An unidentified programmer with twitter handle leostone produce a tool that can generate the password used to decrypt a Petya encrypted…
Browsing: Data Protection
Unlike physical biometrics, behaviour biometrics is the field of study to uniquely identify the individual based on his or her…
Instant messaging service Whatsapp has now announced that it will use end-to-end encryption to scramble all users’ communications and ensure…
To work on the Incapsula team at Imperva is to be exposed to DDoS attacks all of the time. From…
In advance of the introduction of the General Data Protection Regulation (GDPR), bringing stricter EU data protection rules, now’s the…
Security researchers and hackers are caught up in an endless game of cat and mouse, with threats constantly evolving to…
Yesterday, the AP broke a disturbing story about a hacktivist who made public the personal data of almost 50 million…
Never before has Mac OS X been as heavily targeted by cybercriminals as now. Whereas infections like browser hijackers and…
In a world of technological dependence, I like most other professionals suffer from increasing degrees of paranoia, and fear that…
In the last couple of days, some reports surfaced which linked some ransomware infections with TeamViewer. We strongly condemn any…