article thumbnail

Samsung Encryption Flaw

Schneier on Security

Researchers have found a major encryption flaw in 100 million Samsung Galaxy phones. We present an IV reuse attack on AES-GCM that allows an attacker to extract hardware-protected key material, and a downgrade attack that makes even the latest Samsung devices vulnerable to the IV reuse attack.

article thumbnail

Apple ordered to grant access to users’ encrypted data

Malwarebytes

The UK government has demanded to be able to access encrypted data stored by Apple users worldwide in its cloud service. The main goal for the Home Office is an optional feature that turns on end-to-end encryption for backups and other data stored in iCloud. Since then, privacy focused groups have uttered their objections.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

StaryDobry ruins New Year’s Eve, delivering miner instead of presents

SecureList

RARExtract decrypts unrar.dll using AES encryption with a hard-coded key, cls-precompx.dll. After that, the sample opens the encrypted MTX64.exe Kickstarter running Kickstarter The kickstarter PE has an encrypted blob in its resources. Suffix list and junk data For example, if the malware finds a file named msvc140.dll

Malware 99
article thumbnail

CVE-2024-28989: Weak Encryption Key Management in Solar Winds Web Help Desk

NetSpi Technical

This led to an analysis of the software and how it stored encrypted passwords, giving the red team the ability to recover the stored passwords and use them to access other systems. TL;DR an attacker with access to a Web Help Desk backup file may be able to recover some of the encrypted passwords stored within it.

article thumbnail

Security Analysis of Threema

Schneier on Security

We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted messaging application with more than 10 million users and 7000 corporate customers. We present seven different attacks against the protocol in three different threat models. It also said the researchers were overselling their findings.

article thumbnail

Everything Encrypted Will Soon Become Decryptable: We Must Prepare Now For The Era Of Quantum Computers

Joseph Steinberg

Nearly every piece of data that is presently protected through the use of encryption may become vulnerable to exposure unless we take action soon. While quantum computers already exist, no devices are believed to yet exist that are anywhere near powerful enough to crack modern encryption in short order.

article thumbnail

DEEP TECH NEWS: How ‘attribute-based encryption’ preserves privacy at a fined-grained level

The Last Watchdog

Enter attribute-based encryption ( ABE ) an advanced type of cryptography that’s now ready for prime time. ABE makes it much more difficult to fraudulently decrypt an asset in its entirety; it does this by pulling user and data attributes into the encryption picture — in a way that allows decryption to be flexible.