encryption

  • Blog

    Hackers are turning Amazon S3 bucket encryption against customers in new ransomware campaign – and they’ve already claimed two victims

    Hackers who were able to steal data belonging to two AWS customers used the platform’s encryption capabilities to conduct a novel type of ransomware attack, researchers have warned. A new report from cyber resilience firm Halcyon’s RISE team identified a new ransomware campaign targeting Amazon S3 buckets, where the attackers leverage AWS’ server-side encryption along with the Customer Provided Keys…

    Read More »
  • Blog

    Worried About VoIP Security and Encryption? We Aren’t

    Any modern business using a Voice over Internet Protocol (VoIP) phone system knows that maintaining security is essential for confidentiality, customer trust, and regulation compliance. Industries like healthcare, for example, have strict regulations governing communications, and HIPAA-compliant VoIP providers offer security, privacy, and access management tools to help companies follow these regulations — even when employees access the network from…

    Read More »
  • Blog

    Banshee stealer evades detection using Apple XProtect encryption algo

    A new version of the Banshee info-stealing malware for macOS has been evading detection over the past two months by adopting string encryption from Apple’s XProtect. Banshee is an information stealer focused on macOS systems. It emerged in mid-2024 as a stealer-as-a-service available to cybercriminals for $3,000. Its source code was leaked on the XSS forums in November 2024, leading to…

    Read More »
  • Blog

    Over 3 million mail servers without encryption exposed to sniffing attacks

    Over three million POP3 and IMAP mail servers without TLS encryption are currently exposed on the Internet and vulnerable to network sniffing attacks. IMAP and POP3 are two methods for accessing email on mail servers. IMAP is recommended for checking emails from multiple devices, such as phones and laptops because it keeps your messages on the server and synchronizes them…

    Read More »
  • Blog

    The FBI now says encryption is good for you – Computerworld

    The FBI also shared a recipe for security that should be on the desk of every IT purchaser. It recommends you use mobile devices that automatically receive timely OS updates, have encryption built in, and use multi-factor authentication for most collaboration tools. In other words, use a higher-end smartphone in preference to a low-end land-fill wannabe. Or, given that the…

    Read More »
  • Blog

    New tool bypasses Google Chrome’s new cookie encryption system

    A researcher has released a tool to bypass Google’s new App-Bound encryption cookie-theft defenses and extract saved credentials from the Chrome web browser. The tool, named ‘Chrome-App-Bound-Encryption-Decryption,’ was released by cybersecurity researcher Alexander Hagenah after he noticed that others were already figuring out similar bypasses. Although the tool achieves what multiple infostealer operations have already added to their malware, its public…

    Read More »
  • Blog

    New Qilin ransomware encryptor features stronger encryption, evasion

    A new Rust-based version of the Qilin (Agenda) ransomware strain, dubbed ‘Qilin.B,’ has been spotted in attacks, featuring stronger encryption, better evasion from security tools, and the ability to disrupt data recovery mechanisms. Qilin.B was spotted by security researchers at Halcyon, who warned about the threat and shared indicators of compromise to help with early detection. Qilin updates its encryptor…

    Read More »
  • Blog

    Chinese researchers break RSA encryption with a quantum computer

    “Many cryptographic algorithms that enterprises rely on today, such as RSA and ECC, are based on mathematical problems that are computationally difficult for classical computers to solve efficiently,” said Prabhjyot Kaur, senior analyst at Everest Group. “However, the advent of quantum computing threatens the security of these algorithms. The need for robust quantum-safe or post-quantum cryptographic solutions becomes increasingly evident…

    Read More »
  • Blog

    Encryption is coming to RCS, protecting Android and iPhone – Computerworld

    RCS Universal Profile is an industry-agreed set of features and technologies the GSMA has standardized so RCS can be widely deployed in products and services. The most recent version, RCS Universal Profile 2.7, introduced support for more advanced messaging features, such as reactions, editing of sent messages, and improved message indicators. Apple now supports RCS on iPhone Apple has now adopted…

    Read More »
  • Blog

    The complete BitLocker encryption guide for Windows PCs – Computerworld

    BitLocker is often configured to function in “transparent” mode, automatically unlocking itself when you boot your computer. This uses the TPM (Trusted Platform Module) hardware in your computer to unlock the drive. The TPM stores the encryption key and provides it only if the Windows operating system doesn’t appear to have been tampered with. This technology is a critical way…

    Read More »
Back to top button
close