Tor launches anti-censorship Messenger service
A new chat tool has been launched in an effort to improve the security of online messaging. Tor Messenger allows users to chat over the Tor (The Onion Router) networkRead More →
Data Security News | Infosec Blog | Information Security Tutorials
A new chat tool has been launched in an effort to improve the security of online messaging. Tor Messenger allows users to chat over the Tor (The Onion Router) networkRead More →
Calling the formal recognition of the .onion as a Special-use Domain Name by the Internet Engineering Task Force (IETF) “a small and important landmark in the movement to build privacyRead More →
Google began to implement SSL on its search engine back in 2010. First on its own domain name, then as a mandatory feature for logged in Google users, andRead More →
US Army Military experts urge the establishment of an Army Vulnerability Response Program (AVRP), a sort of military bug bounty program. What happen when bug hunters have to work with high sensitiveRead More →
Timing attacks has proven practical since 96′ as shown in a paper by Paul C. Kocher. In his paper Paul demonstrate how, by effectively measuring the amount of time requiredRead More →
Does your Chrome browser seem a little “off”, but you can’t figure out why? Maybe it’s eFast. Here’s another reason to slow down when installing software, especially free software. ARead More →
It could have been just another one of those jostlings that happen on the train: a man bumped into a writer for SC Magazine. Except, as Roi Perez tells it,Read More →
The Federal Bureau of Investigation (FBI) has stated that it’s completely fine to pay ransom to cyber criminals. If you are a fan of Hollywood movies you may be familiar withRead More →
Despite its controversial nature, the US Senate has passed the Cybersecurity Information Sharing Act (CISA). Detractors are concerned because CISA would open up an information exchange between the public andRead More →
Buying and selling things online are just two of the many activities Internet users are fond of doing. For some, they shop for clothes, bags, shoes, jewelries, and books; forRead More →