F-Secure’s Threat Report H1 2013

F-Secure’s Threat Report for the first half of 2013 says that threat vectors have remained similar but got worse over the first half of this year. Watering hole attacks and mobile malware are good examples.

Read More >>

RSA Says Don’t Use NIST Crypto Algorithm

Last week NIST recommended that its elliptic curve specification ‘no longer be used.’ Now, in an email advisory sent to customers, RSA strongly recommends that developers discontinue use of Dual EC DRBG and move to a different PRNG.

Read More >>