Remove 2013 Remove Encryption Remove Risk
article thumbnail

Attorney General William Barr on Encryption Policy

Schneier on Security

Yesterday, Attorney General William Barr gave a major speech on encryption policy -- what is commonly known as "going dark." But, in the world of cybersecurity, we do not deal in absolute guarantees but in relative risks. I wrote about all this, and more, in 2013.). It is about communications: ­data in transit.

article thumbnail

Attorney General Barr and Encryption

Schneier on Security

Last month, Attorney General William Barr gave a major speech on encryption policy­what is commonly known as "going dark." But, in the world of cybersecurity, we do not deal in absolute guarantees but in relative risks. I wrote about all this, and more, in 2013.). It is about communications­data in transit.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Two NSA Algorithms Rejected by the ISO

Schneier on Security

The ISO has rejected two symmetric encryption algorithms: SIMON and SPECK. These algorithms were both designed by the NSA and made public in 2013. The risk of using NSA-designed ciphers, of course, is that they include NSA-designed backdoors. They are optimized for small and low-cost processors like IoT devices.

IoT 196
article thumbnail

Credit Reporting Companies Put Customer Data at Risk

Adam Levin

Experian, 2013 – 2015: Hackers stole a trove of information from T-Mobile customers whose data had passed through Experian to check credit there and open a new account. It does this through encryption, making life difficult for malicious actors. The data included addresses, birthdays, and even Social Security numbers.

Risk 218
article thumbnail

HHS Office for Civil Rights Proposes Measures to Strengthen Cybersecurity in Health Care Under HIPAA

Thales Cloud Protection & Licensing

In response to ongoing security threats and privacy violations, the Department of Health and Human Services (HHS) has published significant updates to the HIPAA Security Rulethe first substantial revision since 2013. Encryption of ePHI : Protecting electronic health information, even if its intercepted.

article thumbnail

Experts Fear Crooks are Cracking Keys Stolen in LastPass Breach

Krebs on Security

In November 2022, the password manager service LastPass disclosed a breach in which hackers stole password vaults containing both encrypted and plaintext data for more than 25 million users. LastPass disclosed that criminal hackers had compromised encrypted copies of some password vaults, as well as other personal information.

article thumbnail

NSA, CISA Report Outlines Risks, Mitigations for Kubernetes

eSecurity Planet

Since Docker hit the scene in 2013, containers have become a primary way for developers to create and deploy applications in an increasingly distributed IT world of on-premises data centers, public and private clouds, and the edge. .” ” Containers, Kubernetes Take Over. Three Threat Areas.

Risk 109