The NSA on the Risks of Exposing Location Data

The NSA has issued an advisory on the risks of location data. Mitigations reduce, but do not eliminate, location tracking risks in mobile devices. Most users rely on features disabled by such mitigations, making such safeguards impractical. Users shoul… Continue reading The NSA on the Risks of Exposing Location Data

The NSA on the Risks of Exposing Location Data

The NSA has issued an advisory on the risks of location data. Mitigations reduce, but do not eliminate, location tracking risks in mobile devices. Most users rely on features disabled by such mitigations, making such safeguards impractical. Users should be aware of these risks and take action based on their specific situation and risk tolerance. When location exposure could be… Continue reading The NSA on the Risks of Exposing Location Data

CISA, NSA Lay Out Recommendations for Protecting OT Assets

The Cybersecurity & Infrastructure Security Agency (CISA) and the National Security Agency (NSA) laid out a series of recommendations for critical infrastructure owners and operators to protect their operational technology (OT) assets. In an alert … Continue reading CISA, NSA Lay Out Recommendations for Protecting OT Assets

NSA Urgently Warns on Industrial Cyberattacks, Triconex Critical Bug

Power plants, factories, oil and gas refineries and more are all in the sights of foreign adversaries, the U.S. warns. Continue reading NSA Urgently Warns on Industrial Cyberattacks, Triconex Critical Bug

Cryptojacking botnet Prometei uses NSA exploit to steal data, mine Monero

By Waqas
Prometei botnet targets Windows devices. Cisco Talos’ threat intelligence team published a report revealing startling details of how cybercriminals are continually reinventing the way they can monetize their malicious tools and technique… Continue reading Cryptojacking botnet Prometei uses NSA exploit to steal data, mine Monero

NSA on Securing VPNs

The NSA’s Central Security Service — that’s the part that’s supposed to work on defense — has released two documents (a full and an abridged version) on securing virtual private networks. Some of it is basic, but it contains good information. Maintaining a secure VPN tunnel can be complex and requires regular maintenance. To maintain a secure VPN, network administrators… Continue reading NSA on Securing VPNs

Recent Cases Question Backdoor Encryption

Recent events are calling into question the necessity of computer backdoors and the future of our personal privacy U.S. law enforcement for decades has decried the “going dark” problem with computers and computer technologies. If anyone can secure the… Continue reading Recent Cases Question Backdoor Encryption