Other Attempts to Take Over Open Source Projects
Other Attempts to Take Over Open Source Projects After the XZ Utils discovery, people have been examining other open-source projects....
Other Attempts to Take Over Open Source Projects After the XZ Utils discovery, people have been examining other open-source projects....
Last week, the internet dodged a major nation-state attack that would have had catastrophic cybersecurity repercussions worldwide. It’s a catastrophe...
xz Utils Backdoor The cybersecurity world got really lucky last week. An intentionally placed backdoor in xz Utils, an open-source...
EU Court of Human Rights Rejects Encryption Backdoors The European Court of Human Rights has ruled that breaking end-to-end encryption...
New iPhone Exploit Uses Four Zero-Days Kaspersky researchers are detailing “an attack that over four years backdoored dozens if not...
This is a fun challenge: The NIST elliptic curves that power much of modern cryptography were generated in the late...
Signal Will Leave the UK Rather Than Add a Backdoor Totally expected, but still good to hear: Onstage at TechCrunch...
New Revelations from the Snowden Documents Jake Appelbaum’s PhD thesis contains several new revelations from the classified NSA documents provided...
A bunch of networks, including US Government networks, have been hacked by the Chinese. The hackers used forged authentication tokens...
Seems that there is a deliberate backdoor in the twenty-year-old TErrestrial Trunked RAdio (TETRA) standard used by police forces around...