Blog keyword search

There is a place for unauthenticated key exchange, but don't tell anyone

Making dragnet surveillance harder justifies using weak form of encryption.
Making dragnet surveillance harder justifies using weak form of encryption. Discussions on how to make the Internet more secure have been going on ever since the first two… https://virusbulletin.com/blog/2013/11/there-place-unauthenticated-key-exchange-don-t-tell-anyone/

Rogue Twitter application steals passwords

'See who stalks my Twitter' used to lure users.
'See who stalks my Twitter' used to lure users. A malicious Twitter application is currently spreading on the microblogging network, luring users to hand over their passwords,… https://virusbulletin.com/blog/2011/07/rogue-twitter-application-steals-passwords/

Zitmo trojan for Android defeats two-factor authentication

Malware intercepts TANs sent via SMS.
Malware intercepts TANs sent via SMS. A new variant of the Zitmo trojan has been discovered that infects mobile devices running the Android platform and which intercepts SMS… https://virusbulletin.com/blog/2011/07/zitmo-trojan-android-defeats-two-factor-authentication/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.