article thumbnail

Law Enforcement Access to Chat Data and Metadata

Schneier on Security

A January 2021 FBI document outlines what types of data and metadata can be lawfully obtained by the FBI from messaging apps. Lots of apps leak all sorts of metadata: iMessage and WhatsApp seem to be the worst. Signal protects the most metadata. Rolling Stone broke the story and it’s been written about elsewhere.

Metadata 116
article thumbnail

CDRThief Linux malware steals VoIP metadata from Linux softswitches

Security Affairs

CDRThief specifically targets internal MySQL databases running in the devices to steal call metadata, including IP addresses of the callers, phone numbers, start time and duration of the call, call route, and call type. “To steal this metadata, the malware queries internal MySQL databases used by the Softswitch.”

Metadata 120
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ACT police admit they unlawfully accessed metadata more than 3,000 times

The Guardian Data Protection

Police seeking legal advice about two cases that resulted in information that ‘may have been used in a prosecution’ ACT Policing has admitted it unlawfully accessed citizens’ metadata a total of 3,365 times, not 116 as previously disclosed in an explosive commonwealth ombudsman’s report on Monday.

Metadata 109
article thumbnail

CDRThief Linux malware steals VoIP metadata from Linux softswitches

Security Affairs

CDRThief specifically targets internal MySQL databases running in the devices to steal call metadata, including IP addresses of the callers, phone numbers, start time and duration of the call, call route, and call type. “To steal this metadata, the malware queries internal MySQL databases used by the Softswitch.”

article thumbnail

Evaluating the NSA's Telephony Metadata Program

Schneier on Security

Interesting analysis: " Examining the Anomalies, Explaining the Value: Should the USA FREEDOM Act's Metadata Program be Extended? " Abstract: The telephony metadata program which was authorized under Section 215 of the PATRIOT Act, remains one of the most controversial programs launched by the U.S. by Susan Landau and Asaf Lubin.

article thumbnail

GUEST ESSAY: How tech tricks used by Amazon, Netflix aid Ukraine in repelling Russia’s invasion

The Last Watchdog

Metadata’s role As important as the video content itself is, there is an even more critical element: metadata. Video metadata includes the date the video was created, the creator’s name, location, date of upload, and even the camera ID. Thus metadata and standards play a vital role in sharing and controlling data?

Metadata 130
article thumbnail

You can now implement and maintain encryption with minimal impact

Thales Cloud Protection & Licensing

You can now implement and maintain encryption with minimal impact. Encryption is best practice to ensure cybercriminals do not gain access to your business’s sensitive data. But deployment and management of encryption generally incur downtime. Most of this downtime is generated by initial encryption and re-keying data sets.