Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
19 résultats taggé Encryption  ✕
NIST Selects HQC as Fifth Algorithm for Post-Quantum Encryption https://www.nist.gov/news-events/news/2025/03/nist-selects-hqc-fifth-algorithm-post-quantum-encryption
14/03/2025 16:09:29
QRCode
archive.org
thumbnail

The new algorithm will serve as a backup for the general encryption needed to protect data from quantum computers developed in the future

NIST EN 2025 algorithm Post-Quantum Encryption
Ransomware abuses Amazon AWS feature to encrypt S3 buckets https://www.bleepingcomputer.com/news/security/ransomware-abuses-amazon-aws-feature-to-encrypt-s3-buckets/
13/01/2025 20:12:07
QRCode
archive.org
thumbnail

A new ransomware campaign encrypts Amazon S3 buckets using AWS's Server-Side Encryption with Customer Provided Keys (SSE-C) known only to the threat actor, demanding ransoms to receive the decryption key.

bleepingcomputer EN 2025 Encryption Ransomware Computer S3 Amazon AES Security AWS
New ShrinkLocker ransomware uses BitLocker to encrypt your files https://www.bleepingcomputer.com/news/security/new-shrinklocker-ransomware-uses-bitlocker-to-encrypt-your-files/
25/05/2024 22:01:44
QRCode
archive.org
thumbnail

A new ransomware strain called ShrinkLocker creates a new boot partition to encrypt corporate systems using Windows BitLocker.

bleepingcomputer EN 2024 BitLocker Encryption Ransomware ShrinkLocker Windows Security InfoSec Computer-Security
How ransomware abuses BitLocker | Securelist https://securelist.com/ransomware-abuses-bitlocker/112643/
25/05/2024 19:12:04
QRCode
archive.org
thumbnail

The Kaspersky GERT has detected a VBS script that has been abusing Microsoft Windows features by modifying the system to lower the defenses and using the local MS BitLocker utility to encrypt entire drives and demand a ransom.
#BitLocker #Data #Descriptions #Encryption #Incident #Malware #Microsoft #Ransomware #Technologies #Windows #response

Descriptions Incident BitLocker Microsoft Windows Encryption Ransomware Malware response Data Technologies
Marriott admits it falsely claimed for five years it was using encryption during 2018 breach | CSO Online https://www.csoonline.com/article/2096365/marriott-admits-it-falsely-claimed-for-five-years-it-was-using-encryption-during-2018-breach.html
03/05/2024 09:05:47
QRCode
archive.org
thumbnail

Marriot revealed in a court case around a massive 2018 data breach that it had been using secure hash algorithm 1 and not the much more secure AES-1 encryption as it had earlier maintained.

csoonline EN 2024 lie Marriot 2018 data-breach encryption
Unpatchable vulnerability in Apple chip leaks secret encryption keys https://arstechnica.com/security/2024/03/hackers-can-extract-secret-encryption-keys-from-apples-mac-chips/
21/03/2024 16:50:21
QRCode
archive.org
thumbnail

Fixing newly discovered side channel will likely take a major toll on performance.

arstechnica EN 2024 gofetch Side-Channel encryption keys
Apple iOS 17.4: iMessage Gets Post-Quantum Encryption in New Update https://www.wired.com/story/apple-pq3-post-quantum-encryption/
21/02/2024 15:14:39
QRCode
archive.org
thumbnail

Useful quantum computers aren’t a reality—yet. But in one of the biggest deployments of post-quantum encryption so far, Apple is bringing the technology to iMessage.
#apple #computing #encryption #privacy #quantum #security

wired EN 2024 apple encryption computing quantum privacy
New Black Basta decryptor exploits ransomware flaw to recover files https://www.bleepingcomputer.com/news/security/new-black-basta-decryptor-exploits-ransomware-flaw-to-recover-files/
31/12/2023 10:18:20
QRCode
archive.org
thumbnail

Researchers have created a decryptor that exploits a flaw in Black Basta ransomware, allowing victims to recover their files for free.

bleepingcomputer EN 2023 Black-Basta Decryptor Encryption Flaw Ransomware XOR
Terrapin attacks can downgrade security of OpenSSH connections https://www.bleepingcomputer.com/news/security/terrapin-attacks-can-downgrade-security-of-openssh-connections/
20/12/2023 20:48:09
QRCode
archive.org
thumbnail

Academic researchers developed a new attack called Terrapin that manipulates sequence numbers during the handshake process to breaks the SSH channel integrity when certain widely-used encryption modes are used.

bleepingcomputer EN 2023 Cyberattack Encryption Man-In-The-Middle-Attack SSH Terrapin Vulnerability
European Telecom Body to Open-Source Radio Encryption System https://www.inforisktoday.com/european-telecom-body-to-open-source-radio-encryption-system-a-23599
16/11/2023 16:20:58
QRCode
archive.org
thumbnail

The European telecom standards body behind a widely used radio encryption system will soon open-source its encryption protocols. The European Telecommunications

inforisktoday EN 2023 TETRA ETSI Open-Source Radio Encryption MidnightBlue
StripedFly: Perennially flying under the radar https://securelist.com/stripedfly-perennially-flying-under-the-radar/110903/
26/10/2023 23:06:55
QRCode
archive.org
thumbnail

