article thumbnail

On the Twitter Hack

Schneier on Security

These DMs are not end-to-end encrypted, meaning that they are unencrypted inside Twitter's network and could have been available to the hackers. Back in 2018, Twitter said it was exploring encrypting those messages, but it hasn't yet. In addition to security measures, the other solution is to break up the tech monopolies.

Hacking 315
article thumbnail

Norton 360 Now Comes With a Cryptominer

Krebs on Security

which was renamed to NortonLifeLock in 2019 (LifeLock is now included in the Norton 360 service). “Norton creates a secure digital Ethereum wallet for each user,” the FAQ reads. “The key to the wallet is encrypted and stored securely in the cloud. ” Norton 360 is owned by Tempe, Ariz.-based

article thumbnail

SHARED INTEL: How NTA/NDR systems get to ‘ground truth’ of cyber attacks, unauthorized traffic

The Last Watchdog

It appears the cam in question was unwittingly set up by an employee for personal security reasons. But ExtraHop noticed that the tool also opening encrypted connections to vendor-owned cloud storage, a major HIPAA violation. We met at Black Hat 2019.