Browsing: Malware


The Secret Code of Beatrix Potter

The Secret Code of Beatrix Potter Interesting: As codes go, Potter’s wasn’t inordinately complicated. Read full news article on Schneier on Security

News Apple

Securing iOS Data at Rest: Encryption

In this post, we’ll look at advanced uses of encryption for user data in iOS apps. We’ll start with a high-level look at AES encryption, and then go on to…

News Attacks

How the CIA gained access to air-gapped computers

A new WikiLeaks release of documents believed to have been stolen from the CIA show the intelligence agency’s capability to infect air-gapped computers and networks via booby-trapped USB sticks. The…

1 2 3 51