Nobody would even suspect the mining malware was merely a mask, masquerading behind an intricate modular framework that supports both Linux and Windows. The amount of effort that went into creating the framework is truly remarkable, and its disclosure was quite astonishing.

securelist EN 2023 stripedfly NSA Data-theft Encryption EternalBlue Linux Malware-Descriptions Malware-Technologies Miner Targeted-attacks TOR
“Please do not make it public”: Vulnerabilities in Sogou Keyboard encryption expose keypresses to network eavesdropping https://citizenlab.ca/2023/08/vulnerabilities-in-sogou-keyboard-encryption/
10/08/2023 10:11:12
QRCode
archive.org
thumbnail
  • We analyzed Tencent’s Sogou Input Method, which, with over 450 million monthly active users, is the most popular Chinese input method in China.
  • Analyzing the Windows, Android, and iOS versions of the software, we discovered troubling vulnerabilities in Sogou Input Method’s custom-designed “EncryptWall” encryption system and in how it encrypts sensitive data.
  • We found that network transmissions containing sensitive data such as those containing users’ keystrokes are decipherable by a network eavesdropper, revealing what users are typing as they type.
  • We disclosed these vulnerabilities to Sogou developers, who released fixed versions of the affected software as of July 20, 2023 (Windows version 13.7, Android version 11.26, and iOS version 11.25).
  • These findings underscore the importance for software developers in China to use well-supported encryption implementations such as TLS instead of attempting to custom design their own.
citizenlab EN 2023 Sogou Keyboard encryption eavesdropping
TETRA Radio Code Encryption Has a Flaw: A Backdoor https://www.wired.com/story/tetra-radio-encryption-backdoor/
30/07/2023 21:08:14
QRCode
archive.org
thumbnail

A secret encryption cipher baked into radio systems used by critical infrastructure workers, police, and others around the world is finally seeing sunlight. Researchers say it isn’t pretty.

wired EN 2023 TETRA encryption cipher Flaw Backdoor police
A Shady Chinese Firm’s Encryption Chips Got Inside NATO and NASA https://www.wired.com/story/hualan-encryption-chips-entity-list-china/
17/06/2023 13:06:40
QRCode
archive.org
thumbnail

The US government warns encryption chipmaker Hualan has suspicious ties to China’s military. Yet US agencies still use one of its subsidiary’s chips, raising fears of a backdoor.

wired EN 2023 US China chipmaker cybersecurity china encryption national-security Supply-Chain backdoor
PSA: upgrade your LUKS key derivation function https://mjg59.dreamwidth.org/66429.html
23/04/2023 11:23:25
QRCode
archive.org

Here's an article from a French anarchist describing how his (encrypted) laptop was seized after he was arrested, and material from the encrypted partition has since been entered as evidence against him. His encryption password was supposedly greater than 20 characters and included a mixture of cases, numbers, and punctuation, so in the absence of any sort of opsec failures this implies that even relatively complex passwords can now be brute forced, and we should be transitioning to even more secure passphrases.

Or does it? Let's go into what LUKS is doing in the first place. The actual data is typically encrypted with AES, an extremely popular and well-tested encryption algorithm. AES has no known major weaknesses and is not considered to be practically brute-forceable - at least, assuming you have a random key. Unfortunately it's not really practical to ask a user to type in 128 bits of binary every time they want to unlock their drive, so another approach has to be taken.

mjg59 EN Linux LUKS KDF cracked police encryption password AES
New Money Message ransomware demands million dollar ransoms https://www.bleepingcomputer.com/news/security/new-money-message-ransomware-demands-million-dollar-ransoms/
03/04/2023 12:08:34
QRCode
archive.org
thumbnail

A new ransomware gang named 'Money Message' has appeared, targeting victims worldwide and demanding million-dollar ransoms not to leak data and release a decryptor.

bleepingcomputer EN 2023 Data-Theft Double-Extortion Encryption Money-Message Ransomware
New Paper on Old Threema Protocol https://threema.ch/en/blog/posts/news-alleged-weaknesses-statement
09/01/2023 22:50:34
QRCode
archive.org
thumbnail

This is a statement on the NZZ news article from January 9, 2023 about alleged weaknesses in Threema's encryption. But these are completely impractical and theoretical.

threema EN 2023 statement NZZ weaknesses encryption Old Protocol
Microsoft Office 365 Message Encryption Insecure Mode of Operation | WithSecure™ Labs https://labs.withsecure.com/advisories/microsoft-office-365-message-encryption-insecure-mode-of-operation
14/10/2022 16:11:00
QRCode
archive.org
thumbnail

Microsoft Office 365 Message Encryption (OME) utilitises Electronic Codebook (ECB) mode of operation. This mode is insecure and leaks information about the structure of the messages sent and can lead to partial or full message disclosure.

withsecure EN 2022 Security-advisory 365 office365 leak Encryption ECB disclosure
Fears grow for smaller nations after ransomware attack on Costa Rica escalates https://techcrunch.com/2022/05/20/costa-rica-ransomware-attack/
21/05/2022 09:57:07
QRCode
archive.org
thumbnail

The Russia-linked ransomware gang demanded $20 million in ransom — and the overthrow of Costa Rica's elected government. Where does that leave smaller, equally vulnerable nation states?

cyberattacks techcrunch EN 2022 data-breaches emsisoft encryption healthcare Conti law-enforcement president ransomware Costarica
4259 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio