Security GNU/Linux distribution designed with cloud pentesting and IoT security in mind. It includes a full portable laboratory for security and digital...
Aletheia is a steganalysis tool for the detection of hidden messages in images. The goal of steganalysis is to identify suspected packages,...
This tool is related to ACM CCS 2017 conference paper #124 Return of the Coppersmith’s Attack: Practical Factorization of Widely Used RSA...
Security GNU/Linux distribution designed with cloud pentesting and IoT security in mind. It includes a full portable laboratory for security and digital...
BitCracker is the first open source BitLocker password cracking tool. BitLocker is a full-disk encryption feature available in recent Windows versions (Vista,...
Patrick O’Neill, a journalist at CyberScoopNews, has claimed that since August 3rd, ShapeShift has been helping law enforcement to trace bitcoin transactions...
Side-channel attacks over AES is not new, previous attacks required a direct access. Now the security experts from Fox-IT and Riscure show how...
Short Bytes: Google has achieved the first successful SHA-1 collision attack. By creating a specially crafted PDF prefix, the researchers were able...
Google announced Project Wycheproof – Test crypto libraries against known attacks, it is created and kept up by individuals from Google Security Team,...
Evolution of TLS1.3 – Enhanced security and speed: As 2016 comes to close and we are preparing for a new year, it’s time...
Short Bytes: One of the biggest data breaches on the Friend Finder Network has compromised the details of 412 million users across...
Short Bytes: An information security company Terbium Labs claims to find your personal data, if it exists, on the dark web. Their...
Short Bytes: The CrypTech project is an independent security hardware development effort that consists of an international team. CrypTech Alpha is an...
Short Bytes: Google has launched a new encryption algorithm in its Chrome web browser to fend off attacks launched by powerful quantum...
Short Bytes: Using “masterpiece”, a new method to generate random numbers by the scientists at the university of Austin, random numbers could...
White Hat Hackers show us how to Steal Crypto Keys from a Laptop in Another Room Sans Internet Connection Last year, it...
A UK man has been charged this week with a non-custodial sentence, after a ransomware infection on his computer made him confess...