crypt Intel Chip Flaw - Math Unit May Spill Crypto Secrets To Apps By packetstormsecurity.com Published On :: Thu, 14 Jun 2018 01:21:32 GMT Full Article headline data loss flaw cryptography intel
crypt Weakness In Intel Chips Lets Researchers Steal Encrypted SSH Keystrokes By packetstormsecurity.com Published On :: Wed, 11 Sep 2019 13:56:24 GMT Full Article headline privacy flaw password cryptography intel
crypt Intel's SGX Coughs Up Crypto Keys When Scientists Tweak CPU Voltage By packetstormsecurity.com Published On :: Wed, 11 Dec 2019 16:44:11 GMT Full Article headline flaw cryptography intel
crypt Brazilian Judge Orders Another WhatsApp Block Over Message Encryption By packetstormsecurity.com Published On :: Wed, 20 Jul 2016 00:57:38 GMT Full Article headline government privacy spyware facebook brazil cryptography
crypt New Ransomware Doesn't Just Encrypt Data. It Also Meddles With Critical Infrastructure By packetstormsecurity.com Published On :: Tue, 04 Feb 2020 14:39:11 GMT Full Article headline malware scada cryptography
crypt Aastra IP Telephone Crypto Failure By packetstormsecurity.com Published On :: Fri, 04 Jan 2013 01:43:44 GMT The Aastra 6753i IP telephone uses 3DES encrypted payloads in ECB mode to pass configuration files, allowing for modification to the phone's set up. Full Article
crypt Design And Implementation Of A Voice Encryption System For Telephone Networks By packetstormsecurity.com Published On :: Mon, 01 Sep 2014 14:02:22 GMT This whitepaper goes into detail on design and implementation details for performing voice encryption on telephone networks. Written in Spanish. Full Article
crypt Running Encrypted ELF Binaries In Memory By packetstormsecurity.com Published On :: Wed, 04 Mar 2020 13:45:14 GMT Whitepaper called Blue Team vs. Red Team: How to run your encrypted binaries in memory and go undetected. This paper discusses the golden frieza project. Full Article
crypt Global TV Unencrypted Analytics By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 15:30:17 GMT The Global TV Android and iOS applications send potentially sensitive information such as device model and resolution, mobile carrier, days since first use, days since last use, total number of app launches, number of app launches since upgrade, and previous app session length, unencrypted to both first (CNAME to third) and third party sites (Adobe Experience Cloud, ScorecardResearch). Global TV Android versions 2.3.2 and below and iOS versions 4.7.5 and below are affected. Full Article
crypt Citytv Video Unencrypted Analytics By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 15:33:11 GMT The Citytv Video Android and iOS applications send potentially sensitive information such as device model and resolution, mobile carrier, days since first use, days since last use, total number of app launches, number of app launches since upgrade, and previous app session length, unencrypted to third party sites (Adobe Experience Cloud, ScorecardResearch). Citytv Video Android versions 4.08.0 and below and iOS versions 3.36 and below are affected. Full Article
crypt rcrypt 1.4 By packetstormsecurity.com Published On :: Thu, 22 May 2014 10:11:11 GMT rcrypt is a Windows PE binary crypter (a type of packer) that makes use of timelock techniques to cause a delay in execution. This delay can cause analysis to fail on time constrained systems such as on disk scanners. rcrypt can pack exes and dll files. It bypasses KAV and many others. Archive password is 0xrage.com. Full Article
crypt On The Run In Cuba, McAfee Pushes Cryptocurrency By packetstormsecurity.com Published On :: Sun, 07 Jul 2019 14:24:03 GMT Full Article headline government usa cuba mcafee cryptography
crypt Mandos Encrypted File System Unattended Reboot Utility 1.8.11 By packetstormsecurity.com Published On :: Thu, 09 Apr 2020 15:00:12 GMT The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system. Full Article
crypt U.S. Lawmakers To Introduce Bill That Threatens Encryption On Tech Platforms By packetstormsecurity.com Published On :: Fri, 21 Feb 2020 15:28:43 GMT Full Article headline government privacy usa backdoor cryptography
crypt Let's Encrypt Reaches One Billion Certificates Issued By packetstormsecurity.com Published On :: Fri, 28 Feb 2020 07:05:24 GMT Full Article headline privacy cryptography
