Since 2004, WPA has been the most used and thought secure encryption method in the WiFi standard, so since then, most WiFi networks have been using this standard (WPA2 – WiFi Protected Access 2) and are as it
Since 2004, WPA has been the most used and thought secure encryption method in the WiFi standard, so since then, most WiFi networks have been using this standard (WPA2 – WiFi Protected Access 2) and are as it
A French security researcher from Quarkslab, Adrien Guinet, discovered a way to retrieve the secret encryption keys used by WannyCry ransomware without having to pay. The WannaCry encryption works by generating a pair of keys on the infected
Let’s Encrypt is a very nice initiative that provides free SSL certificates. The downside is that they are only 4 months valid and need to be renewed after that period. It can be a hassle if you run
A nice small documentary about bulletproof hosting and how the entire concept of it has evolved over the years. Norton explores the secret world of bulletproof hosting that’s hidden deep in underground bunkers, isolated at sea, and spread
A few days ago, a Google engineer discovered a new critical bug in the glibc library. The bug was discovered in the domain look-up code for glibc. The bug could potentially allow hackers to maliciously implant code within