Matthew Green on Telegram’s Encryption
Schneier on Security
AUGUST 28, 2024
Matthew Green wrote a really good blog post on what Telegram’s encryption is and is not.
This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Schneier on Security
AUGUST 28, 2024
Matthew Green wrote a really good blog post on what Telegram’s encryption is and is not.
Schneier on Security
JUNE 11, 2021
For three years, the Federal Bureau of Investigation and the Australian Federal Police owned and operated a commercial encrypted phone app, called AN0M, that was used by organized crime around the world. We’ve seen law enforcement take over encrypted apps before: for example, EncroChat.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Schneier on Security
FEBRUARY 26, 2024
Apple announced PQ3 , its post-quantum encryption standard based on the Kyber secure key-encapsulation protocol, one of the post-quantum algorithms selected by NIST in 2022. There’s a lot of detail in the Apple blog post , and more in Douglas Stabila’s security analysis. I am of two minds about this.
Troy Hunt
SEPTEMBER 3, 2020
The organisation involved may have contacted you and advised your password was exposed but fortunately, they encrypted it. Isn't the whole point of encryption that it protects data when exposed to unintended parties? This entire blog post hashed with Md5 is still 32 characters long. But you should change it anyway. With bcrypt.
Anton on Security
DECEMBER 20, 2021
Sometimes great old blog posts are hard to find (especially on Medium ) , so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ). Here is the next one.
Anton on Security
NOVEMBER 7, 2022
Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ). Here is the next one. Is Your Fate In the Cloud?”
Anton on Security
SEPTEMBER 16, 2021
Sometimes great old blog posts are hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts over the past quarter. This covers both Anton on Security and my posts from Google Cloud blog , and now our Cloud Security Podcast too! Here is the next one.
Anton on Security
MARCH 3, 2022
Great old blog posts are sometimes hard to find (especially on Medium) , so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ). “A Here is the next one.
Anton on Security
AUGUST 19, 2022
Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ). Here is the next one.
Anton on Security
MAY 15, 2023
Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ). Here is the next one. Is Your Fate In the Cloud?”
Daniel Miessler
DECEMBER 24, 2022
It started back in August of 2022 as a fairly common breach notification on a blog, but it, unfortunately, turned into more of a blog series. After initiating an immediate investigation, we have seen no evidence that this incident involved any access to customer data or encrypted password vaults. Actually, some data was lost.
Schneier on Security
MAY 23, 2022
This file is encrypted using AES-256-CBC encryption combined with Base64 encoding. A 4-digit application PIN (which gets set during the initial onboarding when a user first instals the application) is the encryption password used to protect or encrypt the licence data. There’s a lot more in the blog post.
Schneier on Security
AUGUST 9, 2021
They were not only able to get into the BitLocker-encrypted computer, but then use the computer to get into the corporate network. Original blog post. It’s the “evil maid attack.” ” It requires physical access to your computer, but you leave it in your hotel room all the time when you go out to dinner.
GlobalSign
FEBRUARY 14, 2024
In this blog, we review why automation and encryption are important in improving time efficiency and mitigating risks in digital certificate management workflows.
Security Affairs
JUNE 8, 2022
Black Basta ransomware gang implemented a new feature to encrypt VMware ESXi virtual machines (VMs) running on Linux servers. The Black Basta ransomware gang now supports encryption of VMware ESXi virtual machines (VMs) running on Linux servers. Follow me on Twitter: @securityaffairs and Facebook. Pierluigi Paganini.
Anton on Security
AUGUST 9, 2023
Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ). Here is the next one. Use Cloud Securely? “How
GlobalSign
DECEMBER 11, 2023
In this blog we will discuss how outdated encryption methods can be detrimental to businesses and explore proactive solutions.
Heimadal Security
APRIL 5, 2024
This malicious group successfully encrypted the company’s VMware ESXi servers, which host virtual private servers for their clients, as well as the backups, putting a significant portion of hosted websites […] The post Powerhost’s ESXi Servers Encrypted with New SEXi Ransomware appeared first on Heimdal Security Blog.
Schneier on Security
OCTOBER 27, 2023
found no expired certificates on the server, as explained in a blog post by ValdikSS, a pseudonymous anti-censorship researcher based in Russia who collaborated on the investigation. However, jabber.ru Before it had expired, it would have allowed someone to decrypt the traffic being exchanged over the service.
Krebs on Security
JULY 1, 2020
But absent any additional information from the victim company or their partners who may be affected by the attack, these kinds of stories and blog posts look a great deal like ambulance chasing and sensationalism. Currently, more than a dozen ransomware crime gangs have erected their own blogs to publish sensitive data from victims.
Krebs on Security
NOVEMBER 17, 2022
He’d been on the job less than six months, and because of the way his predecessor architected things, the company’s data backups also were encrypted by Zeppelin. “We’ve found someone who can crack the encryption.” Then came the unlikely call from an FBI agent. “Don’t pay,” the agent said.
Troy Hunt
MARCH 18, 2024
I linked to the story from the beginning of this blog post and got a handful of willing respondents for whom I sent their data and asked two simple questions: Does this data look accurate? The above example simply didn't have plain text entries for the encrypted data.
Graham Cluley
DECEMBER 7, 2023
Meta's Head of Messenger announced that the company has begun to roll out end-to-end encryption (E2EE) for personal chats and calls. Read more in my article on the Hot for Security blog.
Webroot
SEPTEMBER 7, 2023
When it comes to keeping sensitive data safe, email encryption is a necessity. Too many employees and IT experts have experienced the pain of trying to use a needlessly complicated email encryption solution. If this is the experience you’ve come to expect, Webroot Email Encryption powered by Zix is here to surprise you.
