and Geeksphone announced Blackphone, a smartphone placing privacy and control directly in the hands of its users. Blackphone, powered by a security-oriented …

Target hackers shopping around for data decryption services?

The target breach and the massive amount of user information compromised in its wake is understandably worrying customers. But what are the odds of it being actually used by …

Sefnit Trojan endangers users even after removal

Remember when in late August 2013 the Tor anonymity network was hit with a sudden and massive influx of active clients connecting to it? It was later discovered that the spike …

Yahoo Mail now has HTTPS on by default

With a short blog post, Yahoo’s SVP of Communication Products Jeff Bonforte has announced that the company has started encrypting all connections between their users and …

NSA employee will remain as co-chair on crypto standards group

NSA employee Kevin Igoe will continue to be one of the two co-chairs of the Crypto Forum Research Group (CFRG), which helps the Internet Engineering Task Force (IETF) review …

Deadly new ransomware soon to be released?

As disruptive as Cryptolocker is, there’s a possibility that an even deadlier type of ransomware will soon be targeting unsuspecting users. White-hat security research …

Multi-protocol SoftEther VPN becomes open source

In March 2013, a Japanese student by the name of Daiyuu Nobori set up VPN Gate, a free VPN service that he hoped would be used by Internet users who wish to avoid their …

OpenSSL site hack wasn’t the result of vulnerability exploitation

After a few days of speculations fuelled by a not clear enough explanation, the OpenSSL Foundation has confirmed that the late December defacement of its Openssl.org website …

Sophisticated and targeted attacks on the horizon

As 2013 draws to a close, Gavin Millard a security expert from Tripwire gazes into his crystal ball and predicts what 2014 has in store for us. Targeted mobile attacks will …

Will 2014 be the year of encryption?

Security experts at Unisys predicted that the coming year will usher in broad-based adoption of encryption as enterprises respond to recent disclosures that unencrypted data …

BitTorrent introduces secure, serverless messaging system

Back in September, the company behind the BitTorrent P2P protocol and the BitTorrent and μTorrent file-sharing software announced that they have started working on …

Bomb-threatening student caught because he used Tor on school Wi-Fi

20-year-old Harvard student Eldo Kim has been accused of sending fake bomb threats to Harvard University on Monday. What makes this case interesting is that he used the Tor …

Don't miss

Cybersecurity news