What is TeslaCrypt? When detected in February 2015, the new ransomware Trojan gained immediate notoriety as a menace to computer gamers. Amongst other types of target files, it tries to infect typical gaming files: game saves, user profiles, recoded replays, etc. That said, TeslaCrypt does not encrypt files that are […]

Understanding VDP

Curious about vulnerability disclosure? We explain what it is, why there may be friction between the researcher and the organization, and possible solutions. What Is a Vulnerability Disclosure? During a vulnerability disclosure, individuals report security weaknesses in computer systems to the organization. Disclosures can be contentious; some organizations prefer not […]