Kryptotel

March 28, 2017
The Cyber Security News

Hackers claim access to millions of iCloud accounts, demand ransom from Apple

A hackers group calling itself 'Turkish Crime Family' has claimed access to over 500 million iCloud accounts, and has threatened Apple to wipe out these accounts if they do not pay a ransom amount.

March 2, 2017
Top Cyber Attacks of 2016

Top Cyber Attacks of 2016

Government agencies, corporates firms and leading banks – all have faced cyber-attacks in past. Here is a summary of some of the biggest cyber-security attacks, breaches and data thefts that came into light in 2016.

February 21, 2017
Encryption Algorithms - RSA, AES, Twofish, Blowfish, SHA, MD5, 3DES,

Encryption Algorithms

Some of the most commonly used encryption algorithms are: Triple DEC/DEC, RSA, AES, Blowfish, Twofish, MD5, SHA, HMAC, etc. In this blog post we explain these encryption algorithms in detail.

February 13, 2017
Encryption Cyber Security

Encryption

In the contemporary world where the news about data leaks and security breaches have become quite frequent, cyber-security and more specifically encryption is an important concept for many companies to understand and implement. Security breaches and data leaks cost millions of dollars to organizations.