Crypto Experts Say Discussed WhatsApp Feature Is Not a Backdoor
A recently discussed feature in WhatsApp, the messaging app used by more than 1 billion people worldwide, is not a backdoor. That’s the message from an open letter written byRead More →
A recently discussed feature in WhatsApp, the messaging app used by more than 1 billion people worldwide, is not a backdoor. That’s the message from an open letter written byRead More →
A Florida man pleaded guilty on Tuesday to charges stemming from his employment with an unlicensed bitcoin exchange that prosecutors say was owned by an Israeli who oversaw a massiveRead More →
Users can expect to share 30 percent of their ill-gotten gains for signing up. A new kind of ransomware-as-a-service (RaaS) which offers users the chance to tailor their own codeRead More →
Security researchers have discovered a new Android trojan named Skyfin that can infiltrate the local Play Store Android app and download or purchase other apps behind the user’s back. UntilRead More →
The encrypted dark web site aims to help users circumvent government censorship. ProtonMail now has a home on the dark web.The encrypted email provider announced Thursday it will allow itsRead More →
A new ransomware family is targeting Android devices, locking access to the screen, and constantly pestering the user to enter his payment card details. According to Fortinet researcher Kai Lu,Read More →
Short Bytes: On Modern Intel CPUs, the USB 3.0 port can be used to access the hardware debugging interface JTAG via DCI. According to a research duo at Positive Security,Read More →
When cops have a phone to break into, they just might pull a small, laptop-sized device out of a rugged briefcase. After plugging the phone in with a cable, andRead More →
Docker has patched a privilege escalation vulnerability (CVE-2016-9962) that could lead to container escapes, allowing a hacker to affect operations of a host from inside a container. The vulnerability isRead More →
The first Mac malware of 2017 was brought to my attention by an IT admin, who spotted some strange outgoing network traffic from a particular Mac. This led to the discovery ofRead More →