article thumbnail

Security Analysis of Threema

Schneier on Security

We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted messaging application with more than 10 million users and 7000 corporate customers. As one example, we present a cross-protocol attack which breaks authentication in Threema and which exploits the lack of proper key separation between different sub-protocols.

article thumbnail

BLURtooth flaw allows attacking Bluetooth encryption process

Security Affairs

versions are affected by the vulnerability dubbed BLURtooth which allows hackers to defeat Bluetooth encryption. The vulnerability could be exploited by attackers to overwrite or lower the strength of the pairing key, defeating the protocol encryption. Bluetooth 4.0 affects “dual-mode” Bluetooth devices, like modern smartphones.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A flaw in India Digilocker could?ve been exploited to bypass authentication

Security Affairs

DigiLocker provides an account in cloud to every Aadhaar holder to access authentic documents/certificates such as driving license, vehicle registration, academic mark sheet in digital format from the original issuers of these certificates. ” ~ Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->.

article thumbnail

Kr00k Wi-Fi Encryption flaw affects more than a billion devices

Security Affairs

This serious flaw, assigned CVE-2019-15126, causes vulnerable devices to use an all-zero encryption key to encrypt part of the user’s communication.” ” Experts pointed out that the vulnerability does not reside in the Wi-Fi encryption protocol, instead, the issue is related to the way some chips implemented the encryption.

article thumbnail

Researchers Quietly Cracked Zeppelin Ransomware Keys

Krebs on Security

He’d been on the job less than six months, and because of the way his predecessor architected things, the company’s data backups also were encrypted by Zeppelin. “We’ve found someone who can crack the encryption.” Then came the unlikely call from an FBI agent. “Don’t pay,” the agent said.

article thumbnail

A flaw in Microsoft OAuth authentication could lead Azure account takeover

Security Affairs

The vulnerability affects the way Microsoft applications use OAuth for authentication, these applications trust certain third-party domains and sub-domains that are not registered by Microsoft. ” ~ Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Disable non-used applications.”

article thumbnail

Statc Stealer, a new sophisticated info-stealing malware

Security Affairs

The infection chain starts when victims are tricked into clicking on an ads that appears like an authentic Google advertisement. Below is the attack chain described by the researchers: A user is tricked into clicking on a malicious link somewhere on their Google Chrome browser (typically an advertisement).

Malware 93