Encryption 101: How to break encryption

Credit to Author: Vasilios Hioureas| Date: Tue, 06 Mar 2018 19:10:34 +0000

Continuing on in our Encryption 101 series, we now look at what it takes to break encryption. In order for something as powerful as encryption to break, there needs to be some kind of weakness to exploit. That weakness is often a result of an error in implementation.

Categories:

Tags:

(Read more…)

The post Encryption 101: How to break encryption appeared first on Malwarebytes Labs.

Read more

Encryption 101: ShiOne ransomware case study

Credit to Author: Vasilios Hioureas| Date: Wed, 28 Feb 2018 16:00:00 +0000

In this case study on ShiOne ransomware, part of our Encryption 101 series, we will be reviewing the encryption process line by line and showing the different methods ransomware can use to encrypt files.

Categories:

Tags:

(Read more…)

The post Encryption 101: ShiOne ransomware case study appeared first on Malwarebytes Labs.

Read more