Swedish VPN providers Mullvad report that private keys moving through OpenVPN installations are not immune to Heartbleed OpenSSL exploits.
Browsing Category: Uncategorized
On Thursday Google switched its Gmail service to HTTPS only, enforcing SSL encryption on all Gmail connections.
A quick research project done by a graduate student at Stanford on the security of hashed MAC addresses in retail analytics software has shown that time and the inevitable advancement of technology have are the greatest enemies of cryptography.
A new campaign, dubbed Operation SnowMan, was been spotted leveraging a previously unknown zero-day in Internet Explorer 10 after the U.S. Veterans of Foreign Wars’ website was compromised this week.
The ESEA League, an online competitive gaming community, has decided to settle with the state of New Jersey after the active Attorney General there alleged that the gaming community operator infected user-machines with malware designed to mine for Bitcoins.
Buried underneath the ever-growing pile of information about the mass surveillance methods of the NSA is a small but significant undercurrent of change that’s being driven by the anger and resentment of the large tech companies that the agency has used as tools in its collection programs. The changes have been happening since almost the[…]
Washington D.C. – Senator Al Franken presided over a hearing today in which lawmakers and technology experts discussed the National Security Administration’s surveillance practices, examining a proposed bill that would require that the U.S. spy agency carry out its operations in a more transparent fashion.
NIST made public a provisional copy of the government’s cybersecurity framework and says it will accept public comment on the draft for the next 45 days.
The effects of large-scale surveillance, security researcher Andrew Lee argues, remain psychologically devastating and debilitating for most people.
I had a chance to visit a number of industrial events this year and can see the evolution of cybersecurity in the industrial field. One of these was the 4th National Institute of Standards and Technology’s (NIST) Cybersecurity Framework Workshop (CFW).