Security News
Anastasia Malashina, a doctoral student at HSE University, has proposed a new method to assess vulnerabilities in encryption systems, which is based on a brute-force search of possible options of symbol deciphering. To avoid hacks, it is necessary to reinforce the cipher protection from leaks and to test encryption systems for vulnerabilities.
Echoworx announced the introduction of biometric authentication to its Echoworx Email Encryption platform, enabling secure passwordless authentication options. By leveraging biometrics, along with their growing list of seven authentication options, Echoworx enables enterprises with the option to access encrypted communications in seconds, without the need for registration, questions or passwords.
UK Home Secretary Priti Patel will badmouth Facebook's use of end-to-end encryption on Monday evening as she links the security technology with paedophilia, terrorism, organised crime, and so on. The ever-popular politician will say at the National Society for the Prevention of Cruelty to Children event: "Sadly, at a time when we need to be taking more action, Facebook are pursuing end-to-end encryption plans that place the good work and progress achieved so far in jeopardy."
The hackers behind the REvil ransomware have released an updated version of the malware that allows them to change Windows passwords and automate file encryption through Safe Mode, according to a recent report from Bleeping Computer. "Brute force password attacks are typically used with RDP simply because people tend to use simple passwords that are easier to remember. Once in a network, REvil moves laterally to deploy ransomware on all resources for maximum effect," Embrey said.
The Belgian plod says it seized 27.64 tons of cocaine worth €1.4bn from shipments into Antwerp in the past six weeks after defeating the encryption in the Sky ECC chat app to read drug smugglers' messages. "During a judicial investigation into a potential service criminal organization suspected of knowingly providing encrypted telephones to the criminal environment, police specialists managed to crack the encrypted messages from Sky ECC," the Belgian police claimed, CNN reports.
At the end of last year, they released a five-page resolution that called for the EU to pass new rules to govern the use of end-to-end encryption in Europe. The most important takeaway here is that encryption is either secure or it is not.
AT&T's public safety network picks up new features, including full tower-to-core encryption and a custom 5G setup. FirstNet, the dedicated public safety cell carrier, is adding 5G support and new encryption for user data.
Entrust announces the integration of its nShield hardware security modules with Microsoft Double Key Encryption. Double Key Encryption for Microsoft 365 protects a company's highly sensitive data using two component keys - one key that is in the customer's control and a Microsoft key stored securely in Microsoft Azure.
Data-stealing ransomware attacks, information harvesting malware, and supply chain attacks are among the critical threats to organizations, according to F-Secure. One of the most notable trends highlighted is the evolution of ransomware - attacks that extort organizations by preventing them from accessing their data.
The Federal Bureau of Investigation this week published an alert to warn of the fact that the Mamba ransomware is abusing the DiskCryptor open source tool to encrypt entire drives, including the operating system. The Mamba ransomware is abusing the open source application for malicious purposes, and has been doing so in a multitude of attacks.