Microsoft may have your encryption key; here’s how to take it back
It doesn’t require you to buy a new copy of Windows. As happens from time to time, somebody has spotted a feature in Windows 10 that isn’t actually newand hasRead More →
It doesn’t require you to buy a new copy of Windows. As happens from time to time, somebody has spotted a feature in Windows 10 that isn’t actually newand hasRead More →
Radamant ransomware v1 and v2 are now decryptable. Fabian Wosar, security researcher at Emsisoft, has managed to crack the encryption algorithm for the first two versions of the Radamant Ransomware Kit,Read More →
Researchers could not track down the database’s owner.Security researcher Chris Vickery has identified a misconfigured database that contains the personal details of 191,337,174 US voters. The unprotected database was discoveredRead More →
An employee of Russia’s Internet giant Yandex, Dmitry Korobov, stole the source code of its search engine and tried to sell it on the black market to fund his own startup,Read More →
Experts at Symantec discovered that hackers quickly take advantage of CVE-2015-8562 remote code execution to compromise Joomla servers. Joomla recently patched the CVE-2015-8562 vulnerability that could be exploited by attackers forRead More →
Stealing PINs and pillaging bank accounts are both trivial. Credit card users could have their PINs stolen, and merchants could have their bank accounts pillaged, in a set of attacks demonstratedRead More →
Malware authors employ open-source Android firewall utility to block security app from talking to their cloud servers.Even if some malware families never get to cause worldwide damage, it’s sometimes interestingRead More →
Adobe squeezes out one last batch of security fixes for 2015. Adobe has issued new versions of Flash to patch a load of security flaws – one of which isRead More →
THERE WAS ONCE a time when people distinguished between cyberspace, the digital world of computers and hackers, and the flesh-and-blood reality known as meatspace. Anyone overwhelmed by the hackable perilsRead More →
China’s legislature unanimously passed a controversial anti-terrorsim law on Sunday despite months of objections from major tech firms and Washington alike. Among other requirements, the new rules state that telecomRead More →