article thumbnail

China’s Olympics App Is Horribly Insecure

Schneier on Security

News article : It’s not clear whether the security flaws were intentional or not, but the report speculated that proper encryption might interfere with some of China’s ubiquitous online surveillance tools, especially systems that allow local authorities to snoop on phones using public wireless networks or internet cafes.

article thumbnail

On Chinese "Spy Trains"

Schneier on Security

That's why there is so much worry about Chinese-made equipment for the new 5G wireless networks. The reason these threats are so real is that it's not difficult to hide surveillance or control infrastructure in computer components, and if they're not turned on, they're very difficult to find.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russian spies are attempting to tap transatlantic undersea cables

Security Affairs

The Register reports that the secret structures of GCHQ are part of the surveillance programme codenamed “CIRCUIT” and also refers to an Overseas Processing Centre 1 (OPC-1), while another centre, OPC-2, has been planned, according to documents leaked by Snowden. In the documents, the company is referred to as a “partner” codenamed Gerontic.

Wireless 127
article thumbnail

5G Security

Schneier on Security

These insecurities are a result of market forces that prioritize costs over security and of governments, including the United States, that want to preserve the option of surveillance in 5G networks. First, the standards are simply too complex to implement securely. What's more, U.S.

article thumbnail

Security experts disclosed Wyze data leak

Security Affairs

The company produces inexpensive smart home products and wireless cameras. . “Today, we are confirming that some Wyze user data was not properly secured and left exposed from December 4th to December 26th.” The incident was independently verified by the authors of the blog IPVM that focuses on video surveillance products.

IoT 62
article thumbnail

Best Wi-Fi Security & Performance Testing Tools for 2022

eSecurity Planet

To catch them, administration policies on continuous surveillance and periodic assessments should be in place. It is also useful in assessing the security of wireless networks, as it can capture live, over-the-air wireless traffic. The discovered wireless packets can be imported into Wireshark and TCPdump. Aircrack-ng.