Secure Wifi Hijacked by KRACK Vulns in WPA2 All modern WiFi access points and devices that have implemented the protocol vulnerable to attacks that allow decryption, traffic hijacking other attacks. Second, unrelated crypto vulnerability also found in RSA code library in TPM chips.
What's Next After HTTPS: A Fully Encrypted Web? As the rate of HTTPS adoption grows faster by the day, it's only a matter of time before a majority of websites turn on SSL. Here's why.
New Locky Ransomware Strain Emerges Latest version goes by the .asasin extension and is collecting information on users' computer operating system and IP address.