Cryptographic key of Facebook’s Free Basics app has been compromised

Last week, APK Mirror and Android Police owner Artem Russakovskii reported that a cryptographic key used by Facebook developers to digitally sign its Free Basics by Facebook app has been compromised, and third-party apps are reusing the key. In the pas… Continue reading Cryptographic key of Facebook’s Free Basics app has been compromised

Mozilla adds protection against fingerprinting and Cryptomining scripts in Firefox Nightly and Beta

Last year, the company announced about adopting an approach to anti-tracking considering user data privacy. The company listed a few key initiatives mitigating harmful practices like fingerprinting and cryptomining. Yesterday, Mozilla announced that it… Continue reading Mozilla adds protection against fingerprinting and Cryptomining scripts in Firefox Nightly and Beta

Slack launches Enterprise Key Management (EKM) to provide complete control over encryption keys

The work collaboration hub, Slack, yesterday, launched Slack Enterprise Key Management (EKM) for its enterprise customers. The feature is introduced to give customers control over their encryption keys used for encrypting and decrypting the files and m… Continue reading Slack launches Enterprise Key Management (EKM) to provide complete control over encryption keys

IBM announces the launch of Blockchain World Wire, a global blockchain network for cross-border payments

Yesterday, IBM launched its Blockchain World Wire, a global blockchain network for cross-border payments that will make use of Stablecoin by U.S. dollars and cryptocurrency to make near real-time cross border financial transactions. It is based on dist… Continue reading IBM announces the launch of Blockchain World Wire, a global blockchain network for cross-border payments

FOSDEM 2019: Designing better cryptographic mechanisms to avoid pitfalls – Talk by Maximilian Blochberger

At FOSDEM 2019, Belgium, Maximilian Blochberger talked about preventing cryptographic pitfalls by avoiding mistakes while integrating cryptographic mechanisms correctly. Blochberger is a research associate at the University of Hamburg. FOSDEM is a free… Continue reading FOSDEM 2019: Designing better cryptographic mechanisms to avoid pitfalls – Talk by Maximilian Blochberger

Introducing CT-Wasm, a type-driven extension to WebAssembly for secure, in-browser cryptography

Researchers from the University of California and the University of Cambridge have come up with Constant-Time WebAssembly (CT-Wasm), the details of which are shared in their paper: CT-Wasm: Type-Driven Secure Cryptography for the Web Ecosystem in Decem… Continue reading Introducing CT-Wasm, a type-driven extension to WebAssembly for secure, in-browser cryptography

DragonFly BSD 5.4.1 released with new system compiler in GCC 8 and more

This Christmas eve, team DragonFly released the 54th version, DragonFly BSD 5.4.1, a free and open-source Unix-like operating system. This version comes with a new system compiler in GCC 8, improved NUMA support, a large number of network and virtual m… Continue reading DragonFly BSD 5.4.1 released with new system compiler in GCC 8 and more

Microsoft urgently releases Out-of-Band patch for an active Internet Explorer remote code execution zero-day vulnerability

Yesterday, Microsoft released an out-of-band patch for a vulnerability discovered in the Internet Explorer that attackers are actively exploiting on the Internet. The IE zero-day can allow an attacker to execute malicious code on a user’s compute… Continue reading Microsoft urgently releases Out-of-Band patch for an active Internet Explorer remote code execution zero-day vulnerability

Sennheiser opens up about its major blunder that let hackers easily carry out man-in-the-middle attacks

Yesterday, Sennheiser, an audio device maker issued a fix for a major software blunder that let hackers  easily carry out man-in-the-middle attacks by cryptographically impersonating any website on the internet. What exactly happened? HeadSetup es… Continue reading Sennheiser opens up about its major blunder that let hackers easily carry out man-in-the-middle attacks