SynAck ransomware: The doppelgängster
This new version of SynAck ransomware uses sophisticated evasion techniques.
72 articles
This new version of SynAck ransomware uses sophisticated evasion techniques.
The Rakhni encrypting ransomware, known since 2013, is now trying its hand at mining Monero.
How can we get prepared for the decryption capabilities of upcoming quantum computers?
We explain what digital certificates are, what types exist, and what problems are associated with them.
Every Wi-Fi network using WPA or WPA2 encryption is vulnerable to a key reinstallation attack. Here are some more details and means of protection.
Can you be sure the encrypted USB drives you’re using won’t reveal your company’s secrets to hackers? Problem is, current certifications can’t guarantee it.
Drones are a part of the Internet of Things, which is widely known to be vulnerable. SEO title: How to hijack a drone
As we see from recent news, quantum computing is evolving faster than anyone could’ve expected. What does this mean for us, the average users?
For a messaging app to be truly private, encryption is not enough. In this post we discuss the necessary features of private messaging.
In the second part of our “Ask the expert” session, Jornt van der Wiel answers questions about encryption: how it works, what it is for, and more.
Hacked medical equipment can cost patients a lot — their health or even their lives.
Journalists and their whistle-blowers managed to keep the biggest data leak in secret. How did they do it?
Aleks Gostev of Kaspersky Lab’s GReAT discusses the WhatApp move towards encryption and how email needs to be next in adopting end-to-end encryption
We have previously discussed what VPN is. Now let’s review its implementations and their advantages and drawbacks.
Over the past week or so, we have seen an escalation between Apple and the FBI in regards to unlocking the iPhone belonging to one of the shooters involved in
What exactly is a VPN? There has been a lot of buzz around it, but why do we need it?
SIM cards can be cloned. How is it possible and what does it have to do with cybercriminals?
A SIM card, or Subscriber Identity Module is a familiar element of a mobile phone. It can be easily swapped or replaced, yet, it was not born at the same
One of the most interesting ciphers designed to eliminate the vulnerability to symbol frequency analysis was the Vigenere cipher. Which later became the basis of unbreakable one-time pads.
At the recent Google I/O conference, the ‘corporation of good’ announced (besides new Android versions, new services and other predictable things), four new projects: Soli, Jacquard, Vault and Abacus. Let’s