Home / admin (page 20)


This Linux-targeting malware just got more powerful

Image: Getty A cryptomining malware campaign that targets systems and cloud-computing instances running on Linux has added trojan malware to its capabilities – something that could make attacks more dangerous.  Detailed by cybersecurity researchers at Trend Micro, such as several other cryptomining campaigns, this one is secretly compromising Linux systems, using ...

Read More »

How to locate a user’s GPG key in Thunderbird

iStockphoto/Getty Images Back in October, I wrote a piece about using encrypted email in Thunderbird. If you ever have to send sensitive information via email, you should be using encryption. If you’re not encrypting those missives, the information they contain can be read by a third party. You don’t want ...

Read More »