Receive all Cointelegraph news immediately in Telegram.
WannaCry is, in fact, the second attack to make use of the NSA-exploited Windows loopholes, it has emerged.
In wake of the WannaCry cyberattacks, Blockchain offers security solutions.
Our London correspondent Nick Ayton reports on what really is behind the WannaCry ransomware outbreak and why things don’t entirely add up.
A global ransomware attack developed using a leaked NSA tool successfully breached into 100,000 computer systems and servers across 99 countries. Bitcoin had minimal involvement.
A group of hackers called Shadow Brokers reveals the NSA likely hacked into SWIFT and knew about compromises in Microsoft Windows.
Andreas Antonopoulos: “It is certain that the NSA has already built quantum computers; Do they use that to break Bitcoin? The simple answer is ‘no.’”
Government and NSA could place trapdoors on millions of Diffie-Hellman-generated cryptographic keys to decrypt websites, applications, and encrypted messaging tools.
WikiLeaks validates the identity of the Equation group. Edward Snowden suggests this leak is a warning that someone can prove US responsibility for any attacks which originated from this malware.
Want privacy online? Are you a Linux enthusiast? The NSA may have already classified you as an extremist.
CISA (Cybersecurity Information Sharing Act of 2015) easily passed through the U.S. Senate’s vote on Tuesday, creating a new avenue for consumer data sharing that benefits anti-privacy entities like the NSA
The Intercept, an online publication launched in February 2014 has published 48 top-secret and classified documents released by Edward Snowden about XKEYSCORE
The act legalized and simplified the collecting of phone metadata for the NSA. Meanwhile Skype continues to collect data and deliver it to the Five Eyes
Republican Senator from Kentucky and presidential hopeful Rand Paul has succeeded in thwarting the renewal of the Patriot Act’s mass surveillance measures outlined in Section 215.
The U.S. House of Representatives has voted to end dragnet spying on American communications.
The newly patched “Venom” vulnerability in virtualization software is “perfect” for any organization targeting bitcoin wallets, private keys and forum passwords.
For updates and exclusive offers, enter your e-mail below.
You registration completed successfully.
Confirmation email sent to email address provided.