New Locky Ransomware Strain Emerges Latest version goes by the .asasin extension and is collecting information on users' computer operating system and IP address.
Secure Wifi Hijacked by KRACK Vulns in WPA2 All modern WiFi access points and devices that have implemented the protocol vulnerable to attacks that allow decryption, traffic hijacking other attacks. Second, unrelated crypto vulnerability also found in RSA code library in TPM chips.
Game Change: Meet the Mach37 Fall Startups CEOs describe how they think their fledgling ventures will revolutionize user training, privacy, identity management and embedded system security.
What's Next After HTTPS: A Fully Encrypted Web? As the rate of HTTPS adoption grows faster by the day, it's only a matter of time before a majority of websites turn on SSL. Here's why.
Security No. 1 Inhibitor to Microsoft Office 365 Adoption More businesses are switching to Office 365 despite fear of social engineering and ransomware attacks, but some remain wary.
Kaspersky Lab and the AV Security Hole It's unclear what happened in the reported theft of NSA data by Russian spies, but an attacker would need little help to steal if he or she had privileged access to an AV vendor's network, security experts say.