It sounds like a smartphone user's worst fear: Software that starts up before the phone's operating system, intercepting and encrypting every byte sent to or from the flash memory or the network interface. This is not some new kind of...
Security researchers have achieved the first real-world collision attack against the SHA-1 hash function, producing two different PDF files with the same SHA-1 signature.
A new file-encrypting ransomware program for macOS is being distributed through bit torrent websites, and users who fall victim to it won't be able to recover their files -- even if they pay.
Around 70 percent of police cameras in Washington D.C. were reportedly unable to record footage for several days before President Trump's inauguration due to a ransomware attack.
The developer behind Lavabit, an email service that noted leaker Edward Snowden used, is releasing source code for an open-source, end-to-end encrypted email standard that promises surveillance-proof messaging.
President-elect Donald Trump has turned over the Android phone he used for tweeting and will use a more secure phone with encryption capabilities that was approved by the Secret Service, according to news reports.
The creators of encrypted email service ProtonMail have set up a server that's only accessible over the Tor anonymity network as a way to fight possible censorship attempts in some countries.
GoDaddy, one of the world's largest domain registrars and certificate authorities, revoked almost 9,000 SSL certificates this week after it learned that its domain validation system has had a serious bug for the past five months.
Security researchers have found a new very well designed ransomware program dubbed Spora that can perform strong offline file encryption and brings several innovations to the ransom payments model.
A malicious program called KillDisk, which has been used in the past to wipe data from computers during cyberespionage attacks, is now encrypting files and asking for an unusually large ransom.
Developers of the popular Signal secure messaging app have started to use Google's domain as a front to hide traffic to their service and to sidestep blocking attempts.
The U.S. is better off supporting strong encryption than trying to weaken it, according to a congressional report that stands at odds with the FBI’s push to install backdoors into tech products.
Security experts from Google have developed a test suite that allows developers to find weaknesses in their cryptographic libraries and implementations.
Ransomware creators are increasingly targeting companies and other organizations, sometimes using techniques borrowed from cyberespionage attacks, because they're likely to pay more money for their data.