Top 3 Myths About Homomorphic Encryption

There’s been a lot of buzz surrounding homomorphic encryption because it comes with a lot of promise. It stands out from other encryption methods as it guarantees the encryption of data while it’s being used for computation. In this scenario, organiza… Continue reading Top 3 Myths About Homomorphic Encryption

Encryption 101: ShiOne ransomware case study

In this case study on ShiOne ransomware, part of our Encryption 101 series, we will be reviewing the encryption process line by line and showing the different methods ransomware can use to encrypt files.
Categories:

Malware
Threat analysis

Tags… Continue reading Encryption 101: ShiOne ransomware case study