Graham Cluley
MARCH 6, 2024
Ukraine claims its hackers have gained possession of "the information security and encryption software" used by Russia's Ministry of Defence , as well as secret documents, reports, and instructions exchanged between over 2,000 units of Russia's security services. Read more in my article on the Hot for Security blog.
Adam Levin
MAY 24, 2019
In a blog post released this week, the company admitted the passwords of “some” of its G Suite customers had been stored on internal servers without cryptographic protection, also known as a hash. We will continue with our security audits to ensure this is an isolated incident,” announced the blog.
Schneier on Security
OCTOBER 15, 2021
The idea is that they wouldn’t touch the cryptography, but instead eavesdrop on communications and systems before encryption or after decryption. Ross Anderson wrote a great blog post on the paper. (It’s Even before Apple made its announcement , law enforcement shifted their battle for backdoors to client-side scanning.
Schneier on Security
DECEMBER 21, 2020
Note that the company has heavily edited its blog post, but the original — with lots of technical details — was saved by the Wayback Machine.). So either Cellebrite believes it is so good that it can break whatever Signal does, or the original blog post was a mistake. Cellebrite announced that it can break Signal.
Krebs on Security
JUNE 7, 2021
In the process of doing so, I encountered a small snag: The FSB’s website said in order to communicate with them securely, I needed to download and install an encryption and virtual private networking (VPN) appliance that is flagged by at least 20 antivirus products as malware. Federal Bureau of Investigation (FBI). Image: Wikipedia.
Krebs on Security
SEPTEMBER 22, 2023
This is significant because in November 2022, LastPass disclosed a breach in which hackers stole password vaults containing both encrypted and plaintext data for more than 25 million users. The more iterations, the longer it takes an offline attacker to crack your master password. “LastPass in my book is one step above snake-oil. .'”
Krebs on Security
SEPTEMBER 5, 2023
In November 2022, the password manager service LastPass disclosed a breach in which hackers stole password vaults containing both encrypted and plaintext data for more than 25 million users. LastPass disclosed that criminal hackers had compromised encrypted copies of some password vaults, as well as other personal information.
Fox IT
DECEMBER 10, 2024
One of the most popular requests has been the capability to use Dissect in combination with common disk encryption methods like Microsoft’s BitLocker or its Linux equivalent LUKS. Of course, a blog post is not complete without a demo. Internally at Fox-IT we were able to already use these capabilities.
Graham Cluley
OCTOBER 17, 2024
Read more in my article on the Tripwire State of Security blog. And boy do we need some good news - amid reports that 389 US-based healthcare institutions were hit by ransomware last year - more than one every single day.
Schneier on Security
MAY 29, 2020
But crucially, Facebook says that the detection will occur only based on metadata -- not analysis of the content of messages -- so that it doesn't undermine the end-to-end encryption that Messenger offers in its Secret Conversations feature. That default Messenger encryption will take years to implement.
Schneier on Security
SEPTEMBER 5, 2019
A decade ago, the Doghouse was a regular feature in both my email newsletter Crypto-Gram and my blog. The discovery challenges today's current encryption framework by enabling the accurate prediction of prime numbers." In it, I would call out particularly egregious -- and amusing -- examples of cryptographic " snake oil.".
Krebs on Security
JUNE 16, 2021
First debuting in early 2019, CLOP is one of several ransomware groups that hack into organizations, launch ransomware that encrypts files and servers, and then demand an extortion payment in return for a digital key needed to unlock access. ? /. CLOP’s victim shaming blog on the deep web.
Adam Levin
APRIL 13, 2020
This allows hackers to bypass otherwise secure encryption and steal credit card and personal information. . The fact that the malware lodged itself within an already existing and legitimate file makes it a bit harder to detect,” said Sucuri researcher Ben Martin in a blog announcing the company’s findings.
Krebs on Security
JULY 30, 2020
Newer, chip-based cards employ a technology known as EMV that encrypts the account data stored in the chip. The technology causes a unique encryption key — referred to as a token or “cryptogram” — to be generated each time the chip card interacts with a chip-capable payment terminal. .
Graham Cluley
FEBRUARY 15, 2024
A group of South Korean security researchers have uncovered a vulnerability in the infamous Rhysida ransomware that provides a way for encrypted files to be unscrambled. Read more in my article on the Tripwire State of Security blog.
The Last Watchdog
MAY 19, 2022
Wikipedia uses a CMS for textual entries, blog posts, images, photographs, videos, charts, graphics, and “ talk pages ” that help its many contributors collaborate. Make sure the CMS platform uses a robust web application firewall (WAF), conducts continuous automated and manual security tests and uses state of the art encryption technology.
Krebs on Security
JUNE 2, 2020
. “ Sodin ” and “ Sodinokibi “) used their Dark Web “Happy Blog” to announce its first ever stolen data auction, allegedly selling files taken from a Canadian agricultural production company that REvil says has so far declined its extortion demands.
Anton on Security
JULY 7, 2022
This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our third Threat Horizons Report ( full version ) that we just released ( the official blog for #1 report , my unofficial blog for #2 ). cloud ransomware isn’t really ‘a ware’, but a RansomOp where humans?—?not
Anton on Security
FEBRUARY 7, 2024
This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our seventh Threat Horizons Report ( full version ) that we just released ( the official blog for #1 report , my unofficial blogs for #2 , #3 , #4 , #5 , #6 , #7 and #8 ).
Graham Cluley
JULY 6, 2023
Security researchers have developed a free decryption tool for files that have been encrypted since the Akira ransomware first emerged in March 2023. Read more in my article on the Tripwire State of Security blog. There's good news for any business that has fallen victim to the Akira ransomware.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content