Archive for October, 2018


Ransomware has been around for years and has inflicted financial losses estimated in the billions of dollars. As one of the most lucrative types of malware, from a financial perspective, ransomware developers have invested considerable time, effort, and knowledge into perfecting both its delivery mechanisms and its capabilities. Continue reading

After the much-needed break, from the kernel community, the creator of the world’s most used technology, Linux, is back, Torvalds is expected to meet fellow kernel developer at the ongoing open source summit in Edinburg, Scotland. Continue reading

The notch on the Pixel 3 XL is probably one of the most derided smartphone features in history, or, judging by our comments section, the worst thing to ever happen in the history of the universe. A wonderfully apt bug experienced by a small number of users manifests itself as an additional notch on the right side of the display, and it could hardly be funnier. Continue reading

If you have any working knowledge of the technological world, then you will be familiar with GitHub. The web-based hosting service enables the distribution of version-controlled code, encouraging the sharing and collaboration between those who use code regularly. The theory is that, by lowering these barriers and instigating the distribution of new ideas, technology spreads more rapidly, as it can easily be accessed and used by others – this is known as Open Source Software. Continue reading

What is Julia? A fresh approach to numerical computing

Julia is a free open source, high-level, high-performance, dynamic programming language for numerical computing. It has the development convenience of a dynamic language with the performance of a compiled statically typed language, thanks in part to a JIT-compiler based on LLVMthat generates native machine code, and in part to a design that implements type stability through specialization via multiple dispatch, which makes it easy to compile to efficient code. Continue reading

In previous articles we’ve mentioned how Ransomware has wreaked havoc, invading systems and putting organizations’ reputation and stability at stake. In this article, we’ll start with the basics and describe what ransomware is and how it is used by cybercriminals to attack tens of thousands of systems by taking advantage of system-vulnerabilities. Continue reading

We are constantly being bombarded with questions around the security of our data, but what about security for the devices needed to connect to that data? The world is a changing place and for those inclined to be unsavoury characters, a great place to anonymously make ill-gotten gains from unsuspecting victims who thought they were doing due diligence with their base-model anti-malware and anti-virus programs. After multiple data breaches, we now realize that these solutions are weak.  Continue reading

In recent years, we have seen a trend of commercial spyware being sold to governments. This is a very controversial subject, not least because of the frequent use of this spyware against opposition targets. However, there is general agreement that the malware tends in most cases to be well written. Continue reading

How can we build respect into products and systems? What role does cryptography play in respectful design? Speaking today at CITP is Lea Kissner (@LeaKissner), global lead of Privacy Technology at Google. Lea has spent the last 11 years designing and building security and privacy for Google projects from the grittiest layers of infrastructure to the shiniest user features — and cleaning up when something goes awry. She earned a Ph.D. in cryptography at Carnegie Mellon and a B.S. in CS from UC Berkeley. Continue reading

Smart home Internet of Things (IoT) devices have a growing presence in consumer households. Learning thermostats, energy tracking switches, video doorbells, smart baby monitors, and app- and voice-controlled lights, speakers, and other devices are all increasingly available and affordable. Many of these smart home devices continuously monitor user activity, raising privacy concerns that may pose a barrier to adoption. Continue reading