Find out if you are affected by DNS Leaks

Tuesday, May 19th, 2015

Whenever you use anonymity or privacy solutions to protect your Internet traffic from being snooped on or to bypass censorship and location-based restrictions, you need to make sure data about your actual location in the world or underlying system does not leak. A basic recent example is WebRTC, a new technology ...

UK Government Rewrites Laws to Let GCHQ Hack Into Computers Legally

Sunday, May 17th, 2015

The UK Government has been quietly changing the Anti-Hacking Laws quietly that exempt GCHQ, police, and other electronic intelligence agencies from criminal prosecution for hacking into computers and mobile phones and carrying out its controversial surveillance practices. The details of the changes were disclosed at the Investigatory Powers Tribunal, which is ...

Google Aims at Phishing with Password Alert

Wednesday, April 29th, 2015

Phishing pages are tricky by nature: they look like standard login pages, but are actually faux sites run by people looking to receive and steal passwords. Google is taking steps to thwart this common and dangerous trap with its Password Alert service. Password Alert is an open-source Chrome extension that ...

No Backdoors in Truecrypt, Finds Code Review

Tuesday, April 7th, 2015

A long-awaited code review of encryption service Truecrypt has finally been completed, with the good news being that there are no deliberate backdoors in the “relatively well-designed” piece of software. Cryptographic expert Matthew Green revealed the news in a blog post last week, claiming that the NCC Crypto Services group had found “no ...

New crypto-ransomware “quarantines” files, downloads info-stealer

Tuesday, April 7th, 2015

Trend Micro researchers have found and analyzed a new piece of crypto-ransomware: CryptVault encrypts files, makes them look like files quarantined by an AV solution, asks for ransom and, finally, downloads info-stealer malware. It arrives on target computers after the user has been tricked into downloading and running a malicious attachment ...