Security

Keylime security software is deployed to IBM cloud

Keylime, a cloud security software architecture, is being adopted into IBM's cloud fleet. Originally developed at MIT Lincoln Laboratory to allow system administrators to ensure the security of their cloud environment, Keylime ...

Telecom

A backdoor in mobile phone encryption from the '90s still exists

The encryption algorithm GEA-1 was implemented in mobile phones in the 1990s to encrypt data connections. Since then, it has been kept secret. Now, a research team from Ruhr-Universität Bochum (RUB), together with colleagues ...

Security

Finland IDs hackers linked to parliament spying attack

Finland's domestic security agency said Thursday that the cybergroup APT31, which is generally linked to the Chinese government, was likely behind a cyberspying attack on the information systems of the Nordic country's parliament.

Internet

Polish state websites hacked and used to spread false info

Two Polish government websites were hacked Wednesday and used briefly to spread false information about a non-existent radioactive threat, in what a Polish government official said had the hallmarks of a Russian cyberattack.

Internet

Securing the internet

While many people can name an Internet Service Provider (ISP) and describe what an ISP does, fewer people know the exchange of internet traffic that happens between different ISPs' networks, which are called Autonomous Systems ...

page 5 from 7