Remove Encryption Remove Government Remove Paper Remove Security
article thumbnail

Security Analysis of Threema

Schneier on Security

A group of Swiss researchers have published an impressive security analysis of Threema. We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted messaging application with more than 10 million users and 7000 corporate customers. It also said the researchers were overselling their findings.

Security 120
article thumbnail

Decoupling for Security

Schneier on Security

This is an excerpt from a longer paper. We can and should get the benefits of the cloud while taking security back into our own hands. These ideas, which we’ll refer to in the aggregate as “decoupling,” allow us to rethink both security and privacy. In security this is called Least Privilege.

Security 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Information Security vs Cyber Security: The Difference

IT Governance

You’ll often see the terms cyber security and information security used interchangeably. In this blog, we explain what information security and cyber security are, the differences between them and how they fit into your data protection practices. What is information security? This is cyber security.

article thumbnail

Homomorphic Encryption Makes Real-World Gains, Pushed by Google, IBM, Microsoft

eSecurity Planet

The increasing mobility of data, as it ping-pongs between clouds, data centers and the edge, has made it an easier target of cybercrime groups, which has put a premium on the encryption of that data in recent years. Since then, interest in fully homomorphic encryption (FHE) has increased, largely paralleling the rise of cloud computing.

article thumbnail

Security Risks of Government Hacking

Schneier on Security

Some of us -- myself included -- have proposed lawful government hacking as an alternative to backdoors. A new report from the Center of Internet and Society looks at the security risks of allowing government hacking. From the report's conclusion: Government hacking is often lauded as a solution to the "going dark" problem.

article thumbnail

Breaking RSA with a Quantum Computer

Schneier on Security

A group of Chinese researchers have just published a paper claiming that they can—although they have not yet done so—break 2048-bit RSA. Honestly, most of the paper is over my head—both the lattice-reduction math and the quantum physics. This is something to take seriously. But…wow…maybe…and yikes!

Paper 145
article thumbnail

Private 5G Networks: Thales and Celona Collaborate to Bring Security and Performance to a Modern World

Thales Cloud Protection & Licensing

These private mobile networks are gaining significant traction in manufacturing, energy, government, logistics, and warehousing verticals. This transition is an opportunity to look at the next generation of security. Specifically, how can organizations apply high levels of security to 5G infrastructure without sacrificing performance?