article thumbnail

MY TAKE: Agile cryptography is coming, now that ‘attribute-based encryption’ is ready for prime time

The Last Watchdog

Encryption agility is going to be essential as we move forward with digital transformation. All of the technical innovation cybersecurity vendors are churning out to deal with ever-expanding cyber risks, at the end of the day, come down to protecting encrypted data. Refer: The vital role of basic research.

article thumbnail

Who and What is Behind the Malware Proxy Service SocksEscort?

Krebs on Security

Researchers this month uncovered a two-year-old Linux-based remote access trojan dubbed AVrecon that enslaves Internet routers into botnet that bilks online advertisers and performs password-spraying attacks. SocksEscort[.]com com , is what’s known as a “SOCKS Proxy” service.

Malware 205
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: PKI, digital certificates now ready to take on the task of securing digital transformation

The Last Watchdog

Related: Why PKI is well-suited to secure the Internet of Things PKI is the authentication and encryption framework on which the Internet is built. In the classic case of a human user clicking to a website, CAs, like DigiCert, verify the authenticity of the website and encrypt the data at both ends.

article thumbnail

Post-Quantum Cryptography: Lessons Learned from SHA-1 Deprecation

Security Boulevard

Since 2005, SHA-1 has been regarded as unsafe against well-funded adversaries. The same issues, or even worse, will be faced in the near future if businesses, organizations and agencies fail to be proactive in establishing concise and comprehensive policies and practices for migrating to a post-quantum encryption regime.

article thumbnail

DEEP TECH NEWS: How ‘attribute-based encryption’ preserves privacy at a fined-grained level

The Last Watchdog

Enter attribute-based encryption ( ABE ) an advanced type of cryptography that’s now ready for prime time. Customized decryption ABE builds upon digital certificates and the Public Key Infrastructure ( PKI ) that underpins secure communications across the Internet. ABE has undergone significant theoretical advancements since 2005.

article thumbnail

G Suite users’ passwords stored in plain-text for more than 14 years

Security Affairs

“However, we recently notified a subset of our enterprise G Suite customers that some passwords were stored in our encrypted internal systems unhashed.” “We made an error when implementing this functionality back in 2005: The admin console stored a copy of the unhashed password. ” continues Google.

article thumbnail

BEST PRACTICES: Why pursuing sound ‘data governance’ can be a cybersecurity multiplier

The Last Watchdog

The accused hacker stole personal data for 106 bank patrons, including customer data from credit card applications dating back to 2005. Turnkey solutions Smarter data governance may not be as sexy as the latest automated threat hunting tools or post quantum encryption. I’ll keep watch.