
ESET discovers new malware project of the elusive Ke3chang APT group ESET researchers have discovered new versions of malware families…

Paragon Software Group, a recognized data storage expert, releases Paragon APFS SDK Community Edition – a free source code on…

NIST announces the publication of Special Publication (SP) 800-57 Part 2 Revision 1, Recommendation for Key Management: Part 2 –…


From Fully Decentralized Username / Password Authentication, Seamless Web UX Integration to Wallet Automation – All Built into Its Open…


In late 2018, on the final day of parliament for 2018, the Telecommunications and Other Legislation Amendment (Assistance and Access)…


The Parliamentary Joint Committee on Intelligence and Security has exercised its powers to refer the Telecommunications and Other Legislation Amendment…



NIST invites comments on Draft Special Publication (SP) 800-133 Revision 1, Recommendation for Cryptographic Key Generation, which discusses the generation…


Crossword Cybersecurity plc review of nearly 1,200 global projects finds Cyber Physical Systems, Privacy, IoT and Cryptography are the strongest…


The Australian Strategic Policy Institute (ASPI) has released a report, Perceptions survey: Industry views of the economic implications of the…


Imagine if you could spend the same currency note in two different places. In traditional currency this is not possible…