article thumbnail

China’s Olympics App Is Horribly Insecure

Schneier on Security

Key Findings: MY2022, an app mandated for use by all attendees of the 2022 Olympic Games in Beijing, has a simple but devastating flaw where encryption protecting users’ voice audio and file transfers can be trivially sidestepped. Citizen Lab examined the app and found it riddled with security holes.

article thumbnail

5G Security

Schneier on Security

These insecurities are a result of market forces that prioritize costs over security and of governments, including the United States, that want to preserve the option of surveillance in 5G networks. Susan Gordon, then-U.S. Indeed, the United States needs to accept 5G's insecurities and build secure systems on top of it. What's more, U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Judging Facebook's Privacy Shift

Schneier on Security

And if you read his 3,000-word post carefully, Zuckerberg says nothing about changing Facebook's surveillance capitalism business model. Better data security so Facebook sees less. On the other hand, WhatsApp -- purchased by Facebook in 2014 -- provides users with end-to-end encrypted messaging. How Facebook manages for privacy.

article thumbnail

Breaking Down User Activity Monitoring Tools: Security and HR Perspectives

SecureWorld News

From an information security department's perspective, the more data collected on employee actions, the more effectively potential incidents can be investigated. On the flip side, employees often lack access to the data collected by UAM solutions. This is particularly relevant for remote workers.

article thumbnail

China’s Olympics App Is Horribly Insecure

Security Boulevard

Key Findings: MY2022, an app mandated for use by all attendees of the 2022 Olympic Games in Beijing, has a simple but devastating flaw where encryption protecting users’ voice audio and file transfers can be trivially sidestepped. Citizen Lab examined the app and found it riddled with security holes.

article thumbnail

Understanding the Different Types of Audit Evidence

Centraleyes

This evidence serves multiple purposes, including: Verification of Controls : Auditors rely on evidence to verify the existence and effectiveness of cybersecurity controls, from access management to encryption mechanisms. The audit includes reviewing risk analysis, data access controls, encryption procedures, and physical security controls.

Risk 52
article thumbnail

Privacy predictions 2022

SecureList

Citizens, for their part, are increasingly concerned with surveillance capitalism , a lack of anonymity and dependence on online services. Facebook (now Meta) moved towards more privacy for its users as well, providing end-to-end encrypted backups in WhatsApp and removing the facial recognition system in its entirety from Facebook.