F-Secure’s Threat Report H1 2013

F-Secure’s Threat Report for the first half of 2013 says that threat vectors have remained similar but got worse over the first half of this year. Watering hole attacks and mobile malware are good examples.

Read More >>

RSA Says Don’t Use NIST Crypto Algorithm

Last week NIST recommended that its elliptic curve specification ‘no longer be used.’ Now, in an email advisory sent to customers, RSA strongly recommends that developers discontinue use of Dual EC DRBG and move to a different PRNG.

Read More >>

Apple iOS 7: A Security Overview

Apple’s new iOS 7, pre-loaded on the new iPhone 5s and 5c, is also available for download to older devices. It is said to include more than 200 new features – here we look at some of the security aspects and issues.

Read More >>