article thumbnail

Australia Threatens to Force Companies to Break Encryption

Schneier on Security

In 2018, Australia passed the Assistance and Access Act, which—among other things—gave the government the power to force companies to break their own encryption. The Assistance and Access Act includes key components that outline investigatory powers between government and industry.

article thumbnail

Hidden Anti-Cryptography Provisions in Internet Anti-Trust Bills

Schneier on Security

3(c)(7)(A)(iii) would allow a company to deny access to apps installed by users, where those app makers “have been identified [by the Federal Government] as national security, intelligence, or law enforcement risks.” ” That language is far too broad.

Internet 337
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Report Unveils Cybersecurity Leaks in U.S. Drinking Water Systems

SecureWorld News

Fairbrother added, "Teams that continue to acquire security solutions that only consider a subset of infrastructure, assets, or entity types, that only offered a siloed viewpoint on security intelligence, often mean critical risks to ICS systems are often overlooked.

article thumbnail

Online Ed is the New Corporate Threat Vector

Security Boulevard

In the last 30 days, education was the most targeted sector, receiving more than 60% of all malware encounters, or more than 5 million incidents, according to Microsoft Security Intelligence. The Government Accounting Office wants to know what the U.S. Department of.

Education 124
article thumbnail

North Korea-linked APT Emerald Sleet is using a new tactic

Security Affairs

The threat actor impersonates a South Korean government official to build trust with the target before sending a spear-phishing email with a bait PDF attachment. — Microsoft Threat Intelligence (@MsftSecIntel) February 11, 2025 Microsoft notifies its customers who have been targeted or compromised by the North Korea-linked APT group.

article thumbnail

Thales Named Overall Leader in KuppingerCole’s Leadership Compass Data Security Platforms

Thales Cloud Protection & Licensing

Multi-cloud and hybrid environments promise much greater flexibility, but they make it infinitely harder to manage and secure data consistently across different platforms. Protecting sensitive information has become increasingly difficult. Todays organizations need flexible, powerful, and scalable solutions to keep their data safe.

article thumbnail

Chinese Hackers Targeting South American Diplomatic Entities with ShadowPad

The Hacker News

The tech giant's Security Intelligence team is tracking the cluster under the emerging moniker DEV-0147, describing the activity as an "expansion of the group's data exfiltration operations that traditionally targeted government agencies and think tanks in Asia