Let’s Encrypt: Delivering SSL/TLS Everywhere

Tuesday, November 18th, 2014

Vital personal and business information flows over the Internet more frequently than ever, and we don’t always know when it’s happening. It’s clear at this point that encrypting is something all of us should be doing. Then why don’t we use TLS (the successor to SSL) everywhere? Every browser in ...

ISPs Stripping Encryption from Personal Mails

Friday, November 14th, 2014

The Electronic Frontier Foundation (EFF), an internet freedom watchdog group, is reporting that for the past few months, some ISPs in the US and Thailand have been caught removing encryption from customers’ emails, by stripping a security flag called STARTTLS from the messages. The STARTTLS flag is an essential security and ...

Microsoft posts critical patch for huge Windows vulnerability that affects all modern machines

Tuesday, November 11th, 2014

Remember Heartbleed? You know, the exploit in SSL that was so bad it got its own brand? Microsoft may have an issue of similar scale on its hands with a critical patch issued via Windows Update today. The patch in question is MS14-066, or otherwise known as the cryptically named “Vulnerability in Schannel ...

Darkhotel APT Malware Targets Global CEOs Using Hotel Internet

Tuesday, November 11th, 2014

A seven-year-old cyber espionage campaign has targeted senior level executives from large global companies by using a specialized Advanced Persistent Threat (APT), zero-day exploits, and well-developed keyloggers to extract information from them when they stay in luxury hotels during their business trips. The researchers at Moscow-based security firm Kaspersky Lab dubbed ...

Personal info of 800,000 USPS employees compromised in breach

Tuesday, November 11th, 2014

The US Postal Service has joined the ranks of private sector companies and governmental agencies that have been breached and had data stolen by hackers. According to a statement released by the service on Monday, the attackers managed to find a way into some of their information systems, and have likely ...