Remove Encryption Remove Presentation Remove Surveillance
article thumbnail

DEEP TECH NEWS: How ‘attribute-based encryption’ preserves privacy at a fined-grained level

The Last Watchdog

The ubiquity of smart surveillance systems has contributed greatly to public safety. Enter attribute-based encryption ( ABE ) an advanced type of cryptography that’s now ready for prime time. Attribute-based encryption can be utilized to do a number of things,” Wu noted. Here are my takeaways. But those are solvable challenges.

article thumbnail

China’s Olympics App Is Horribly Insecure

Schneier on Security

Key Findings: MY2022, an app mandated for use by all attendees of the 2022 Olympic Games in Beijing, has a simple but devastating flaw where encryption protecting users’ voice audio and file transfers can be trivially sidestepped. Citizen Lab examined the app and found it riddled with security holes.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Apple Adds a Backdoor to iMesssage and iCloud Storage

Schneier on Security

It opens the door for all sorts of other surveillance, since now that the system is build it can be used for all sorts of other messages. And it breaks end-to-end encryption, despite Apple’s denials : Does this break end-to-end encryption in Messages? Notice Apple changing the definition of “end-to-end encryption.”

article thumbnail

Wanted: Cybersecurity Imagery

Schneier on Security

Each of these images fails to convey anything about either the importance or the complexity of the topic­ -- or the huge stakes for governments, industry and ordinary people alike inherent in topics like encryption, surveillance and cyber conflict. I don't use PowerPoint (or anything similar) when I give presentations.

article thumbnail

Russia’s FSB used spyware against a Russian programmer

Security Affairs

The spyware allowed Russian authorities to track a target device’s location, record phone calls, and keystrokes, and read messages from encrypted messaging apps. These extended capabilities suggest that the malware aims for comprehensive surveillance of the target device. ” continues the report.

Spyware 126
article thumbnail

ScarCruft surveilling North Korean defectors and human rights activists

SecureList

The victim was infected by PowerShell malware and we discovered evidence that the actor had already stolen data from the victim and had been surveilling this victim for several months. The script compares the given encrypted string with a second string to get an index of matched characters. Description. up: Upload file. seconds.

article thumbnail

French court indicted Nexa Technologies for complicity in acts of torture

Security Affairs

Nexa Technologies was indicted for complicity in acts of torture, the French firm is accused of having sold surveillance equipment to the Egypt. Nexa Technologies offers a range of solutions for homeland security, including surveillance solutions. “In short, Cerebro can suck up any data that is not encrypted.