cryptography

AppWizard
March 11, 2026
Meta has introduced Advanced Browsing Protection (ABP) in its Messenger application to enhance user safety by identifying harmful websites during chats. ABP utilizes a constantly updated watchlist of potentially harmful websites, improving upon the existing Safe Browsing feature. Due to end-to-end encryption, Messenger cannot access message content or links, so ABP uses cryptography and secure computing techniques for link verification without exposing them. When a user clicks a link, Messenger checks it against a blocklist using a privacy-preserving query system. Users can enable or disable ABP in the Messenger app under Settings, Privacy & safety, and Safe browsing. If the option is not visible, users may need to update the app.
Winsage
January 30, 2026
Microsoft will disable the NTLM authentication protocol by default in the next major Windows Server release and associated Windows client versions. NTLM, introduced in 1993, has been vulnerable to various cyberattacks, including NTLM relay and pass-the-hash attacks. The transition plan includes three phases: enhanced auditing tools in Windows 11 24H2 and Windows Server 2025, new features like IAKerb and a Local Key Distribution Center in late 2026, and eventually disabling network NTLM by default in future releases. NTLM will remain in the operating system but will not be used automatically. Microsoft deprecated NTLM authentication in July 2024 and has encouraged developers to transition to Kerberos or Negotiation authentication.
AppWizard
January 28, 2026
Threema is a Swiss messaging service founded in 2012, which now has over 12 million users and approximately 8,000 organizations globally. The platform's ownership has recently changed to Comitis Capital GmbH. Threema uses a unique approach to user identity by assigning a random eight-digit ID instead of requiring personal information like phone numbers or email addresses. Messages are stored locally and deleted from servers after delivery, enhancing privacy. It operates on a paid model with a one-time fee, supports anonymous payments, and employs high-grade cryptography for security. Users can send text and voice messages, share files up to 100 MB, and conduct end-to-end encrypted voice and video calls. Threema targets individuals and organizations prioritizing privacy and data protection, while it may not appeal to those seeking free apps or cloud-based chat history. Key features include end-to-end encryption, QR-based contact verification, and local group management capabilities.
AppWizard
January 16, 2026
The past year saw a 45% increase in new vulnerabilities targeting Android. By the end of 2024, there are projected to be 2.87 million apps on Google Play, with 66% of American employees using personal smartphones for work. Mobile applications are responsible for 70% of digital interactions, and vulnerabilities in these apps contributed to approximately 40% of data breaches involving personal data in 2023. Effective Android App Vulnerability Scanners analyze app security by identifying insecure local storage, hardcoded credentials, weak cryptography, insecure network configurations, broken authentication flows, and misconfigured components. AI-powered scanners, like AutoSecT, can autonomously generate new scanning protocols quickly, detect zero-day vulnerabilities, automate penetration testing, and operate with near-zero false positives.
Winsage
December 25, 2025
Microsoft has introduced a hardware-accelerated BitLocker encryption system for Windows 11, which shifts the encryption workload from software to dedicated accelerator units in future CPU microarchitectures. This new system is available in Windows 11 version 25H2 and Windows Server 2025 following the September update. Initial testing shows that certain workloads can achieve double the storage performance and reduce CPU usage by over 70%. The encryption processing is offloaded to a fixed-function cryptography engine within the system on chip (SoC), and encryption keys are hardware-wrapped for enhanced security. The initial rollout focuses on Intel vPro platforms with Core Ultra Series 3 "Panther Lake" processors, with plans to extend support to other vendors. Performance data indicates that while sequential read and write speeds are similar between software and hardware approaches, random 4K operations show significant improvements, with hardware-accelerated BitLocker being 2.3 times faster in RND4K Q32T1 tests and demonstrating a 40% speed increase for single-queue random reads and a 2.1 times speed increase for single-queue random writes.
Winsage
December 19, 2025
Microsoft has announced the phased discontinuation of the RC4 encryption cipher, with full implementation expected by mid-2026. RC4, created in 1987, has been increasingly recognized as a vulnerability, exploited in various high-profile cyberattacks. Microsoft plans to disable RC4 by default in Windows Kerberos authentication, encouraging organizations to transition to more secure alternatives like AES-256. This decision follows years of warnings from the cybersecurity community and aims to eliminate long-standing cryptographic weaknesses. The transition will require organizations to audit and upgrade their infrastructures, as many legacy applications still depend on RC4. Disabling RC4 is expected to reduce the success rates of attacks exploiting weak encryption. Microsoft has introduced tools to help administrators identify hidden RC4 usage. The change reflects a commitment to zero-trust architectures and aligns with recommendations from organizations like NIST. Experts recommend a multi-step approach for organizations to navigate this transition effectively.
Winsage
November 30, 2025
Colonel Ludovic Monnerat emphasized the need for satellite systems to adopt quantum-safe methods due to looming quantum threats. Graham McMillan noted that past AI failures have not led to industry maturity, predicting significant structural shifts from AI meltdowns. Marina Marceta highlighted the importance of a risk-aware culture in cybersecurity to align security with business objectives. A new wave of ClickFix attacks uses deceptive “Windows Update” screens to distribute malware. Researchers from watchTowr found that code formatting sites are exposing sensitive information like API keys. cnspec is an open-source tool for maintaining security and compliance across cloud environments. The Tor Project plans to implement Counter Galois Onion encryption to enhance user anonymity. An ISC2 survey revealed that supply chain risks are a top concern for cybersecurity professionals. There are various job openings in the cybersecurity field for different skill levels.
Search