article thumbnail

Storing Encrypted Photos in Google’s Cloud

Schneier on Security

New paper: “ Encrypted Cloud Photo Storage Using Google Photos “: Abstract: Cloud photo services are widely used for persistent, convenient, and often free photo storage, which is especially useful for mobile devices.

article thumbnail

Americans urged to use encrypted messaging after large, ongoing cyberattack

Malwarebytes

According to NBC news , two officials — a senior FBI official who asked not to be named and Jeff Greene, executive assistant director for cybersecurity at CISA– both recommended using encrypted messaging apps to Americans who want to minimize the chances of China’s intercepting their communications.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Apple ordered to grant access to users’ encrypted data

Malwarebytes

The UK government has demanded to be able to access encrypted data stored by Apple users worldwide in its cloud service. The main goal for the Home Office is an optional feature that turns on end-to-end encryption for backups and other data stored in iCloud. Since then, privacy focused groups have uttered their objections.

article thumbnail

ParkMobile Breach Exposes License Plate Data, Mobile Numbers of 21M Users

Krebs on Security

Someone is selling account information for 21 million customers of ParkMobile , a mobile parking app that’s popular in North America. ” The statement continues: “Our investigation indicates that no sensitive data or Payment Card Information, which we encrypt, was affected.

Mobile 361
article thumbnail

IT threat evolution in Q3 2024. Non-mobile statistics

SecureList

Non-mobile statistics IT threat evolution in Q3 2024. Mobile statistics The statistics presented here are based on detection verdicts by Kaspersky products and services received from users who consented to providing statistical data. This type of cyberextortion predated Trojans, which encrypt the victim’s files.

Mobile 106
article thumbnail

Signal Adds Cryptocurrency Support

Schneier on Security

According to Wired , Signal is adding support for the cryptocurrency MobileCoin, “a form of digital cash designed to work efficiently on mobile devices while protecting users’ privacy and even their anonymity.” End-to-end encryption is already at risk. ” I think this is an incredibly bad idea.

article thumbnail

100 million Samsung phones affected by encryption weakness

Tech Republic Security

The post 100 million Samsung phones affected by encryption weakness appeared first on TechRepublic. The vulnerability lies in how Samsung implemented a portion of the Android Trusted Execution Environment, leading to devices as new as the S21 being vulnerable to initialization vector reuse attacks.