Ransomware penetrates an organization’s IT infrastructure through phishing emails or endpoint vulnerabilities and then encrypts files, holding data hostage until a fee is paid to decrypt them. The FBI has deemed ransomware the fastest growing malware threat, causing significant revenue loss, business downtime and reputational damage. It’s critical organizations protect their data by following the best practices.
Google has announced it will be releasing a new Virtual Private Network (VPN), which will be directly embedded in Google One services. Cybersecurity experts, however, think the service leaves much to be desired.
Check Point Research unraveled an ongoing surveillance operation by Iranian entities that has been targeting Iranian expats and dissidents for years. While some individual sightings of this attack were previously reported by other researchers and journalists, the investigation allowed Check Point to connect the different campaigns and attribute them to the same attackers.
The Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2020 (EARN IT), aimed at protecting children from online predators, is facing scrutiny from those who believe it will undermine privacy, promote censorship and jeopardize the right to free speech.
A new publication by cryptography experts at the National Institute of Standards and Technology (NIST) proposes the direction the technical agency will take to develop a more secure approach to encryption. This approach, called threshold cryptography, could overcome some of the limitations of conventional methods for protecting sensitive transactions and data.
U.S. Senators introduced the Lawful Access to Encrypted Data Act, a bill to bolster national security interests and better protect communities across the country by ending the use of “warrant-proof” encrypted technology by terrorists and other bad actors to conceal illicit behavior.
To help agencies understand and effectively manage encryption keys, SAFECOM and the National Council of Statewide Interoperability Coordinators (NCSWIC), in collaboration with the Federal Partnership for Interoperable Communications (FPIC), developed the Encryption Key Management Fact Sheet. Public safety organizations can leverage the Fact Sheet's information and familiarize themselves with the many aspects of encryption key management.