Encryption news, trends, analysis and practical advice

Digital Key, security, encryption
Digital Key, security, encryption


12 hardware and software vulnerabilities you should address now

Hardware and software that live past their end-of-life dates pose serious risks to organizations. Find out which assets you should update, upgrade or replace ASAP.

Digital Key, security, encryption

Encrypted communications could have an undetectable backdoor

Researchers warn that many 1024-bit keys used to secure communications on the Internet today might be based on prime numbers that have been intentionally backdoored in an undetectable way.

hacker, DDOS, IoT, SkilledAnalysts

StrongPity APT attack group booby-trapped WinRAR and TrueCrypt downloads

An APT attack group focused on encrypted data and communications, using watering hole attacks to taint WinRAR and TrueCrypt downloads.

Digital Key, security, encryption

Cerber ransomware kills processes needed to access data

In order to encrypt some of the most important data stored on computers and servers, the Cerber ransomware now tries to kill processes associated with database servers.

onetouch ping

New insulin pump flaws highlight security risks from medical devices

Medical device manufacturer Animas warns diabetic patients who use its OneTouch Ping insulin pumps about security issues that could allow hackers to take over the devices and deliver unauthorized doses of insulin.

apple campus headquarters stock

Apple to no longer 'trust' Chinese certificate authority

Following a Mozilla-led investigation that found multiple problems in the SSL certificate issuance process of WoSign, a China-based certificate authority, Apple will make modifications to the iOS and macOS to block future certificates...

Firefox, Mozilla

Firefox blocks websites with vulnerable encryption keys

The popular Firefox browser will block access to HTTPS servers that use weak Diffie-Hellman keys.

Digital Key, security, encryption

Ransomware spreads through weak remote desktop credentials

Stolen or weak remote desktop credentials are routinely used to infect point-of-sale systems with malware, but recently they've also become a common distribution method for crypto-ransomware.

Vinton Cerf Heidelberg Laureate Forum

Vint Cerf's dream do-over: 2 ways he'd make the internet different

Vint Cerf is considered a father of the internet, but that doesn't mean there aren't things he would do differently if given a fresh chance to create it all over again.

Digital Key, security, encryption

TLS 1.3 gets early adoption boost through CloudFlare

Website security and performance vendor CloudFlare has made the newest version of the TLS secure communications protocol available to all of its customers.

quantum computing KryptAll

Quantum computing has the cybersecurity world white-knuckled

As quantum computers inch closer to reality, experts are sweating over their potential to render many of today's cybersecurity technologies useless.

20160225 stock mwc ericsson booth security locks

FairWare ransomware infects servers through exposed Redis instances

Days after reports that a new ransomware attack was deleting files from web servers, security researchers determined that some of the affected servers were hacked via insecure deployments of the Redis database.

security code big data cyberespionage DDoS

Attackers use rogue proxies to hijack HTTPS traffic

A new attack analyzed by malware researchers from Microsoft uses Word documents with malicious code that configures browsers to use a web proxy controlled by attackers.

New features in Windows 10 laptop

Respect: Windows 10's security impresses hackers

Windows is a popular attack target for criminals and researchers alike, but Microsoft has done a good job of making it harder to target security flaws in the OS

Digital Key, security, encryption

Rival gang leaks decryption keys for Chimera ransomware

The creators of the Petya and Mischa ransomware programs leaked around 3,500 RSA private keys allegedly corresponding to systems infected with another ransomware program called Chimera.

Digital Key, security, encryption

Free decryption tools released for PowerWare and Bart ransomware

Security researchers released tools this week that could help users recover files encrypted by two relatively new ransomware threats: Bart and PowerWare.

mit anonymity Riffle privacy

Use Tor? Riffle promises to protect your privacy even better

Privacy-minded people have long relied on Tor for anonymity online, but a new system from MIT promises better protection and faster performance.

Digital Key, security, encryption

New Locky ransomware version can operate in offline mode

The creators of the widespread Locky ransomware have added a fall-back mechanism in the latest version of their program for situations where the malware can't reach their command-and-control servers.

Load More