VanHelsing: Cross-Platform Ransomware Service Targets Global Organizations
A sophisticated new ransomware-as-a-service called VanHelsing has emerged, targeting multiple operating systems with advanced encryption capabilities. The malware has already claimed victims across the US and France, with affiliates receiving up to 80% of ransom payments that can reach $500,000.
Signal Threatens Swedish Withdrawal Over Proposed Surveillance Law
Signal CEO Meredith Whittaker firmly opposes Sweden's proposed law requiring messaging apps to store user communications for law enforcement access. The encrypted messaging service vows to exit the Swedish market rather than compromise its security architecture with backdoors.
Google Cloud Pioneers Quantum-Safe Digital Signatures to Combat Future Encryption Threats
Google Cloud introduces quantum-resistant digital signatures in Cloud KMS, implementing NIST's post-quantum cryptography standards through ML-DSA-65 and SLH-DSA-SHA2-128S algorithms. This proactive measure helps organizations protect against future quantum computing threats while maintaining robust encryption standards.
Inside Sky Global: How an Encrypted Phone Network Became a Criminal Enterprise
A Vancouver tech company marketed ultra-secure phones for privacy but investigations revealed their devices were predominantly used by organized crime networks worldwide. After European authorities cracked Sky ECC's encryption in 2021, evidence showed the company's distribution channels had deep criminal ties while compliance efforts were largely superficial.
Essential Smartphone Security Guide for Protesters: Protecting Your Digital Rights
A comprehensive guide to securing smartphones during protests, covering crucial pre-event preparation, real-time best practices, and post-demonstration data protection. Learn how to safeguard your device, privacy, and fellow protesters while documenting important moments.
Critical Security Flaws Found in Bambu Connect 3D Printer Software
Security researchers have exposed significant vulnerabilities in Bambu Connect's 3D printer control application, revealing weak encryption and easily bypassed security measures. The findings demonstrate how malicious actors could potentially access sensitive data through reverse engineering of the Electron-based software.
Apple Revolutionizes Photo Privacy with Homomorphic Encryption in iOS18
Apple introduces groundbreaking privacy-preserving search in iOS 18's Photos app using homomorphic encryption, allowing users to search images without exposing data to servers. The innovative 'Wally' system processes encrypted queries while maintaining complete user privacy.
Critical BitLocker Flaw Enables Full Encryption Bypass on Latest Windows 11
A persistent vulnerability in Microsoft's BitLocker encryption system allows attackers with physical access to completely bypass protection on fully-updated Windows 11 devices. The 'bitpixie' exploit works even on systems using Secure Boot and TPM, raising serious concerns about BitLocker's security in enterprise environments.
The Unavoidable Trust Paradox: Why We Must Rely on Software Despite Security Risks
In our digital-dependent world, we're forced to place significant trust in software providers despite limited ability to verify security. While emerging solutions offer some protection, understanding the inherent risks helps users make better choices about which software to trust.
U.S. Officials Urged to Boost Mobile Security Amid Chinese Telecom Breaches
CISA has issued new security guidelines for senior U.S. officials following Chinese breaches of major telecommunications providers. The advisory recommends implementing advanced security features like Apple's Lockdown Mode and encrypted messaging apps to protect sensitive communications.