/Jul 13, 2017
Safeguarding TLS against attack in the quantum computing age will require changes to today’s TLS key exchange algorithms.
/May 16, 2017
Is the Intel AMT vulnerability as bad as we all first thought? Either way, here are some suggestions for protecting yourself.
/May 02, 2017
One simple error led to the capture of notorious hacker Sabu—and the revelation of his identity.
/Apr 18, 2017
Notorious hacker of Anonymous and LulzSec fame is challenged by rival hacker, The Jester, to reveal his identity.
/Jan 19, 2017
In just four short years, encryption estimates have gone from almost non-existent (in the low single digits before 2013) to just over 50% by the end of 2016. How much of a victory is this?
/Oct 23, 2016
According to DARPA, it takes an average of 312 days for security pros to discover software vulnerabilities such as viruses, malware, and other attacks. In hacker time, that’s a virtual eternity in which bad actors can wreak havoc.
/Aug 02, 2016
Malicious actors and eavesdroppers are forcing Internet communication into a single cryptographic protocol: SSL.
Get the latest application threat intelligence from F5 Labs.
Follow us on social media.