Constructing and analyzing protocols that prevent third parties or the public from reading private messages.

Posts

Telegram Ordered to Hand Over Encryption Keys to Russian Authorities

Popular secure messaging service Telegram loses battle with Russian courts and now must…

GandCrab Ransomware Crooks Take Agile Development Approach

Despite setbacks hackers behind GandCrab malware are pushing ahead with lucrative new ransomware…

Cryptomining Gold Rush: One Gang Rakes In $7M Over 6 Months

Report outlines lucrative rise of nefarious cyrptoming groups and their complex new business…

Cryptojacking Attack Found on Los Angeles Times Website

A security researcher found Coinhive code hidden on a Los Angeles Times’ webpage…

Gojdue Variant Eludes Microsoft, Google Cloud Protection, Researchers Say

Researchers have identified a new ransomware strain that went undetected by built-in malware…

Hotspot Shield Vulnerability Could Reveal ‘Juicy’ Info About Users, Researcher Claims

Hotspot Shield has been downloaded more than 500 million times, according to its…

Massive Smominru Cryptocurrency Botnet Rakes In Millions

Researchers say Smominru threat actors are in control of 500,000 node botnet and…