Security News

A device hi-jacked for the purpose of conducting ‘click-fraud’ can become a conduit for more serious malware such as ransomware. A Damballa study cited an example of how a compromised device, origi...

Here's an overview of some of last week's most interesting news, podcasts, reviews and articles: Penetration Testing With Raspberry Pi Raspberry Pi is a small and portable single board computer ...



I have always liked this one. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

There are two other Snowden stories this week about GCHQ: one about its hacking practices, and the other about its propaganda and psychology research. The second is particularly disturbing: While...

While the Tor anonymity network conceals (relatively successfully) a user's location and Internet activity from anyone who might want to know about it, users should be aware of the fact that it does n...

Cyber attackers and defenders are caught in a permanent to-and-fro dance, coming up with new solutions that break the last one created by their adversaries. An example of this never-ending arms ra...

On Monday, the Intercept published a new story from the Snowden documents: The spy agencies have reverse engineered software products, sometimes under questionable legal authority, and monitored...