May 23, 2016 TeslaCrypt Shuts Itself Down 2 min read - The developers behind the TeslaCrypt ransomware stopped the malware's operations despite its success and popularity, leading many to ask why.
May 17, 2016 Let’s Encrypt Gets Certbot, a New Client From the EFF 2 min read - Certbot, a Let's Encrypt client designed to help websites encrypt their traffic, was recently announced by the Electronic Frontier Foundation.
May 3, 2016 Free Decrypter Now Available for Alpha Ransomware 2 min read - Security researchers have developed a decrypter for Alpha ransomware, but some other variants recently spotted may not even need this type of tool.
Endpoint April 26, 2016 SS7 Vulnerability Isn’t a Flaw — It Was Designed That Way 2 min read - The SS7 vulnerability may have recently made headlines, but the flaw itself has actually been around for decades and is integral to the user experience.
April 21, 2016 JIGSAW Takes Crypto-Ransomware in Deadly Directions 2 min read - The crypto-ransomware JIGSAW, which encrypts and then deletes files from machines, uses scenes from the movie "Saw" to scare its victims to pay up.
April 5, 2016 New Block Ciphers From NIST Add Tweaks to Credit Card Information 2 min read - The National Institute of Standards and Technology (NIST) announced two block cipher algorithms that will preserve data formatting in secure POS systems.
Data Protection March 25, 2016 Quantum Computing Gets a Performance Boost — Is It Enough to Break RSA? 2 min read - Researchers at MIT achieved scalable quantum computing, and its potential success could spell the end for RSA encryption going forward.
Threat Intelligence March 22, 2016 Living in the Past: Business Encryption Needs to Get With the Times or Get Hacked 2 min read - Now that the vulnerabilities of numerous encryption standards have been laid bare, it's only a matter of time before organizations are targeted.
Cloud Security March 17, 2016 What Are the Real Security Risks of the Cloud? 2 min read - While there are security risks associated with cloud services, there are also ways organizations can combat these risks with best practices.
Intelligence & Analytics March 11, 2016 From the 2016 RSA Conference: What Security Controls Should You Be Concerned With? 2 min read - As a security professional, what themes and trends presented at the 2016 RSA Conference should have your attention as you build out security programs?