Hackers could be reading your encrypted messages

… ; The flaw works when an attacker already has access to a … encrypted emails. The vulnerability allows hackers to read an encrypted email … the flaw and that the attack could be mitigated by avoiding … VISIT THE SOURCE ARTICLE Hackers could be reading…

BGP leaks and cryptocurrencies

Over the few last hours, a dozen news stories have broken about how an attacker attempted (and perhaps managed) to steal cryptocurrencies using a BGP leak. CC BY 2.0 image by elhombredenegro What is BGP? The Internet is composed of routes. For our DNS resolver…

Winter Olympics hit with cyber attack during opening ceremony

… “servers were hacked by an unidentified attacker,” reported the … cyber attack but would not reveal the source of the attack. … Russian-backed hackers might have been planning an attack … of ‘Russian fingerprints’ in hacking attacks on information resources … VISIT THE SOURCE…