Remove 2008 Remove Encryption Remove Information Security
article thumbnail

PLAYFULGHOST backdoor supports multiple information stealing features

Security Affairs

The PLAYFULGHOST backdoor shares functionality with Gh0stRAT whose source code was publicly released in 2008. TIM.exe then loads a malicious launcher DLL libcurl.dll whichwilldecrypt and load the PLAYFULGHOST payload from an encrypted file named Debug.log.”

Malware 139
article thumbnail

Indian Court ordered to block email service Proton Mail

Security Affairs

Proton Mail is a Swiss-based email service offering end-to-end encryption to ensure that only the sender and recipient can read the messages. The company employs client-side encryption, meaning emails are encrypted on the user’s device before being sent to Proton’s servers, enhancing user privacy and security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft recommends Exchange admins to disable the SMBv1 protocol

Security Affairs

Since 2016, Microsoft is urging admins to stop using SMBv1, later versions of the protocol implemented security enhancements, such as encryption, pre- authentication integrity checks to prevent man-in-the-middle (MiTM) attacks, and insecure guest authentication blocking. If it returns an SMB1 value of 0, it is disabled. (Get-WindowsFeature

article thumbnail

STEPS FORWARD: Math geniuses strive to make a pivotal advance — by obfuscating software code

The Last Watchdog

I recently had the chance to discuss iO with Dr. Tatsuaki Okamoto, director of NTT Research’s Cryptography and Information Security (CIS) Lab , and Dr. Amit Sahai, professor of computer science at UCLA Samueli School of Engineering and director of UCLA Center for Encrypted Functionalities (CEF).

Software 182
article thumbnail

Avast released a free decryptor for the Windows version of the Akira ransomware

Security Affairs

“During the run, the ransomware generates a symmetric encryption key using CryptGenRandom() , which is the random number generator implemented by Windows CryptoAPI. . Files are encrypted by Chacha 2008 ( D. “The symmetric key is encrypted by the RSA-4096 cipher and appended to the end of the encrypted file.

article thumbnail

IETF deprecates TLS 1.0 and TLS 1.1, update to latest versions

Security Affairs

The Internet Engineering Task Force (IETF) formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC was recommended for IETF protocols in 2008 and became obsolete with the introduction of TLS version 1.3 RFC 2246) and 1.1 (RFC Both versions lack support for current and recommended cryptographic algorithms and mechanisms.

Internet 133
article thumbnail

Law enforcement shutdown the VPN service VPNLab used by many cybercriminal gangs

Security Affairs

VPNLab was launched in 2008 and was offering online anonymity to criminal organizations. Its technology was based on OpenVPN and adopted 2048-bit encryption, the price for the subscription was very low, just $60/year. The authorities seized 15 VPNLab.net servers across 10 countries.

VPN 121