cryptography

NSO Group President Defends Controversial Tactics

Firm defends controversial business offerings, claims it should be considered a force of good. . NSO Group President Defends Controversial…

Read More »

Breaking Down : MD5 Algorithm

Breaking Down : MD5 Algorithm Looking under the hood and understanding how it works? The previous article that I wrote was on…

Read More »

Breaking down : SHA-1 Algorithm

Breaking down: SHA-1 Algorithm Looking under the hood and understanding how it works? I haven’t been blogging for the past month…

Read More »

WhatsApp sues spyware maker for allegedly hacking phones worldwide

WhatsApp has publicly attributed the attack on its users in May 2019 to the Israeli spyware makers, NSO Group. .…

Read More »

Major Airport Malware Attack Shines a Light on OT Security

A cryptomining infection spread to half of the workstations at a major international airport. . Major Airport Malware Attack Shines…

Read More »

Apple says Tencent isn’t snooping on your browsing habits

Apple was quick to allay user concerns this weekend after someone spotted that it was working with Chinese company Tencent…

Read More »

Cryptomining Crook Steals Game Developer’s Identity to Carry Out Dirty Work

An alleged fraudster built a vast web of AWS cloud accounts, becoming the platform’s biggest consumer of data resources. .…

Read More »

Alabama Hospitals Pay Up in Ransomware Attack

A trio of Alabama hospitals have decided to pay for a decryption key. . Alabama Hospitals Pay Up in Ransomware…

Read More »

Facebook urged by governments to halt end-to-end encryption plans

The US, UK and Australian governments last week officially urged Facebook to halt its plans for end-to-end encryption. . Facebook…

Read More »
Back to top button
Close