http://www.makeuseof.com/tag/torrentlocker-new-ransomware-evil/
CyberTechTips
"TorrentLocker" Malware Combines Elements From CryptoLocker, CryptoWall
A new piece of ransomware called TorrentLocker has been analyzed by researchers, and uses visual components borrowed from CryptoLocker and CryptoWall.
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences
Feds haven’t reached out about massive password cache – IT firms struggle t
IT firms struggle to fix busted Web padlock — Black Hat’s big idea: U.S. should buy zero days — Beijing says it won’t buy Apple products
So Google scans email for dodgy images - should we be worried about scannin
You could be forgiven for not having heard of John Henry Skillern. The 41 year old is facing charges of possession and promotion of child pornography after Google detected images of child abuse on …
How to recover files from a CryptoLocker attack, without paying!
Boffins have created a free service to help anyone has fallen foul of the notorious CryptoLocker ransomware that encrypts computer files and demands a ransom be paid for the decryption key.
File encryption comes to Chrome and ChromeOS
How to Keep Data Out of Hackers’ Hands
For people worried about identity theft and privacy, the discovery by Hold Security of a giant database of stolen data is highly personal. But there are steps everyone can take to minimize the hackers’ impact.
Synology users plagued by SynoLocker encryption malware, data at risk
Another Ransomware Menace
Visit the Wrong Website, and the FBI Could End Up in Your Computer
Minilock, a simple but powerful file encryption app
New Protection Scheme Makes Weak Passwords Virtually Uncrackable
ownCloud 7.0.0 Private RSA Key Disclosure
Information Security Services, News, Files, Tools, Exploits, Advisories, and Whitepapers
Terrorists are turning to Android encryption post-Snowden (Wired UK)
How Credit Card Skimmers Work, and How to Spot Them
A credit card skimmer is a malicious device criminals attach to a payment terminal---most commonly on ATMs and gas pumps.
Why the Security of USB Is Fundamentally Broken
Computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections, we depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. But the security problems with USB devices run deeper than you think: Their risk isn’t \[…\]
Bleep... BitTorrent Unveils Serverless & Encrypted Chat Client
BitTorrent Inc., the company behind the popular file-sharing client uTorrent , unveiled its serverless chat client today. BitTorrent Bleep allows users to communicate via text or voice, fully encrypted and without the need for central servers.
'Signal' for iOS Lets Users Make Encrypted Voice Calls for Free
Open source software group Open Whisper Systems today released a new encrypted phone app called Signal, which is designed to allow its users to make...
Privacy and the Pool of Information
If nothing bad that we know about has happened as a result of the N.S.A.’s “incidental collection” of data of ordinary Americans, what’s the problem?
ShazzleMail- Application to maintain your email privacy
카지노사이트 정보에 대한 모든것카지노사이트 정보를 알려드리겠습니다. 현대 사회에서 빠르게 성장하고 있는 온라인 도박 산업의 핵심입니다. 이 기사에서는 카지노사이트에 대한 모든 정보를 다루며, 온라인 도박의 변화와 흥미로운 측면을 탐구하고자 합니다.
How to better protect your iPhone and iPad against 'backdoors' and other se
Security and convenience are perpetually at war. There will always be errors, compromises, and oversights that put our privacy at risk. Old ones will get fixed but new ones will get discovered. So wha
The App I Used to Break Into My Neighbor’s Home
Leave your ring of cut-brass secrets unattended on your desk at work, at a bar table while you buy another round, or in a hotel room, and any stranger---or friend---can upload your keys to their online collection.
EFF unveils secure, sharing-friendly, privacy-minded router OS
As promised, the Open Wireless Movement's new sharing-friendly, privacy-minded router operating system was unveiled at HOPE X in New York last weekend. The OS, a joint project of Electronic Frontier…
Passware Kit Forensic v13.5.8557-BRD
Easier Ways to Protect Email From Unwanted Prying Eyes
Security experts say email is a lot more like a postcard than a letter inside an envelope, and almost anyone can read it while the note is in transit.
Are TrueCrypt Users Screwed?
Browser
LIVE: Detention Lift Hearings For Assange, Stockholm District Court
At 13:00 July 16, hearings were held in the Stockholm District Court whether to lift the almost-four-year-old detention in absentia for Julian Assange. This...