How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Posts Tagged ‘phone security’
Most Recent
Read More
January 23, 2016

GCHQ-developed Phone Security Contains Backdoor

In recent months, we’ve learned governments believe there should exist backdoors in tech’s biggest products. We’ve also learned, recently, they’re no hypocrites: the UK government’s official voice encryption protocol has a glaring backdoor allowing security services to eavesdrop, according to new research. The UK government planned to build an assortment of products based on the technology, but this might be under review considering the findings of one cybersecurity expert.

University College London cybersecurity expert, Dr Steven Murdoch, wrote a blog post regarding the MIKEY-SAKKE spec of the UK government’s phone security software, which he conjectures was designed [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University