The mathematics behind PQC: the codes
New post-quantum digital signature proposals: the second NIST competition
Locky is a type of malware that can encrypt critical files on your computer and hold them hostage while demanding a ransom payment. The cybercriminals promise to give users a...
Social engineering is a technique for obtaining information widely used by experienced hackers and spies and, since it involves (especially in the last phase of the attack) a more direct...
At the end of last year, a security company discovered a serious threat to the world of cell phones and beyond: Simjacker, an attack technique that allows, in fact, to...