crypt Facebook Denies Reports It Is Backing Away From Libra Cryptocurrency By packetstormsecurity.com Published On :: Wed, 04 Mar 2020 13:42:30 GMT Full Article headline bank facebook cryptography
crypt Let's Encrypt To Revoke 3 Million Certificates On March 4 By packetstormsecurity.com Published On :: Wed, 04 Mar 2020 13:42:34 GMT Full Article headline privacy flaw cryptography
crypt Zoom's End-To-End Encryption Isn't Actually End-To-End By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 14:26:25 GMT Full Article headline privacy flaw cryptography
crypt The CIA's Infamous, Unsolved Cryptographic Puzzle Gets A Final Clue By packetstormsecurity.com Published On :: Mon, 03 Feb 2020 15:59:36 GMT Full Article headline government usa spyware cryptography cia
crypt HP Data Protector Encrypted Communication Remote Command Execution By packetstormsecurity.com Published On :: Tue, 07 Jun 2016 07:51:36 GMT This Metasploit module exploits a well known remote code execution exploit after establishing encrypted control communications with a Data Protector agent. This allows exploitation of Data Protector agents that have been configured to only use encrypted control communications. This exploit works by executing the payload with Microsoft PowerShell so will only work against Windows Vista or newer. Tested against Data Protector 9.0 installed on Windows Server 2008 R2. Full Article
crypt Why Big ISPs Aren't Happy About Google's Plans For Encrypted DNS By packetstormsecurity.com Published On :: Tue, 01 Oct 2019 13:50:11 GMT Full Article headline privacy dns google
crypt Firefox Turns On Encrypted DNS By Default To Thwart Snooping ISPs By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:00:05 GMT Full Article headline privacy dns mozilla firefox cryptography
crypt CurveBall Microsoft Windows CryptoAPI Spoofing Proof Of Concept By packetstormsecurity.com Published On :: Thu, 16 Jan 2020 16:16:02 GMT This is a proof of concept exploit that demonstrates the Microsoft Windows CryptoAPI spoofing vulnerability as described in CVE-2020-0601 and disclosed by the NSA. Full Article
crypt RC4 Simple FILE Encryption / Decryption By packetstormsecurity.com Published On :: Thu, 05 Apr 2018 20:20:02 GMT Simple script to perform RC4 encryption / decryption. Full Article
crypt XOR File Encryption / Decryption By packetstormsecurity.com Published On :: Tue, 10 Apr 2018 02:22:22 GMT Script to perform basic XOR file encryption / decryption. Full Article
crypt Whoops! Tiny Bug In NetBSD 6.0 Code Ruins SSH Crypto Keys By packetstormsecurity.com Published On :: Tue, 26 Mar 2013 15:15:25 GMT Full Article headline flaw bsd cryptography
crypt Hyperthreading Under Scrutiny With New TLBleed Crypto Key Leak By packetstormsecurity.com Published On :: Tue, 26 Jun 2018 15:49:41 GMT Full Article headline flaw bsd cryptography
crypt Look Who's Joined The Anti-Encryption Posse: Germany, Come On Down By packetstormsecurity.com Published On :: Fri, 16 Jun 2017 14:11:25 GMT Full Article headline government privacy usa britain germany backdoor cryptography
crypt German Police Handed Hacking Powers To Bypass Encrypted Communications By packetstormsecurity.com Published On :: Sat, 24 Jun 2017 16:49:10 GMT Full Article headline government privacy phone germany spyware backdoor cryptography
crypt Switzerland Files Criminal Complaint Over Crypto Spying Scandal By packetstormsecurity.com Published On :: Sun, 01 Mar 2020 15:40:28 GMT Full Article headline government privacy cyberwar germany spyware cryptography switzerland cia
crypt After Paris, Encryption Will Be A Key Issue In The 2016 Race By packetstormsecurity.com Published On :: Tue, 17 Nov 2015 16:53:20 GMT Full Article headline government privacy usa france terror cryptography
crypt French, German Ministers Demand New Encryption Backdoor Law By packetstormsecurity.com Published On :: Thu, 25 Aug 2016 13:39:27 GMT Full Article headline privacy germany france backdoor cryptography
crypt Germany, France Lobby Hard For Encryption Backdoors By packetstormsecurity.com Published On :: Tue, 28 Feb 2017 14:17:08 GMT Full Article headline government phone germany france backdoor cryptography
