Australia Passes Anti-Encryption Bill—Here’s Everything You Need To Know

Australia’s House of Representatives has finally passed the “Telecommunications Assistance and Access Bill 2018,” also known as the Anti-Encryption Bill, on Thursday that would now allow law enforcement to force Google, Facebook, WhatsApp, Signal, and … Continue reading Australia Passes Anti-Encryption Bill—Here’s Everything You Need To Know

New Cold Boot Attack Unlocks Disk Encryption On Nearly All Modern PCs

Security researchers have revealed a new attack to steal passwords, encryption keys and other sensitive information stored on most modern computers, even those with full disk encryption.

The attack is a new variation of a traditional Cold Boot Attack,… Continue reading New Cold Boot Attack Unlocks Disk Encryption On Nearly All Modern PCs

ROBOT Attack: 19-Year-Old Bleichenbacher Attack On Encrypted Web Reintroduced

A 19-year-old vulnerability has been re-discovered in the RSA implementation from at least 8 different vendors—including F5, Citrix, and Cisco—that can give man-in-the-middle attackers access to encrypted messages.

Dubbed ROBOT (Return of Bleichenbach… Continue reading ROBOT Attack: 19-Year-Old Bleichenbacher Attack On Encrypted Web Reintroduced

Serious Crypto-Flaw Lets Hackers Recover Private RSA Keys Used in Billions of Devices

If you think KRACK attack for WiFi is the worst vulnerability of this year, then hold on…

…we have got another one for you which is even worse.

Microsoft, Google, Lenovo, HP and Fujitsu are warning their customers of a potentially serious vulnerability in widely used RSA cryptographic library produced by German semiconductor manufacturer Infineon Technologies.

It’s noteworthy that this

Continue reading Serious Crypto-Flaw Lets Hackers Recover Private RSA Keys Used in Billions of Devices

WhatsApp Backdoor allows Hackers to Intercept and Read Your Encrypted Messages

Important Update — Most Security Experts argued, “It’s not a backdoor, rather it’s a feature,” but none of them denied the fact that, if required, WhatsApp or a hacker can intercept your end-to-end encrypted chats. Read detailed explanation on arguments in my latest article.

Most people believe that end-to-end encryption is the ultimate way to protect your secret communication from snooping, and

Continue reading WhatsApp Backdoor allows Hackers to Intercept and Read Your Encrypted Messages

Explained — What’s Up With the WhatsApp ‘Backdoor’ Story? Feature or Bug!

What is a backdoor?

By definition: “Backdoor is a feature or defect of a computer system that allows surreptitious unauthorized access to data, ” either the backdoor is in encryption algorithm, a server or in an implementation, and doesn’t matter whet… Continue reading Explained — What’s Up With the WhatsApp ‘Backdoor’ Story? Feature or Bug!

Explained — What’s Up With the WhatsApp ‘Backdoor’ Story?

What is a backdoor?

By definition: “Backdoor is a feature or defect of a computer system that allows surreptitious unauthorized access to data, ” either the backdoor is in encryption algorithm, a server or in an implementation, and doesn’t matter whet… Continue reading Explained — What’s Up With the WhatsApp ‘Backdoor’ Story?

WhatsApp Backdoor allows Hackers to Intercept and Read Your Encrypted Messages

Important Update — Most Security Experts argued, “It’s not a backdoor, rather it’s a feature,” but none of them denied the fact that, if required, WhatsApp or a hacker can intercept your end-to-end encrypted chats. Read detailed explanation on arguments in my latest article.

Most people believe that end-to-end encryption is the ultimate way to protect your secret communication from snooping, and

Continue reading WhatsApp Backdoor allows Hackers to Intercept and Read Your Encrypted Messages

Researchers Demonstrated How NSA Broke Trillions of Encrypted Connections

In the year 2014, we came to know about the NSA’s ability to break Trillions of encrypted connections by exploiting common implementations of the Diffie-Hellman key exchange algorithm – thanks to classified documents leaked by ex-NSA employee Edward Snowden.

At that time, computer scientists and senior cryptographers had presented the most plausible theory: Only a few prime numbers were

Continue reading Researchers Demonstrated How NSA Broke Trillions of Encrypted Connections

How to Crack Android Full Disk Encryption on Qualcomm Devices

The heated battle between Apple and the FBI provoked a lot of talk about Encryption – the technology that has been used to keep all your bits and bytes as safe as possible.

We can not say a lot about Apple’s users, but Android users are at severe risk when it comes to encryption of their personal and sensitive data.

Android’s full-disk encryption can be cracked much more easily than expected

Continue reading How to Crack Android Full Disk Encryption on Qualcomm Devices