Tag: China

Microsoft's Skype was the platform of choice for cyber criminal communications, even though more secure alternatives exist, a study by Flashpoint concludes.

When Cybercrooks Chat, Privacy isn’t Everything

In-brief: a survey of cyber criminal groups by Flashpoint revealed that secure messaging apps are becoming more popular, but that security isn’t the only thing motivating online criminals. 

As the Chinese President meets at Mar a Lago with President Trump, reports of more Chinese hacking of the US and its allies has surfaced in two reports.

As Trump and Xi Meet, Reports of China-Sponsored Hacks Flare | Digital Guardian

In-brief: On the eve of a high-profile meeting between China’s President Xi Jinping and U.S. President Donald Trump, new reports underscore the continued scourge of Chinese spying on- and theft from the U.S. and its allies. (Editor’s note: this post is excerpted from one that appeared on Digital Guardian’s blog.)

The tactics of cyber criminal hacking crews are indistinguishable from those of sophisticated, state sponsored "advanced persistent threat" groups, the firm FireEye said in its most recent M-Trends report.

Report: Hacking Crews are all APT now

  In-brief:The tactics of cyber criminal hacking crews are indistinguishable from those of sophisticated, state sponsored “advanced persistent threat” groups, the firm FireEye said in its most recent M-Trends report.

A hidden, backdoor account affects a line of VoIP gateways made by DblTek, researchers from TrustWave found. (Image courtesy of DblTek.)

Dbl Trouble: Fix Falls Short for Backdoor in China-Made Devices

In-brief: A hidden, backdoor account affects a line of VoIP gateways made by DblTek, researchers from TrustWave found. The manufacturers fix, however, may not solve the problem. 

Researchers at Google and CWI Amsterdam say they produced the first collision using hashes produced by the SHA-1 algorithm, hastening the end of life for the 22 year old encryption technology.

9 Quintillion Tries Later: Researchers Crack SHA-1

In-brief: Researchers at Google and CWI Amsterdam say they produced the first “collision” of hashes produced with the SHA-1 algorithm, hastening the end of life for the 22-year-old encryption technology.