article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

Here are five notable historical events that influenced cybersecurity assessment and transformed it into what it is today: The Battle of Midway (1942). military officials hired data analysts to crack the Japanese secret code known as JN-25. After the devastating blow of Pearl Harbor, U.S. The ILOVEYOU Worm (2000).

article thumbnail

Protecting the Crown Jewels: The evolution of security strategies and asset protection

Thales Cloud Protection & Licensing

These men and women are obviously highly trained in security matters, as it’s reported that they need to have 22 years of military service to even. Does this historical reference to keys have a connection to modern day security for the Queen during events such as the upcoming Platinum Jubilee in June 2022? IAM and Key Management.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Onyx Ransomware Destroys Large Files Instead of Locking Them

eSecurity Planet

Cybersecurity researchers last week revealed that a new ransomware gang called Onyx is simply destroying larger files rather than encrypting them. The Onyx ransomware group doesn’t bother with encryption. Only small files lower than 2MB are encrypted. In encrypt mode, small files encrypted, others overwritten.

article thumbnail

Crypto AG was spied for US, German intelligence agencies for decades

Security Affairs

Swiss authorities are investigating into allegations the company Crypto AG, a Switzerland-based maker of encryption devices, was a front company for the CIA and German intelligence. The list of Crypto’s customers included Iran, India and Pakistan, military juntas in Latin America and the Vatican.

article thumbnail

How to Ensure Your Digital Security During the Rugby World Cup

Thales Cloud Protection & Licensing

Sports fans aren’t the only ones who are looking forward to this event. It’s not like bad actors haven’t taken an interest in major sporting events before. That’s why it announced it would pursue two measures designed to strengthen its national digital security posture ahead of these sporting events.

Security 105
article thumbnail

Snowden Ten Years Later

Schneier on Security

Chatting with Snowden on an encrypted IM connection, I joked that the NSA cafeteria menu probably has code names for menu items. You read so much classified information about the world’s geopolitical events that you start seeing the world differently. Transferring files electronically is what encryption is for. Probably not.

article thumbnail

2020 Predictions – Quantum knows what you did last summer

Thales Cloud Protection & Licensing

Quantum computers can launch attacks that break asymmetric cryptography, rendering the entire PKI-based encryption method obsolete. For countries that extensively rely on encryption to secure military operations, diplomatic correspondence or other sensitive data, this could be a watershed event.