New Spyware Law in Germany Poses Threat for Press FreedomThis June, German lawmakers approved legislation that would hand security forces the power to use spyware. The security agencies in... BLOG Ransomware Gangs Have a New Trick Up their Sleeves: Double-Encrypting Your Data June 16, 2021 Ransomware that double-encrypts your data is an emerging trend among ransomware gangs looking to score big. As we learn everywhere,... Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username... Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many... Encrypting your files is not enough for ransomware operators anymore July 9, 2020 Ransomware attacks have become a trend in the malware world, and they are a goldmine for their operators. The usual... Digital Security vs. Digital Privacy June 10, 2020 Due to the lack of uniformly recognized standards, many SME customers will be confused by some security professional terms. They... Protect Yourself While Sharing & Downloading Files April 13, 2020 Sharing and downloading files, such as documents, programs, pictures, music, and movies is one of the most appreciated aspects of... How does Data Encryption Work? March 24, 2020 Most of us know that when we say “data encryption,” it’s a data security measure used to protect sensitive information,... What is The EARN IT Act? March 23, 2020 The crime of child sexual assault has always been a problem that society hopes to combat. Recently, the US Congress... Working From Home? Make Voice or Video calls on PC using Signal Private Messenger March 18, 2020 One thing the recent pandemic has taught us is the importance of remote work and securing communications. In times like... Growing requirement of Password Managers March 5, 2020 With a growing demand for Log-in feature before entering a website, has flooded people with user IDs and passwords. Be... What is The Ryuk Ransomware June 7, 2019 Ransomware is a malware attack which takes over a user’s computer and threatens harm, if a payment is not made.... US, UK Governments Call for Mandatory Backdoors in Encrypted Messaging September 4, 2018 The recent Five Eyes ministerial meeting in late August has seen the governments of the US, UK, Australia, New Zealand... Report: WhatsApp ‘Backdoor’ Leaves Encrypted Communication Vulnerable January 17, 2017 New research has claimed that the way in which popular messaging platform WhatsApp has implemented its end-to-end encryption protocol leaves... Researchers Show NSA’s Capability to Break Trillions of Encrypted Connections October 17, 2016 Researchers have fundamentally proven that NSA broke the most-widely used encryption on the internet. It was 2014 when documents leaked... CryptoWall Surpassing Expectations: Victims Paying Up to $2000 to Get Files Back October 23, 2014 You might have heard about the infamous ransomware CryptoLocker. It was something of a prototype for the current wave of...
New Spyware Law in Germany Poses Threat for Press FreedomThis June, German lawmakers approved legislation that would hand security forces the power to use spyware. The security agencies in...
BLOG Ransomware Gangs Have a New Trick Up their Sleeves: Double-Encrypting Your Data June 16, 2021 Ransomware that double-encrypts your data is an emerging trend among ransomware gangs looking to score big. As we learn everywhere,... Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username... Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many... Encrypting your files is not enough for ransomware operators anymore July 9, 2020 Ransomware attacks have become a trend in the malware world, and they are a goldmine for their operators. The usual... Digital Security vs. Digital Privacy June 10, 2020 Due to the lack of uniformly recognized standards, many SME customers will be confused by some security professional terms. They... Protect Yourself While Sharing & Downloading Files April 13, 2020 Sharing and downloading files, such as documents, programs, pictures, music, and movies is one of the most appreciated aspects of... How does Data Encryption Work? March 24, 2020 Most of us know that when we say “data encryption,” it’s a data security measure used to protect sensitive information,... What is The EARN IT Act? March 23, 2020 The crime of child sexual assault has always been a problem that society hopes to combat. Recently, the US Congress... Working From Home? Make Voice or Video calls on PC using Signal Private Messenger March 18, 2020 One thing the recent pandemic has taught us is the importance of remote work and securing communications. In times like... Growing requirement of Password Managers March 5, 2020 With a growing demand for Log-in feature before entering a website, has flooded people with user IDs and passwords. Be... What is The Ryuk Ransomware June 7, 2019 Ransomware is a malware attack which takes over a user’s computer and threatens harm, if a payment is not made.... US, UK Governments Call for Mandatory Backdoors in Encrypted Messaging September 4, 2018 The recent Five Eyes ministerial meeting in late August has seen the governments of the US, UK, Australia, New Zealand... Report: WhatsApp ‘Backdoor’ Leaves Encrypted Communication Vulnerable January 17, 2017 New research has claimed that the way in which popular messaging platform WhatsApp has implemented its end-to-end encryption protocol leaves... Researchers Show NSA’s Capability to Break Trillions of Encrypted Connections October 17, 2016 Researchers have fundamentally proven that NSA broke the most-widely used encryption on the internet. It was 2014 when documents leaked... CryptoWall Surpassing Expectations: Victims Paying Up to $2000 to Get Files Back October 23, 2014 You might have heard about the infamous ransomware CryptoLocker. It was something of a prototype for the current wave of...
Ransomware Gangs Have a New Trick Up their Sleeves: Double-Encrypting Your Data June 16, 2021 Ransomware that double-encrypts your data is an emerging trend among ransomware gangs looking to score big. As we learn everywhere,...
Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username...
Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many...
Encrypting your files is not enough for ransomware operators anymore July 9, 2020 Ransomware attacks have become a trend in the malware world, and they are a goldmine for their operators. The usual...
Digital Security vs. Digital Privacy June 10, 2020 Due to the lack of uniformly recognized standards, many SME customers will be confused by some security professional terms. They...
Protect Yourself While Sharing & Downloading Files April 13, 2020 Sharing and downloading files, such as documents, programs, pictures, music, and movies is one of the most appreciated aspects of...
How does Data Encryption Work? March 24, 2020 Most of us know that when we say “data encryption,” it’s a data security measure used to protect sensitive information,...
What is The EARN IT Act? March 23, 2020 The crime of child sexual assault has always been a problem that society hopes to combat. Recently, the US Congress...
Working From Home? Make Voice or Video calls on PC using Signal Private Messenger March 18, 2020 One thing the recent pandemic has taught us is the importance of remote work and securing communications. In times like...
Growing requirement of Password Managers March 5, 2020 With a growing demand for Log-in feature before entering a website, has flooded people with user IDs and passwords. Be...
What is The Ryuk Ransomware June 7, 2019 Ransomware is a malware attack which takes over a user’s computer and threatens harm, if a payment is not made....
US, UK Governments Call for Mandatory Backdoors in Encrypted Messaging September 4, 2018 The recent Five Eyes ministerial meeting in late August has seen the governments of the US, UK, Australia, New Zealand...
Report: WhatsApp ‘Backdoor’ Leaves Encrypted Communication Vulnerable January 17, 2017 New research has claimed that the way in which popular messaging platform WhatsApp has implemented its end-to-end encryption protocol leaves...
Researchers Show NSA’s Capability to Break Trillions of Encrypted Connections October 17, 2016 Researchers have fundamentally proven that NSA broke the most-widely used encryption on the internet. It was 2014 when documents leaked...
CryptoWall Surpassing Expectations: Victims Paying Up to $2000 to Get Files Back October 23, 2014 You might have heard about the infamous ransomware CryptoLocker. It was something of a prototype for the current wave of...