Tutorials
 
How to hack
 
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
 
Hacker hands
 
password typist
 
virtual private network (VPN)
Hacked’s Wiki
CCN.LA
Trending Topics
Posts Tagged ‘phone security’
Most Recent
 
Read More
January 23, 2016

GCHQ-developed Phone Security Contains Backdoor

In recent months, we’ve learned governments believe there should exist backdoors in tech’s biggest products. We’ve also learned, recently, they’re no hypocrites: the UK government’s official voice encryption protocol has a glaring backdoor allowing security services to eavesdrop, according to new research. The UK government planned to build an assortment of products based on the technology, but this might be under review considering the findings of one cybersecurity expert.

University College London cybersecurity expert, Dr Steven Murdoch, wrote a blog post regarding the MIKEY-SAKKE spec of the UK government’s phone security software, which he conjectures was designed [...]

8991
Tutorials
 
How to Hack
 
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
 
Freeware
 
Malware
Press Releases
 
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
 
SecurityScorecard Announces Data Science Partnership with Columbia University