encrypted
-
Blog
Ransomware gang encrypted network from a webcam to bypass EDR
The Akira ransomware gang was spotted using an unsecured webcam to launch encryption attacks on a victim’s network, effectively circumventing Endpoint Detection and Response (EDR), which was blocking the encryptor in Windows. Cybersecurity firm S-RM team discovered the unusual attack method during a recent incident response at one of their clients. Notably, Akira only pivoted to the webcam after attempting to…
Read More » -
Blog
Ransomware gang encrypted network from a webcam to bypass EDR
The Akira ransomware gang was spotted using an unsecured webcam to launch encryption attacks on a victim’s network, effectively circumventing Endpoint Detection and Response (EDR), which was blocking the encryptor in Windows. Cybersecurity firm S-RM team discovered the unusual attack method during a recent incident response at one of their clients. Notably, Akira only pivoted to the webcam after attempting to…
Read More » -
Blog
The Best AI-Free, Encrypted Alternatives to Google Docs
Face it: with the competition spending hundreds of millions of dollars on it, Google’s recent foray into AI isn’t going to stop anytime soon. While you can hide Google Workspace’s Gemini buttons and prompts for now, you can’t actually stop the company from continuing to build its apps around a technology that revolves around getting its hands on as much…
Read More » -
Blog
Sky ECC encrypted service distributors arrested in Spain, Netherlands
Four distributors of the encrypted communications service Sky ECC, used extensively by criminals, were arrested in Spain and the Netherlands. According to an announcement by the Spanish police, the two suspects arrested in the country were the leading global distributors of the service, generating over €13.5 million ($14M) in profits. Investigation into the communications service, its sellers, and customers started…
Read More » -
Blog
UK orders Apple to let it access everyone’s encrypted data – Computerworld
Apple might suspend some UK services It is thought that Apple could withdraw some of its services from the UK market as a result, as it warned it might when the law was first articulated in 2023. At that time, it called the measure a “serious, direct threat” to security and privacy. It also warned that the global nature of the…
Read More » -
Blog
UK Government Reportedly Demands Access to Encrypted iCloud Files
The U.K.’s office of the Home Secretary has allegedly asked Apple to provide a backdoor into any material any user has uploaded to iCloud worldwide, The Washington Post reported on Feb. 7. Anonymous sources provided The Washington Post the information and expressed concerns about tech companies being leveraged for government surveillance. Apple has not commented; however, in March, the company…
Read More » -
Blog
Apple ordered to open encrypted user accounts globally to UK spying
Apple has reportedly been ordered by the UK government to create a backdoor that would give security officials access to users’ encrypted iCloud backups. If implemented, British security services would have access to the backups of any user worldwide, not just Brits, and Apple would not be permitted to alert users that their encryption was compromised. The Washington Post reports…
Read More » -
Blog
Researchers claim an AMD security flaw could let hackers access encrypted data
Researchers have exposed an issue with the memory implementation on AMD’s data center chips that could threaten the integrity of data, but the chipmaker has hit back at the claims. In a paper due to be presented at IEEE in 2025, researchers from University of Lübeck, KU Leven, and University of Birmingham highlighted a potential weakness in AMD’s secure encrypted…
Read More » -
Blog
Police seize Matrix encrypted chat service after spying on criminals
An international law enforcement operation codenamed ‘Operation Passionflower’ has shut down MATRIX, an encrypted messaging platform used by cybercriminals to coordinate illegal activities while evading police. It should be noted that MATRIX is a different entity from the secure open-source, decentralized, real-time communications protocol with the same name, which is perfectly legal to continue using. The operation was conducted across…
Read More » -
Blog
iPhones now auto-restart to block access to encrypted data after long idle times
Apple has added a new security feature with the iOS 18.1 update released last month to ensure that iPhones automatically reboot after long idle periods to re-encrypt data and make it harder to extract. While the company has yet to officially confirm this new “inactivity reboot” feature, law enforcement officers were the first to discover it after observing suspects’ iPhones…
Read More »