article thumbnail

BianLian Skips Encryption On Way To Extortion

Data Breach Today

BianLian Is Not Double Trouble Anymore, Says US CISA The BianLian ransomware group is abandoning malicious encryption in favor of pure extortion, warns the U.S. top cybersecurity agency. A major likely factor in BianLian's shift was cybersecurity firm Avast's January release of a free decryptor.

article thumbnail

UK Threatens End-to-End Encryption

Schneier on Security

The Bill provides no explicit protection for encryption, and if implemented as written, could empower OFCOM to try to force the proactive scanning of private messages on end-to-end encrypted communication services – nullifying the purpose of end-to-end encryption as a result and compromising the privacy of all users.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US Government Picks Quantum-Resistant Encryption Algorithms

Data Breach Today

Quantum Computers That Use Atom-Level States of Uncertainty Are a Matter of Time The National Institute of Standards and Technology today announced a first group of encryption algorithms designed to withstand the assault of a future quantum computer. Selection of the four algorithms comes after six years of evaluation by the U.S.

article thumbnail

Russian Hackers Target Ukraine With Malicious Encryption

Data Breach Today

From Russia with Love Group Boasted of Removing Decryptor from Somnia Ransomware Russian hackers are on a campaign to maliciously encrypt the files of Ukrainian victims - but unlike other ransomware groups, doing so without the possibility of offering a decryptor.

article thumbnail

The Modern Encryption Software Checklist: The Secret to Understanding Your Data Security Needs

The following checklist is built to help you evaluate the scope of services offered by various encryption solutions on the market and covers questions on the following topics: Encryption. Understanding your data security needs is tough enough, but what can be even more difficult is choosing the right software to fit your company.

article thumbnail

Microsoft Email Encryption Vulnerable to Structural Leaks

Data Breach Today

Redmond Uses Protocol NIST Says Is a "Severe Security Vulnerability" Emails encrypted through Microsoft Office are vulnerable to attacks that can reveal the original content of messages due to shortcomings in the protocol, says WithSecure security researcher Harry Sintonen.

article thumbnail

ISMG Editors: Ransomware Gangs Are Using Partial Encryption

Data Breach Today

Also: Improving Private-Public Collaboration, ISMG'S Africa Summit Four editors at Information Security Media Group analyze private-public partnerships today, preview ISMG's upcoming cybersecurity summit in Africa and discuss the increasing use of intermittent or partial encryption by ransomware gangs as a means to extort money from victims faster. (..)