article thumbnail

The Myth of Consumer-Grade Security

Schneier on Security

The Department of Justice wants access to encrypted consumer devices but promises not to infiltrate business products or affect critical infrastructure. Barr repeated a common fallacy about a difference between military-grade encryption and consumer encryption: "After all, we are not talking about protecting the nation's nuclear launch codes.

article thumbnail

GUEST ESSAY: Where we stand on mitigating software risks associated with fly-by-wire jetliners

The Last Watchdog

In 2019, a cybersecurity firm demonstrated security risks that could allow an attacker to disrupt engine readings and altitude on an aircraft. So watch out for weak encryption protocols, insufficient network segregation, or insecure user authentication mechanisms. Risks delineated Still, there have been many other incidents since.

Software 264
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lazarus Group North Korea strikes South Korean software firm

CyberSecurity Insiders

Cybersecurity Insiders have learnt that the said group of threat actors have launched a MATA malware attack on the servers of the software company to steal information from the database and encrypt it with ransomware until their demands are met.

Software 105
article thumbnail

Experts linked ransomware attacks to China-linked APT27

Security Affairs

The APT group has been active since 2010, targeted organizations worldwide, including U.S. The hackers used the Windows drive encryption tool BitLocker to lock the servers. Other malware found on infected computers includes the PlugX remote access trojan, regularly mentioned in cybersecurity reports about campaigns linked to China.

article thumbnail

STEPS FORWARD: How the Middle East led the U.S. to adopt smarter mobile security rules

The Last Watchdog

Earlier this year, US regulators essentially followed the Middle East’s lead by rolling out sweeping new rules — referred to as Cybersecurity Maturity Model Certification (CMMC) — which require use of data containerization along much the same lines as Saudi Arabia and the UAE mandated some three years ago.

Mobile 205
article thumbnail

The Resurgence of Zero Trust: Why it’s Essential for CISOs and CIOs to Include in Their Strategy

CyberSecurity Insiders

Jaye Tillson, Director of Strategy, Axis Security In recent years, the concept of zero trust has regained popularity in the field of cybersecurity. While the idea of zero trust has been around for decades, it has gained renewed attention due to the evolving threat landscape and the increasing need for robust cybersecurity measures.

CISO 87
article thumbnail

Anton’s Security Blog Quarterly Q2 2022

Anton on Security

Changes in 2022 and Beyond in Cloud Security” Episode 8 “Zero Trust: Fast Forward from 2010 to 2021” Episode 27 “The Mysteries of Detection Engineering: Revealed!”