Petya Ransomware Upgrades Its Crypto The new version of the Petya ransomware features the proper implementation of Salsa20 as well as a more complex preprocessing algorithm.
HTTPoxy Can Enable Man-in-the-Middle Attacks A 15-year-old scripting vulnerability known as HTTPoxy is exposing many Linux distributions and programming languages to man-in-the-middle attacks.
Cybersecurity Training for BT Security Employees to Include CISSP and SSCP BT Security will offer its employees the opportunity to pursue ISC2's professional certifications during their cybersecurity training.
Phone Verification May Not Catch Premium Number Costs Belgium-based bug bounty hunter Arne Swinnen exploited holes in the phone verification services offered by Instagram, Google and Microsoft.
Inside the Bunker at Wimbledon 2016 IBM's security experts are dedicated to protecting the Wimbledon brand and its reputation as one of the premier tennis tournaments in the world.