365 days of blogs
New year, new beginnings and all that. This year I have set myself a challenge…
Read More
New year, new beginnings and all that. This year I have set myself a challenge…
Read MoreJust over a week ago, I posted that Google had now made the use of…
This week saw a combined effort from law enforcement and judicial authorities from eleven countries…
Google's Threat Analysis Group (TAG) have released a statement this week showing that multiple government-backed…
A post uploaded yesterday by @vx_herm1t on X shows the current home page of Russian…
In the last post, I discussed the properties of cryptographic keys, and the different types…
So far in this short guide to encryption, we have looked at some of the…
One of the desirable properties of an encryption system is that of high variance, or…
In the previous post, I identified a few common terms used in encryption, and then…
We all know encryption is the no.1 tool used to keep data private - we…
SolarWinds, MoveIT, NotPetya, CCleaner, Equifax, Target. All the above names have one thing in common…