article thumbnail

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Krebs on Security

Justice Department today unsealed indictments against four Chinese officers of the People’s Liberation Army (PLA) accused of perpetrating the 2017 hack against consumer credit bureau Equifax that led to the theft of personal data on nearly 150 million Americans. commercial and government interests.

Military 237
article thumbnail

Russian govn blocked Tutanota service in Russia to stop encrypted communication

Security Affairs

Tutanota , the popular free and open-source end-to-end encrypted email software, has been blocked by Russian authorities. The popular free and open-source end-to-end encrypted email service Tutanota has been blocked in Russia on Friday evening. The Russian government could also ban IT companies that will not comply with the same law.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

National Academy of Sciences Encryption Study

Data Matters

Few would describe 2017 as a quiet year. After supporters and opponents of mandated government access to encrypted communications publicly feuded for much of 2016, reprising arguments they’ve had since at least the days of the “Clipper Chip,” these “encryption debates” seemed to quiet down for much of last year.

article thumbnail

Data Encryption: Learn the Basics to Protect Your Business Files

OneHub

What exactly is data encryption? Data encryption is a complex facet of data security that consists of high-level mathematics and cryptography. Encryption protects data such as business files by making the information unreadable to unauthorized users. If a hacker intercepts encrypted data, it’s useless without the decryption key.

article thumbnail

The importance of encryption in complying with Australia’s Privacy Amendment Act

Thales Cloud Protection & Licensing

November 2017 saw one of Australia’s biggest ever data breaches, in which sensitive personal information regarding almost 50,000 consumers and 5,000 public servants was exposed online. Here then, as with the breaches mentioned above, we can see the importance of an “encrypt everything” strategy, as referred to in my previous post.

article thumbnail

Researchers shared technical details of NSA Equation Group’s Bvp47 backdoor

Security Affairs

The name “ Bvp47 ” comes form numerous references to the string “Bvp” and the numerical value “0x47” used in the encryption algorithm. The Bvp47 backdoor was first discovered in 2013 while conducting a forensic investigation into a security breach suffered by a Chinese government organization.

article thumbnail

Feds Warn About Critical Infrastructure Ransomware Attacks, Vulnerabilities

eSecurity Planet

Secret Service issued a detailed advisory on the BlackByte Ransomware as a Service (RaaS) group, which has attacked critical infrastructure industries in recent months, among them government, financial and food and agriculture targets. “In cases where decryption is not possible, some data recovery can occur.”