Summary

Total Articles Found: 8

Top sources:

Top Keywords:

Top Authors

Top Articles:

  • Germany Talking about Banning End-to-End Encryption
  • G7 Comes Out in Favor of Encryption Backdoors
  • $35M fine for Morgan Stanley after unencrypted, unwiped hard drives are auctioned
  • New SHA-1 Attack
  • Wi-Fi Chip Vulnerability
  • MEGA claims it can’t decrypt your files. But someone’s managed to…
  • Serious vulnerabilities in Matrix’s end-to-end encryption have been patched
  • 238 Google Play apps with >440 million installs made phones nearly unusable

Serious vulnerabilities in Matrix’s end-to-end encryption have been patched

Published: 2022-09-28 16:00:27

Popularity: 17

Author: Dan Goodin

Keywords:

  • Biz & IT
  • element
  • encryption
  • Matrix
  • MESSENGER
  • Previously overlooked flaws allow malicious homeservers to decrypt and spoof messages.

    ...more

    $35M fine for Morgan Stanley after unencrypted, unwiped hard drives are auctioned

    Published: 2022-09-20 21:22:34

    Popularity: 400

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • data retention
  • encryption
  • hard drives
  • "Astonishing failures" over a 5-year span.

    ...more

    MEGA claims it can’t decrypt your files. But someone’s managed to…

    Published: 2022-06-22 15:52:41

    Popularity: 73

    Author: Pieter Arntz

    Keywords:

  • Reports
  • ciphertext
  • curve25519
  • ed25519
  • encryption
  • MEGA
  • 🤖: "Megadelete"

    Swiss researchers debunked MEGA's claims that anyone that would be able to take over MEGA's infrastructure would still not have access to your information and files. The post MEGA claims it can’t decrypt your files. But someone’s managed to… appeared first on Malwarebytes Labs.

    ...more

    Wi-Fi Chip Vulnerability

    Published: 2020-03-03 12:43:15

    Popularity: 194

    Author: Bruce Schneier

    Keywords:

  • encryption
  • hacking
  • hardware
  • patching
  • vulnerabilities
  • Wi-Fi
  • 🤖: ""Hack alert""

    There's a vulnerability in Wi-Fi hardware that breaks the encryption: The vulnerability exists in Wi-Fi chips made by Cypress Semiconductor and Broadcom, the latter a chipmaker Cypress acquired in 2016. The affected devices include iPhones, iPads, Macs, Amazon Echos and Kindles, Android devices, and Wi-Fi routers from Asus and Huawei, as well as the Raspberry Pi 3. Eset, the security...

    ...more

    New SHA-1 Attack

    Published: 2020-01-08 15:38:49

    Popularity: 364

    Author: Bruce Schneier

    Keywords:

  • academic papers
  • certifications
  • cryptography
  • encryption
  • forgery
  • impersonation
  • keys
  • PGP
  • SHA-1
  • 🤖: ""Hash fail""

    There's a new, practical, collision attack against SHA-1: In this paper, we report the first practical implementation of this attack, and its impact on real-world security with a PGP/GnuPG impersonation attack. We managed to significantly reduce the complexity of collisions attack against SHA-1: on an Nvidia GTX 970, identical-prefix collisions can now be computed with a complexity of 261.2rather than264.7,...

    ...more

    238 Google Play apps with >440 million installs made phones nearly unusable

    Published: 2019-06-04 19:20:02

    Popularity: None

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • adware
  • android
  • encryption
  • google play
  • obfuscation
  • Carefully concealed plugin bombarded users with ads during inopportune times.

    ...more

    Germany Talking about Banning End-to-End Encryption

    Published: 2019-05-24 13:39:37

    Popularity: 551

    Author: Bruce Schneier

    Keywords:

  • crypto wars
  • cryptography
  • encryption
  • Germany
  • 🤖: "gov snooping 📱👻"

    Der Spiegel is reporting that the German Ministry for Internal Affairs is planning to require all Internet message services to provide plaintext messages on demand, basically outlawing strong end-to-end encryption. Anyone not complying will be blocked, although the article doesn't say how. (Cory Doctorow has previously explained why this would be impossible.) The article is in German, and I would...

    ...more

    G7 Comes Out in Favor of Encryption Backdoors

    Published: 2019-04-23 14:14:10

    Popularity: 495

    Author: Bruce Schneier

    Keywords:

  • backdoors
  • encryption
  • G7
  • hacking
  • key escrow
  • keys
  • law enforcement
  • terrorism
  • 🤖: "Backdoor detected"

    From a G7 meeting of interior ministers in Paris this month, an "outcome document": Encourage Internet companies to establish lawful access solutions for their products and services, including data that is encrypted, for law enforcement and competent authorities to access digital evidence, when it is removed or hosted on IT servers located abroad or encrypted, without imposing any particular technology...

    ...more

    end