This tiny chip could revolutionize smartphone and IOT security

Engineers at South Korea’s SK Telecom have developed a tiny chip that could help secure communications on a myriad of portable electronics and IOT devices. The chip is just 5 millimeters square — smaller than a fingernail — and is capable of generating mathematically provable random numbers. Such numbers are the basis for highly-secure encryption…

New Unlock26 Ransomware and RaaS Portal Discovered

A recently discovered Ransomware-as-a-Service (RaaS) portal was found to be responsible for the distribution of a brand new ransomware family dubbed Unlock26. Dubbed Dot-Ransomware, the RaaS portal went live on February 19, and security researchers suggest that the Unlock26 ransomware was released the same day. Further, they reveal that the ransomware operation features a very…

20 Questions for SecOps Platform Providers

Security operations capabilities for the masses is long overdue. Here’s how to find a solution that meets your budget and resources. The security operations platform is quickly emerging as a favorite talking point for 2017, even for organizations that do not find themselves with an expansive budget to improve their security maturity and posture. Of…

500,000+ devices have dangerous apps installed

At Mobile World Congress (MWC) 2017, connected cars, the future of smart homes and, of course, the newest handsets are top of the agenda. Intel Security’s latest findings show consumers are being tempted by the efficiency and entertainment of such connected devices, revealing the average British person now spends 35% of their time at home…

D@rk Web L1nk$

To visit the following sites, download Tor. A lot of links contain some illegal activities. We don’t endorse these, so enter at your own risk. Your searches will not be monitored though, that’s the beauty of Tor.

Not all threat intelligence is created equal

Threat intelligence provides you a lot of information and intelligence about what the threats are to your network, and what you need to focus in on from a security perspective. But threat intelligence platforms are, really, that next step in the operational chain. It’s how you actually use, consume and utilize the threat intelligence that’s…

Addressing pain points in governance, risk and compliance

In this day and age, it seems as though every business has some form of alphabet soup or acronym salad that shapes the decisions they make as it pertains to their information security programs. Between data privacy laws, regulations on the financial industry, calls for a healthcare focused cybersecurity framework, and regular updates to the…

Stop using SHA1: It’s now completely unsafe

Security researchers have achieved the first real-world collision attack against the SHA-1 hash function, producing two different PDF files with the same SHA-1 signature. This shows that the algorithm’s use for security-sensitive functions should be discontinued as soon as possible. SHA-1 (Secure Hash Algorithm 1) dates back to 1995 and has been known to be…

This What Hackers Think of Your Defenses

Billions of dollars are spent every year on cyber security products; and yet those products continually fail to protect businesses. Thousands of reports analyze breaches and provide reams of data on what happened; but still the picture worsens. A new study takes a different approach; instead of trying to prevent hacking based on what hacking…