Popular instant messaging service Telegram provides optional end-to-end encrypted messaging and, in general, is highly focused on protecting user privacy.
The team running the Perfect Privacy VPN service has discovered a serious vulnerability that affects all VPN providers that offer port forwarding, and which can be exploited to reveal the real IP address of users.
The main piece of news on Monday was that Dell's desktop PCs and laptops shipped since August 2015 contain a root CA certificate (eDellRoot) complete with the private cryptographic key for it.
All desktop and laptops shipped by Dell since August 2015 contain a root CA certificate (eDellRoot) complete with the private cryptographic key for it, opening users to the danger of Man-in-the-Middle and signed malware attacks.
Do ISIS terrorists use encryption, and if so, what tools do they favour? The Combating Terrorism Centre (CTC), an academic institution at the US Military Academy in West Point, has managed to get their hands on a guide to operational security that's apparently given out to members and sympathisers - a guide that defines which tools to use (and how to use them correctly) and which to avoid.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.