article thumbnail

MY TAKE: Agile cryptography is coming, now that ‘attribute-based encryption’ is ready for prime time

The Last Watchdog

Encryption agility is going to be essential as we move forward with digital transformation. All of the technical innovation cybersecurity vendors are churning out to deal with ever-expanding cyber risks, at the end of the day, come down to protecting encrypted data. Refer: The vital role of basic research.

article thumbnail

Google Glitch Left Passwords Unprotected for 14 Years

Adam Levin

Google announced a glitch that stored unencrypted passwords belonging to several business customers, a situation that had been exploitable since 2005. This issue has been fixed and, again, we have seen no evidence of improper access to or misuse of the affected passwords.

Passwords 247
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Database Encryption Key Management

Thales Cloud Protection & Licensing

Large data scale breaches have led an increasing number of companies to embrace comprehensive encryption strategies to protect their assets. According to our 2018 Global Encryption Trends Study , 43% of respondents report that their organization has an encryption strategy they apply across the enterprise, compared with 15% in 2005.

article thumbnail

A database containing data of +8.9 million Zacks users was leaked online

Security Affairs

The company attempted to downplay the security breach by telling Have I Been Pwned that threat actors only had access to encrypted passwords. According to the notice, threat actors had access to an older database of customers who had signed up for the Zacks Elite product between November 1999 through February 2005.

article thumbnail

Ransomware Cyber Attack on Molson Coors

CyberSecurity Insiders

Highly placed source say that the Chicago based company could have been hit by a file encrypting malware attack that could have brought the IT infrastructure operations of the multinational drink and brewery firm to a standstill.

article thumbnail

Cyber attack forces live TV shows off-air on Australia’s Channel 9

Hot for Security

Back in August 2005, for instance, the CNN newsroom was hit by the Zotob worm, with the station reporting the incident live on air. Whether the near-simultaneous attacks against the TV station and parliamentary services are coincidence or not is currently unclear.

article thumbnail

A 16-year-old bug (CVE-2021-3438) in printer driver affects millions of printers worldwide

Security Affairs

The discovery was casually made several months ago, while experts were configuring a brand new HP printer, and noticed that an old printer driver from 2005 called SSPORT.SYS was triggering an alert by Process Hacker. ” continues the analysis. ” continues the analysis.