Security News



Here’s an overview of some of last week’s most interesting news and articles: Faulty TLS implementation opens VISA sites, users to attack A group of researchers has discovered 184 HTTPS servers...

A private industry notification issued by the FBI in late April may indicate that keyloggers disguised as USB device chargers have been fund being used in the wild. The notification does not say...



Two yet unfinished coding projects by a group of developers that call themselves Team Jellyfish have received unexpected attention due to an Ars Technica article published on Thursday. The projects...