crypt France To Block Facebook's Libra Cryptocurrency In Europe By packetstormsecurity.com Published On :: Fri, 13 Sep 2019 14:35:56 GMT Full Article headline government bank fraud france facebook social cryptography
crypt Symantec Mobile Encryption For iPhone 2.1.0 Denial Of Service By packetstormsecurity.com Published On :: Mon, 03 Sep 2018 04:44:44 GMT Symantec Mobile Encryption for iPhone version 2.1.0 suffers from a denial of service vulnerability. Full Article
crypt Microsoft Outlook Email Breach Targeted Cryptocurrency Users By packetstormsecurity.com Published On :: Tue, 30 Apr 2019 00:59:50 GMT Full Article headline hacker privacy microsoft email data loss cryptography
crypt Apple Mail On macOS Leaves Parts Of Encrypted Emails In Clear By packetstormsecurity.com Published On :: Sat, 09 Nov 2019 13:44:41 GMT Full Article headline privacy email flaw apple cryptography
crypt A Crypto-Mining Botnet Has Been Hijacking MSSQL Servers For Almost Two Years By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 14:26:20 GMT Full Article headline hacker microsoft database fraud flaw cryptography
crypt Cryptocurrency Issuers, Exchanges Face U.S. Class Action Lawsuits By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:17:58 GMT Full Article headline bank fraud cryptography
crypt Hackers Steal $25 Million Worth Of Cryptocurrency From Uniswap And Lendf.me By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 15:06:39 GMT Full Article headline hacker bank cybercrime data loss fraud cryptography
crypt DForce Hacker Returns $25m In Stolen Cryptocurrency By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 13:43:11 GMT Full Article headline hacker cybercrime fraud cryptography
crypt ESET Takes Down VictoryGate Cryptomining Botnet By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:15:16 GMT Full Article headline malware botnet fraud cryptography
crypt Shade Threat Actors Call It Quits, Release 750k Encryption Keys By packetstormsecurity.com Published On :: Fri, 01 May 2020 13:36:53 GMT Full Article headline hacker malware cybercrime fraud password cryptography
crypt OpenSSH Chink Bares Encrypted Data Packets By packetstormsecurity.com Published On :: Tue, 19 May 2009 09:13:21 GMT Full Article ssh
crypt Cryptocurrency AML Regulation: 10 January 2020 Regime By www.eversheds.com Published On :: 2020-01-10 As part of the UK Governments’ ongoing programme to implement the European Union’s Fifth Money Laundering Directive (5MLD) in UK law, the FCA will begin supervising Anti Money Laundering and Countering Financing of Terrorism (AML/CFT) co... Full Article
crypt The law for crypto-asset custody By www.eversheds.com Published On :: 2019-11-25 James Burnie throws light on the law for the custody of crypto-assets in this exclusive interview with New Money Review. Click here to read the article > This article was written and published by New Money Review Staff on November 25, 2019.... Full Article
crypt Regulation of crypto custody in Germany from January 2020 By www.eversheds.com Published On :: 2019-11-26 As part of the implementation of the Amending Directive of the Fourth EU Directive on Money Laundering (Directive (EU)2018/843), the German Federal Government has decided to include crypto assets in the list of financial instruments and to regulate ... Full Article
crypt Overview of new German and French crypto regimes By www.eversheds.com Published On :: 2020-03-05 Part A: Regulation of crypto assets Germany Full Article
crypt Crypto Tax Update: HMRC Publishes Guidance on the Taxation of Cryptoassets for Businesses By www.eversheds.com Published On :: 2019-12-02 Summary On 1 November HMRC published its much anticipated guidance on the taxation of cryptoassets for businesses. The guidance sets out HMRC’s view on the taxation of transactions involving cryptoasset exchange tokens (such as Bitcoin)... Full Article
crypt Crypto Tax Update: HMRC publishes updated guidance on the taxation of cryptoassets for individuals situs of exchange tokens By www.eversheds.com Published On :: 2020-01-23 What’s new? On 20 December 2019, HMRC published an updated version of its guidance on the taxation of cryptoassets for individuals. The guidance was updated to include a new section in respect of the location (situs) of exchange tokens ... Full Article