Data about inmates and jail staff spilled by leaky prison app

Credit to Author: Lisa Vaas| Date: Wed, 12 Feb 2020 10:16:24 +0000

A web-mapping project came across detainees’ prescriptions and other PII that could be used by identity thieves to victimize prisoners.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/ypFJWLIWMOE” height=”1″ width=”1″ alt=””/>

Read more

Facebook encrypted messaging will ‘create hiding places for child abuse’

Credit to Author: Lisa Vaas| Date: Mon, 10 Feb 2020 11:44:10 +0000

Child safety groups penned an open letter to Facebook, urging a delay on encrypted messaging until sufficient safeguards are in place.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/ns3LDtnKrEc” height=”1″ width=”1″ alt=””/>

Read more

Google launches open-source security key project, OpenSK

Credit to Author: Danny Bradbury| Date: Mon, 03 Feb 2020 11:02:06 +0000

OpenSK is a piece of firmware that you can install on a USB dongle of your own, turning it into a usable FIDO or U2F key.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/ku-9LnVkKCo” height=”1″ width=”1″ alt=””/>

Read more

Apple allegedly made nice with FBI by dropping iCloud encryption plan

Credit to Author: Lisa Vaas| Date: Thu, 23 Jan 2020 11:05:12 +0000

Sources told Reuters that Apple may have been convinced by arguments made during the legal fight over cracking the San Bernardino iPhone.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/qyltSL5-IRc” height=”1″ width=”1″ alt=””/>

Read more

NSA and Github ‘rickrolled’ using Windows CryptoAPI bug

Credit to Author: Paul Ducklin| Date: Thu, 16 Jan 2020 17:42:09 +0000

We said, “Assume that someone will find out how to do it pretty soon,” and that’s exactly what happened.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/XhJpjHyVCqc” height=”1″ width=”1″ alt=””/>

Read more

Apple says no to unlocking shooter’s phone; AG and Trump lash back

Credit to Author: Lisa Vaas| Date: Wed, 15 Jan 2020 10:52:19 +0000

Attorney General Barr and President Trump are demanding Apple unlock the mass shooter’s iPhone. Apple replies: You can’t break just 1 phone.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/ZRh0_aJQATA” height=”1″ width=”1″ alt=””/>

Read more

Powerful GPG collision attack spells the end for SHA-1

Credit to Author: Danny Bradbury| Date: Mon, 13 Jan 2020 13:54:29 +0000

New research has heightened an already urgent call to abandon SHA-1, a cryptographic algorithm still used in many popular online services.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/4sQ-pLfUpIU” height=”1″ width=”1″ alt=””/>

Read more