Constructing and analyzing protocols that prevent third parties or the public from reading private messages.

Posts

WhatsApp Downplays Damage of a Group Invite Bug

WhatsApp said that claims that infiltrators can add themselves to an encrypted group…

Forever 21 Says PoS Systems Exposed Customer Data for 8 Months

Fashion retailer updates disclosure on 2017 attack, says hackers targeted point-of-sale terminals that…

Crooks Switch from Ransomware to Cryptocurrency Mining

The group behind the VenusLocker ransomware have switched to cryptocurrency mining Monero. …

U.S. Government Blames North Korea for WannaCry

The United States government is officially blaming North Korea for the WannaCry ransomware…

19-Year-Old TLS Vulnerability Weakens Modern Website Crypto

New research shows how an old vulnerability called ROBOT can be exploited using…

Google Patches Critical Encryption Bug Impacting Pixel, Nexus Phones

As part of its December Android and Pixel/Nexus security updates, Google has issued…

Taking HTTPS Denial to an Absurd Level

Researcher Troy Hunt discovers as far as the internet has come in adopting…