article thumbnail

Attorney General William Barr on Encryption Policy

Schneier on Security

Yesterday, Attorney General William Barr gave a major speech on encryption policy -- what is commonly known as "going dark." Nor are we necessarily talking about the customized encryption used by large business enterprises to protect their operations. After all, we are not talking about protecting the Nation's nuclear launch codes.

article thumbnail

Attorney General Barr and Encryption

Schneier on Security

Last month, Attorney General William Barr gave a major speech on encryption policy­what is commonly known as "going dark." Nor are we necessarily talking about the customized encryption used by large business enterprises to protect their operations. After all, we are not talking about protecting the Nation's nuclear launch codes.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Bart Gellman on Snowden

Schneier on Security

This isn't news; we learned about this in 2006. It was an opsec disaster; they would have been much more secure if they'd emailed the encrypted files. I wanted them to send encrypted random junk back and forth constantly, to hide when they were actually sharing real data. But there are lots of new details.).

article thumbnail

SHARED INTEL: How ransomware evolved from consumer trickery to deep enterprise hacks

The Last Watchdog

Although most people think of ransomware as a dodgy application that encrypts data and holds it for ransom, the concept is much more heterogeneous than that. The Archiveus Trojan from 2006 was the first one to use RSA cipher, but it was reminiscent of a proof of concept and used a static 30-digit decryption password that was shortly cracked.

article thumbnail

Ransomware news headlines trending on Google

CyberSecurity Insiders

It first infiltrates the victim network, steals data and then locks it out with encryption until a ransom is paid. Hacking group Industrial Spy has a habit of targeting large organizations and sells their data in the marketplace.

article thumbnail

Hacked Data Broker Accounts Fueled Phony COVID Loans, Unemployment Claims

Krebs on Security

In 2006, The Washington Post reported that a group of five men used stolen or illegally created accounts at LexisNexis subsidiaries to lookup SSNs and other personal information more than 310,000 individuals. Also in 2013, KrebsOnSecurity broke the news that ssndob[.]ms Dun & Bradstreet , and Kroll Background America Inc.

article thumbnail

Hackers target Bear Grylls TV Presenter with Cyber Attack

CyberSecurity Insiders

But the intention of the cyber crook/s was clear- to create business disruption, to encrypt data from access for financial gain and to put a dent on the overall reputation of the company. After seeing success with Man Vs Wild television show in 2006, Bear launched his own television studio in association with Banijay Productions in 2019.