A group of MIT researchers have devised two attacks that could identify, with a high degree of certainty (88%), an anonymous hidden service or client.
The adoption of the cloud continues to grow rapidly with Gartner forecasting $282 billion in spending by 2018.
A vulnerability in the popular secure remote access software OpenSSH can be exploited by attackers to try to brute-force their way into the connection and access Internet-facing computers and/or servers.
There are a variety of ways to secure data, either on the perimeter or within the LAN, but the most fundamental method in a defense-in-depth model is hardware encryption.
It has been known for quite some time that the RC4 cryptographic cypher - used in popular Internet protocols such as TLS and HTTPS - is vulnerable to attack, but two security researchers from University of Leuven have hopefully put the final nail in that particular coffin.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.