Security News
EFF says security researchers are impinged by DMCA laws that prevent reverse engineering software to find security flaws.
Damballa goes deep with Furtim and SFG malware to uncover new details about how the two are connected, distributed and who their targets are.
Are you willing to sacrifice a dozen or so of your files in order to save the rest from the grasping hands of modern crypto-ransomware? I believe that the answer from most victims would be a...
Two researchers have discovered over 100 Tor nodes that are spying on hidden services. Cory Doctorow explains: These nodes -- ordinary nodes, not exit nodes -- sorted through all the traffic that...
The default implementation for KeyStore, the system in Android designed to store users credentials and cryptographic keys, is broken, researchers say.