Signal Is Finally Bringing Its Secure Messaging to the Masses

from Wired Last month, the cryptographer and coder known as Moxie Marlinspike was getting settled on an airplane when his seatmate, a Midwestern-looking man in his sixties, asked for help. He couldn’t figure out how to enable airplane mode on his aging Android phone. But when Marlinspike saw the screen, he wondered for a moment if he was being trolled: Among just a handful of apps installed on the phone was Signal. Marlinspike launched Signal, widely considered the world’s most secure end-to-end encrypted messaging app, nearly five years ago, and today heads the nonprofit Signal Foundation that maintains it. But […]

Continue reading

New Ransomware Doesn’t Just Encrypt Data. It Also Meddles With Critical Infrastructure

from ars technica Over the past five years, ransomware has emerged as a vexing menace that has shut down factories, hospitals, and local municipalities and school districts around the world. In recent months, researchers have caught ransomware doing something that’s potentially more sinister: intentionally tampering with industrial control systems that dams, electric grids, and gas refineries rely on to keep equipment running safely. A ransomware strain discovered last month and dubbed Ekans contains the usual routines for disabling data backups and mass-encrypting files on infected systems. But researchers at security firm Dragos found something else that has the potential to […]

Continue reading

Whatsapp ‘Hack’ Is Serious Rights Violation, Say Alleged Victims

from The Guardian More than a dozen pro-democracy activists, journalists and academics have spoken out after WhatsApp privately warned them they had allegedly been the victims of cyber-attacks designed to secretly infiltrate their mobile phones. The individuals received alerts saying they were among more than 100 human rights campaigners whose phones were believed to have been hacked using malware sold by NSO Group, an Israeli cyberweapons company. WhatsApp launched an unprecedented lawsuit against the surveillance company earlier this week, claiming it had discovered more than 1,400 of its users were targeted by NSO technology in a two-week period in May. […]

Continue reading

Huawei Was a Czech Favorite. Now? It’s a National Security Threat.

from NYTs For more than 1,000 years, the sprawling castle complex perched high above Prague has been the seat of power for Holy Roman emperors, the kings of Bohemia and, now, the Czech president, Milos Zeman. And for the last four years, the Chinese technology giant Huawei has had a contract to fulfill the communication needs of the president and his staff. The presidential contract is the most visible symbol of how deeply Huawei has established itself in the Czech Republic, long viewed by China as a springboard country for its interests across the European Union. So when the Czech […]

Continue reading

Europe Is Developing Offensive Cyber Capabilities. The United States Should Pay Attention.

from Net Politics It is no surprise that the United States and its European allies are looking to integrate offensive cyber capabilities as part of their military operations. Last year, the Pentagon boasted about dropping “cyber bombs” on the self-declared Islamic State group. France and the United Kingdom have built similar capabilities, as have smaller European states, such as Denmark, Sweden, Greece and the Netherlands. Unfortunately, as NATO members rush to build their capabilities, they will quickly have to confront challenging trade-offs. Cyberweapons—or specifically the vulnerabilities they exploit—tend to be single use weapons: once a defender or vendor identifies a […]

Continue reading

Don’t Connect to a Public Wi-Fi Network Anywhere You Wouldn’t Go Barefoot

from New America Weekly We’ve all done it. Maybe because of work pressures—you need to catch a plane but are also pushing toward a deadline. Maybe out of sheer boredom—your flight is delayed yet another hour and there is really only so much time you can spend at the airport bar before noon. Whatever the reason, we’ve all been there—stuck in the airport, looking at a list of little Wi-Fi signals, some without the lock next to them, wondering … it couldn’t hurt, could it? Just this once? Of course, airports aren’t the only place with skeezy Wi-Fi. Coffee shops, […]

Continue reading

Verizon’s Mobile ‘Supercookies’ Seen as Threat to Privacy

from NYTs For the last several months, cybersecurity experts have been warning Verizon Wireless that it was putting the privacy of its customers at risk. The computer codes the company uses to tag and follow its mobile subscribers around the web, they said, could make those consumers vulnerable to covert tracking and profiling. It looks as if there was reason to worry. This month Jonathan Mayer, a lawyer and computer science graduate student at Stanford University, reported on his blog that Turn, an advertising software company, was using Verizon’s unique customer codes to regenerate its own tracking tags after consumers […]

Continue reading

How My Mom Got Hacked

from NYTs MY mother received the ransomnote on the Tuesday before Thanksgiving. It popped up on her computer screen soon after she’d discovered that all of her files had been locked. “Your files are encrypted,” it announced. “To get the key to decrypt files you have to pay 500 USD.” If my mother failed to pay within a week, the price would go up to $1,000. After that, her decryption key would be destroyed and any chance of accessing the 5,726 files on her PC — all of her data — would be lost forever. Sincerely, CryptoWall. CryptoWall 2.0 is […]

Continue reading

Click Here to See If You’re Under Surveillance

from BusinessWeek For more than two years, researchers and rights activists have tracked the proliferation and abuse of computer spyware that can watch people in their homes and intercept their e-mails. Now they’ve built a tool that can help the targets protect themselves. The free, downloadable software, called Detekt, searches computers for the presence of malicious programs that have been built to evade detection. The spyware ranges from government-grade products used by intelligence and police agencies to hacker staples known as RATs—remote administration tools. Detekt, which was developed by security researcher Claudio Guarnieri, is being released in a partnership with advocacy groups Amnesty […]

Continue reading