12 dark secrets of encryption

12 dark secrets of encryption

Encryption is fast becoming the developer’s go-to solution for whatever data privacy or security worry ails you. Afraid of putting your credit card into a…

View More 12 dark secrets of encryption
Smart Lock Turns Out to be Not So Smart, or Secure

Smart Lock Turns Out to be Not So Smart, or Secure

Researchers are warning a keyless smart door lock made by U-tec, called Ultraloq, could allow attackers to track down where the device is being used…

View More Smart Lock Turns Out to be Not So Smart, or Secure
Major HSM vulnerabilities impact banks, cloud providers, governments

Major HSM vulnerabilities impact banks, cloud providers, governments

Two security researchers have recently revealed vulnerabilities that can be exploited remotely to retrieve sensitive data stored inside special computer components known as HSMs (Hardware…

View More Major HSM vulnerabilities impact banks, cloud providers, governments
Source code of Dharma ransomware pops up for sale on hacking forums

Source code of Dharma ransomware pops up for sale on hacking forums

The source code of a major ransomware strain named Dharma has been put up for sale on two Russian hacker forums over the weekend. The…

View More Source code of Dharma ransomware pops up for sale on hacking forums
How a quantum computer could break 2048-bit RSA encryption in 8 hours

How a quantum computer could break 2048-bit RSA encryption in 8 hours

Many people worry that quantum computers will be able to crack certain codes used to send secure messages. The codes in question encrypt data using…

View More How a quantum computer could break 2048-bit RSA encryption in 8 hours
Computer Researcher Finds Wallet Vulnerability That Gave Same Key to Multiple Users

Computer Researcher Finds Wallet Vulnerability That Gave Same Key to Multiple Users

Online cryptocurrency paper wallet creator WalletGenerator.net previously ran on code that caused private key/public key pairs to be issued to multiple users. The vulnerability was…

View More Computer Researcher Finds Wallet Vulnerability That Gave Same Key to Multiple Users
IT Security Pros Slam State-Backed Encryption Backdoors

IT Security Pros Slam State-Backed Encryption Backdoors

Most IT security professionals believe governments that mandate end-to-end encryption backdoors are exposed to a greater risk of nation state cyber-attacks, according to Venafi. The…

View More IT Security Pros Slam State-Backed Encryption Backdoors
The CIA's Infamous, Unsolved Cryptographic Puzzle Gets A Final Clue

The CIA’s Infamous, Unsolved Cryptographic Puzzle Gets A Final Clue

Almost exactly 30 years ago, the artist and sculptor Jim Sanborn was devising an encrypted code for his sculpture complex at the new CIA headquarters.…

View More The CIA’s Infamous, Unsolved Cryptographic Puzzle Gets A Final Clue
CEO who sold encrypted phones to criminal gangs gets nine years in prison

CEO who sold encrypted phones to criminal gangs gets nine years in prison

A Canadian man who sold encrypted BlackBerry smartphones to criminal gangs all over the world was sentenced this week to nine years in prison, according…

View More CEO who sold encrypted phones to criminal gangs gets nine years in prison
Companies' 'Anonymized' Data May Violate GDPR, Privacy Regs

Companies’ ‘Anonymized’ Data May Violate GDPR, Privacy Regs

A new study found that any database containing 15 pieces of demographic data could be used to identify individuals. For more than two decades, researchers…

View More Companies’ ‘Anonymized’ Data May Violate GDPR, Privacy Regs