Insecure defaults in Intel AMT allow an intruder to completely bypass user and BIOS passwords and TPM and Bitlocker PINs to backdoor almost any corporate laptop in a matter of seconds.
Several multistage attacks that use cryptocurrency-related lures to infect victims with backdoors and reconnaissance malware that have been attributed to the Lazarus Group have been uncovered by Proofpoint researchers.
APT group Turla is using a toxic Trojan disguised as a Firefox extension to secretly communicate the URL path for the C&C server to its malware minions.
Slew of bugs and backdoors means device is unsafe to use
Nemucod changes tactics to infect systems - Trojan spreads backdoors instead of ransomware
Brian Chappell looks at why the backdoors of the Snooper's Charter are so repugnant to tech firms and how it can't be reconciled with the government's own directive to businesses to protect people's personal data.
Data creation and transmission is growing exponentially, with 2.8 zettabytes of data created in 2012, forecast to reach 40 zettabytes (ZB) by 2020 (IDC), and currently encryption offers the best option to secure all that data says Roi Perez
Federal authorities and Apple are now battling over the FBI vs. Apple iPhone encryption case.
Security firm goes full disclosure on mechanics of SSH issue and finds three more vulnerabilities
In today's age of political instability are backdoors necessary to safeguard national borders, or would it instead increase technical vulnerability and undo the progress that encryption has provided, asks Rick Orloff?
A group of high tech corporate powerhouses has gathered together to protest a law proposed by the UK government that would allow an array of legal and intelligence agencies the ability to access computer data through backdoors and decryption.
A position paper written by the Dutch government assesses the arguments for and against encryption backdoors but comes down firmly against downgrading the technology.