77 articles
Dave and Jeff discuss MI5 pushing for weak encryption, the EU commission telling employees to use Signal, smart pet feeders going offline, and more.
Researcher Fabian Ising, speaking at the Chaos Communication Congress, showed the limits of PDF encryption’s strength.
According to recent news, quantum supremacy is reached. What should we do about it?
Is there Internet on the ISS, what is it like, and how long does it take to get a message from Mars — learn about the networks of today and the future.
Dave and Jeff discuss a number of issues ranging from backdooring encrypted chats to POS malware and more.
Facebook suing developers from Ukraine, Apex Legends’ battle against cheaters, Facebook’s double-edged sword on privacy, and more.
In this episode, Dave and Jeff plus some special guests talk travel and keeping your data safe.
KeyPass ransomware is infecting computers worldwide, encrypting almost everything in its path. And it all starts with downloading a seemingly innocuous installer.
The Rakhni encrypting ransomware, known since 2013, is now trying its hand at mining Monero.
How can we get prepared for the decryption capabilities of upcoming quantum computers?
This new version of SynAck ransomware uses sophisticated evasion techniques.
We explain what digital certificates are, what types exist, and what problems are associated with them.
Every Wi-Fi network using WPA or WPA2 encryption is vulnerable to a key reinstallation attack. Here are some more details and means of protection.
Can you be sure the encrypted USB drives you’re using won’t reveal your company’s secrets to hackers? Problem is, current certifications can’t guarantee it.
So, what is a private messenger? Many would just say that a messaging app is private if the messages it conveys are encrypted. But in reality, messaging privacy is a
Do you like privacy? Well, let me introduce you to a new player in the encrypted messaging game: Secret Conversations. It comes from a messaging service many are already using, Facebook
Almost every cyberattack has the same goal — stealing someone’s money. However, as a vast variety of equipment is getting connected, a buggy device can lead to more serious consequences than
The annual Google I/O conference traditionally gathers developers to give them the sense of direction for the upcoming year. This year was no exception: The audience got some insights on
The biggest data breach in history happened when Mossack Fonseca papers fell into the hands of German journalists. The leaked a 2.6 terabyte archive that included 11.5 million documents — it’s three times