Remove 2017 Remove Encryption Remove Government Remove Security
article thumbnail

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Krebs on Security

Justice Department today unsealed indictments against four Chinese officers of the People’s Liberation Army (PLA) accused of perpetrating the 2017 hack against consumer credit bureau Equifax that led to the theft of personal data on nearly 150 million Americans. commercial and government interests. .”

Military 246
article thumbnail

Russian govn blocked Tutanota service in Russia to stop encrypted communication

Security Affairs

Tutanota , the popular free and open-source end-to-end encrypted email software, has been blocked by Russian authorities. The popular free and open-source end-to-end encrypted email service Tutanota has been blocked in Russia on Friday evening. The Russian government could also ban IT companies that will not comply with the same law.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How your staff make security decisions: The psychology of information security

IT Governance

Your employees encounter potential cyber security threats on a daily basis. In The Psychology of Information Security , Leron Zinatullin explains how employees respond to those challenges and explains why they make the decisions they do. Use this book to understand your employee’s behaviour and resolve security-related conflicts.

article thumbnail

Data Encryption: Learn the Basics to Protect Your Business Files

OneHub

What exactly is data encryption? Data encryption is a complex facet of data security that consists of high-level mathematics and cryptography. Encryption protects data such as business files by making the information unreadable to unauthorized users. Do I really need to encrypt business files? Yes, urgently.

article thumbnail

National Academy of Sciences Encryption Study

Data Matters

Few would describe 2017 as a quiet year. After supporters and opponents of mandated government access to encrypted communications publicly feuded for much of 2016, reprising arguments they’ve had since at least the days of the “Clipper Chip,” these “encryption debates” seemed to quiet down for much of last year.

article thumbnail

The importance of encryption in complying with Australia’s Privacy Amendment Act

Thales Cloud Protection & Licensing

November 2017 saw one of Australia’s biggest ever data breaches, in which sensitive personal information regarding almost 50,000 consumers and 5,000 public servants was exposed online. Here then, as with the breaches mentioned above, we can see the importance of an “encrypt everything” strategy, as referred to in my previous post.

article thumbnail

Researchers shared technical details of NSA Equation Group’s Bvp47 backdoor

Security Affairs

National Security Agency (NSA) Equation Group. The name “ Bvp47 ” comes form numerous references to the string “Bvp” and the numerical value “0x47” used in the encryption algorithm. Follow me on Twitter: @securityaffairs and Facebook.