-
Snowden dismisses FBI's claim it cannot unlock San Bernardino killers’ iPhone
Edward Snowden has joined the debate over the FBI’s attempt to force Apple to help it unlock the iPhone 5C used by one of the San Bernardino terrorists. The FBI says that only Apple can deactivate certain passcode protections on the iPhone — for example, the 10-attempt limit, which makes the phone permanently inaccessible after ten attempts to guess the password —which would allow law enforcement to guess the passcode by using brute-force.
-
-
ISIS hackers post N.J. police officers’ details online, calling on followers to attack them
ISIS hackers have posted the personal details of U.S. officials online, encouraging the group’s supporters to carry out “lone wolf” attacks against them. The Caliphate Cyber Army (CCA), formerly known as the Islamic Cyber Army, posted the personal details of fifty-five New Jersey police officers last week after hacking into the Web site of the New Jersey Transit police.
-
-
Calif. terrorists’ iPhone may have been used to introduce malware into data networks: DA
San Bernardino County District Attorney Michael Ramos has advanced what experts describe as an unusual reason for forcing Apple to allow the FBI to break the password of the iPhone used by the two terrorists as part of the agency’s investigation of the attack. Ramos says the phone might have been “used as a weapon” to introduce malicious software to county computer systems.
-
-
New vulnerability discovered in Open SSL, a common encryption protection package
One of the world’s most common security software packages — used as the basis of protection for many Web browsers — has been found to be vulnerable to a specific form of attack, according to new research. Researchers have discovered that OpenSSL is vulnerable to a type of attack known as a “side channel attack.”
-
-
Web security protocol TLS compromised
In one third of all servers, the security protocol TLS and encrypted data transfer can be compromised. All types of online communication that deal with sensitive data are affected. The researchers discovered the flaw by launching a DROWN (Decrypting RSA with Obsolete and Weakened eNcryption) attack – which they will demonstrate and discuss at a forthcoming security conference in Germany.
-
-
French law would penalize encrypted phone makers who refuse to help police probes
French lawmakers on Thursday voted for a measure which would impose penalties on manufacturers of smartphone who refuse to cooperate with law enforcement in inquiries of terrorism cases. The measure stipulates that a private manufacturer of smartphones, which refuses to hand over encrypted data to an investigating authority, would face up to five years in jail and a 350,000 euro ($380,000) fine.
-
-
App warns users when they are about to give away sensitive information online
Researchers are seeing potential in a software application which could effectively warn users when they are about to give away sensitive personal information online. The eye tracker detects where a user’s eyes are at the computer screen and records how long they gazed at that spot. The app uses these two functions to find when a user’s eyes remain on a request for sensitive personal information.
-
-
Smartphones now account for 60% of infections in the mobile network
Nokia Security Center Berlin the other day released research findings showing that in the mobile networks, smartphones pulled ahead of Windows-based computers and laptops, now accounting for 60 percent of the malware activity observed in the mobile space. The Nokia Threat Intelligence Report also reveals an increase in iOS-based malware, growing sophistication of Android malware and the rising threat of mobile ransomware.
-
-
Three “twisted” photons in 3 dimensions for quantum encryption
Researchers have achieved a new milestone in quantum physics: they were able to entangle three particles of light in a high-dimensional quantum property related to the “twist” of their wave-front structure. Multi-photon entangled states such as these have applications ranging from quantum computing to quantum encryption. Along these lines, the authors of this study have developed a new type of quantum cryptographic protocol using their state that allows different layers of information to be shared asymmetrically among multiple parties with unconditional security.
-
-
FBI cannot force Apple to unlock iPhone in drug case: Judge
Magistrate Judge James Orenstein in Brooklyn on Monday ruled that the U.S. government cannot force Apple to unlock an iPhone in a New York drug case. The ruling strengthens the company’s arguments in its landmark legal confrontation with the Justice Department over encryption and privacy. The government sought access to the drug dealer’s phone months before a California judge ordered Apple to give access to the San Bernardino terrorist’s handset.
-
-
Using device “fingerprints” to protect power grid, industrial systems
Human voices are individually recognizable because they are generated by the unique components of each person’s voice box, pharynx, esophagus and other physical structures. Researchers are using the same principle to identify devices on electrical grid control networks, using their unique electronic “voices” — fingerprints produced by the devices’ individual physical characteristics — to determine which signals are legitimate and which signals might be from attackers. A similar approach could also be used to protect networked industrial control systems in oil and gas refineries, manufacturing facilities, wastewater treatment plants and other critical industrial systems.
-
-
In FBI versus Apple, government strengthened tech’s hand on privacy
The ongoing fight between Apple and the FBI over breaking into the iPhone maker’s encryption system to access a person’s data is becoming an increasingly challenging legal issue. This case is very specific, and in this narrow case, Apple and law enforcement agencies will likely find a compromise. However, this question is not going away anywhere. With the “Internet of things” touted as the next big revolution, more and more devices will capture our very personal data – including our conversations. This case could be a precedent-setting event that can reshape how our data are stored and managed in the future.
-
-
Hackers hold hospitals’ medical data hostage
Hackers attacked several hospitals in Germany with ransomware – locking medical files and demanding ransom payment for releasing the encrypted data. The blackmailing of hospitals by encrypting their medical file has become a growing problem around the world. In California, for example, a Hollywood hospital earlier this month had to pay about $17,000 in the digital currency bitcoins to hackers in order to regain access to medical files.
-
-
“Magic wand” to improve healthcare, cybersecurity
Wireless and mobile health technologies have great potential to improve quality and access to care, reduce costs. and improve health. But these new technologies, whether in the form of software for smartphones or specialized devices to be worn, carried or applied as needed, also pose risks if they’re not designed or configured with security and privacy in mind. Researchers have developed a digital “magic wand” to improve home healthcare and to prevent hackers from stealing your personal data.
-
-
Pro-ISIS hackers issue threats to Facebook, Twitter founders
Pro-ISIS hackers have released a video threatening the founders of Facebook and Twitter in retaliation for the two social media giants’ campaign to take down ISIS-related accounts. The threat was issued in a 25-minute video, uploaded on Tuesday to social networks by a group calling itself “Sons Caliphate Army” – which experts say is the latest “rebrand” of ISIS’s supporters online.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.