Encryption Ban: U.S., UK, Australia Try to Change How Math Works (Again)

Governments are yet again attacking end-to-end encryption. As if passing new laws somehow stops criminals breaking existing ones.
The post Encryption Ban: U.S., UK, Australia Try to Change How Math Works (Again) appeared first on Security Boulevard.
Continue reading Encryption Ban: U.S., UK, Australia Try to Change How Math Works (Again)

Black Hat USA 2019, Matt Prevost’s ‘How Do Cyber Insurers View The World?’

Thanks to Black Hat for publishing the Black Hat 2019
tremendous conference videos on their YouTube Channel
Permalink
The post Black Hat USA 2019, Matt Prevost’s ‘How Do Cyber Insurers View The World?’ appeared first on Security Bou… Continue reading Black Hat USA 2019, Matt Prevost’s ‘How Do Cyber Insurers View The World?’

Trump, Ukraine, Crowdstrike and Servers – What Gives?

From 2015 through 2016, during the run-up to the presidential election, certain cloud servers used by the Democratic National Committee (DNC) were attacked and infiltrated by advanced persistent threat (APT) actors from Russia. This resulted in the re… Continue reading Trump, Ukraine, Crowdstrike and Servers – What Gives?

Trump, Ukraine, Crowdstrike and Servers – What Gives?

From 2015 through 2016, during the run-up to the presidential election, certain cloud servers used by the Democratic National Committee (DNC) were attacked and infiltrated by advanced persistent threat (APT) actors from Russia. This resulted in the re… Continue reading Trump, Ukraine, Crowdstrike and Servers – What Gives?

FTC Holds Companies Accountable for Online Lead Generators

The Federal Trade Commission (FTC) dropped the $30 million hammer on Career Education Corporation (CEC) for using leads obtained from dubious and illegal website operators to engage with prospects with the hope of having the prospect enroll in CEC’s p… Continue reading FTC Holds Companies Accountable for Online Lead Generators

Russian SORM/СОРМ ISP Spyware Revealed (by Nokia Grunt)

Russia’s infrastructure for spying on its citizens has been revealed this week. An errant Nokia employee put terabytes of secret data on the internet by mistake.
The post Russian SORM/СОРМ ISP Spyware Revealed (by Nokia Grunt) appeared first on Securi… Continue reading Russian SORM/СОРМ ISP Spyware Revealed (by Nokia Grunt)

Who’s Financially Responsible for Cybersecurity Breaches?

As networks become less secure and the data stored on the cloud becomes more valuable, cybersecurity breaches are becoming both more expensive and more frequent. In the first six months of 2019 alone, data breaches compromised more than 4.1 billion re… Continue reading Who’s Financially Responsible for Cybersecurity Breaches?

What is Phishing? A Look at One of Cybercrime’s Favorite Tactics

An in-depth look at the types of attacks that are involved in 32% of all data breaches In our news-heavy world, there isn’t a lot that surprises us anymore. But…
The post What is Phishing? A Look at One of Cybercrime’s Favorite Tactics a… Continue reading What is Phishing? A Look at One of Cybercrime’s Favorite Tactics

More on Law Enforcement Backdoor Demands

The Carnegie Endowment for International Peace and Princeton University’s Center for Information Technology Policy convened an Encryption Working Group to attempt progress on the "going dark" debate. They have released their report: "Moving… Continue reading More on Law Enforcement Backdoor Demands