Remove Conference Remove Encryption Remove Government Remove Military
article thumbnail

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Krebs on Security

as members of the PLA’s 54 th Research Institute, a component of the Chinese military. Attorney General Bill Barr said at a press conference today that the Justice Department doesn’t normally charge members of another country’s military with crimes (this is only the second time the agency has indicted Chinese military hackers).

Military 243
article thumbnail

The Myth of Consumer-Grade Security

Schneier on Security

The Department of Justice wants access to encrypted consumer devices but promises not to infiltrate business products or affect critical infrastructure. Barr repeated a common fallacy about a difference between military-grade encryption and consumer encryption: "After all, we are not talking about protecting the nation's nuclear launch codes.

Military 103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Snowden Ten Years Later

Schneier on Security

Chatting with Snowden on an encrypted IM connection, I joked that the NSA cafeteria menu probably has code names for menu items. Neither were any of the algorithm names I knew, not even algorithms I knew that the US government used. Transferring files electronically is what encryption is for. Probably not. Very probably.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Increasingly, thought leaders, professional organizations, and government agencies are beginning to provide answers. Creating an enterprise-wide governance structure. Encrypting critical data assets. Creating an Enterprise-Wide Governance Structure. Aligning cyber risk with corporate strategy. Managing digital identities.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

In the summer of 2018 during Rootz, a program to teach kids hacking during the annual DEF CON conference in Las Vegas, Nevada, an eleven-year-old hacker exploited an online imitation of the State of Florida’s Election Site in a matter of minutes. Things like network encryption, certificate pinning - is this device domain joined or not?

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

In the summer of 2018 during Rootz, a program to teach kids hacking during the annual DEF CON conference in Las Vegas, Nevada, an eleven-year-old hacker exploited an online imitation of the State of Florida’s Election Site in a matter of minutes. Things like network encryption, certificate pinning - is this device domain joined or not?

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

In the summer of 2018 during Rootz, a program to teach kids hacking during the annual DEF CON conference in Las Vegas, Nevada, an eleven-year-old hacker exploited an online imitation of the State of Florida’s Election Site in a matter of minutes. Things like network encryption, certificate pinning - is this device domain joined or not?