article thumbnail

Faulty DoD Cybersecurity Leaves U.S. At Risk of Missile Attacks

Adam Levin

The report makes several recommendations to mitigate the systemic vulnerabilities, most of them widely recognized best cybersecurity practices including multi-factor authentication, increased video surveillance at facilities, securing server racks and placing tighter controls on removable media such as USB keys.

Risk 199
article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. It’s amazing that one person could have had so much access with so little accountability, and could sneak all of this data out without raising any alarms. And Edward Snowden?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AI and Trust

Schneier on Security

I wrote about this in 2012 in a book called Liars and Outliers. We are both under constant surveillance and are competing for star rankings. They have social media accounts with personalities. Surveillance is the business model of the Internet. And the incentives of surveillance capitalism are just too much to resist.

article thumbnail

Law enforcement agencies can extract data from thousands of cars’ infotainment systems

Security Affairs

Recently security the security expert researcher Sam Curry warned of vulnerabilities in mobile apps that exposed Hyundai and Genesis car models after 2012 to remote attacks. ” Privacy advocates are raising the alarm on surveillance activities operated by law enforcement by collecting data from connected systems in modern cars.

article thumbnail

Here’s what data the FBI can get from WhatsApp, iMessage, Signal, Telegram, and more

Malwarebytes

Unlike other apps, it doesn’t require you to enter an email address or phone number to create an account. Provides account (i.e. User activity on WeChat has been known to be analyzed, tracked and shared with Chinese authorities upon request as part of the mass surveillance network in China. Date and time account created.

article thumbnail

Highlights from the New U.S. Cybersecurity Strategy

Krebs on Security

. “Regulations for other industries went through a similar transformation, and we saw a positive result — there’s now an expectation of appropriate due care, and accountability for those who fail to comply. ” Many of the U.S.

article thumbnail

Russia’s SolarWinds Attack

Schneier on Security

Recent news articles have all been talking about the massive Russian cyberattack against the United States, but that’s wrong on two accounts. In the interests of surveillance, the NSA has pushed for an insecure cell phone encryption standard and a backdoor in random number generators (important for secure encryption).

Hacking 358