Security News

Deanonymizing Tor users with Raptor attacks (Help Net Security)
2015-03-17 12:10

A group of researchers from Princeton University and ETH Zurich have found yet another way to deanonymize Tor users. "There are essentially two ways for an adversary to gain visibility into Tor tra...

Do smart machines require ethical programming? (Help Net Security)
2015-03-17 09:46

Realizing the potential of smart machines — and ensuring successful outcomes for the businesses that rely on them — will hinge on how trusted smart machines are and how well they maintain that trust. ...

"Black Box" brouhaha breaks out over brute forcing of iPhone PIN lock (Naked Security)
2015-03-17 09:26

A brouhaha has broken out about a "Black Box" that can brute force your iPhone PIN by trying every possible combination, from 00..00 to 99..99. Apparently, it can even circumvent the "10 mistakes...

The evolution of vendor risk management in financial institutions (Help Net Security)
2015-03-17 09:09

The Financial Services industry has long been recognized as a leader in establishing many of the security and fraud detection practices that have influenced best practices in other sectors. In fact, t...

Silk Road lieutenant Peter Nash pleads guilty (Naked Security)
2015-03-17 09:02

Australian Peter Nash, who worked as the main moderator of the online drugs bazaar, pleaded guilty to money laundering and drug trafficking.

The Andromeda botnet is ballooning once again (Help Net Security)
2015-03-17 08:26

Cybercriminals are, once again, trying to swell the number of computers compromised by the Andromeda backdoor. This will allow them to control the machines and download additional malware at the behes...

How Snowden's revelations affected Americans' communication habits and online activities (Help Net Security)
2015-03-17 08:26

Nearly two years after news outlets started reporting on previously publicly unknown surveillance and data collection practices by the US NSA and its counterparts around the world, not many Americans ...