backdoor
The Dangers of Government-Mandated Encryption Backdoors
In late June, two pieces of legislation were introduced to the U.S. Congress, each offering its own requirements for mandating encryption backdoors—which would effectively put an end to end-to-end encryption. The LAED ...
Recent Cases Question Backdoor Encryption
Recent events are calling into question the necessity of computer backdoors and the future of our personal privacy U.S. law enforcement for decades has decried the “going dark” problem with computers and ...
Apple’s Law Enforcement Backdoor Dispute, Signal PINs, EasyJet Data Breach
In episode 122 for May 25th 2020: Apple and the US Government dispute over law enforcement backdoors in Apple products, secure messaging app Signal starts to move away from using phone numbers ...
Was This Huawei’s Failed Attempt at a Linux Backdoor?
A Huawei employee submitted a large, buggy patch to the Linux kernel—apparently it contained a “trivially exploitable” security hole ...
COVID-19 Mass Surveillance, New Coronavirus Cyber-Attacks, Encryption Backdoors
In episode 113 for March 23rd 2020: Israel passes an emergency law to use mobile data to track people infected with COVID-19, the latest coronavirus cyber-attacks to be aware of, and how ...
Backdoored Phishing Kits are still popular
What did you do for the holidays? If you're a cybercrime geek you probably took advantage of some of the extra time on your hands to investigate some new phishing sites, right?Jone ...
Poison Frog Malware Samples Reveal OilRig’s Sloppiness
An analysis of a new backdoor called “Poison Frog” revealed that the OilRig threat group was sloppy in its development of the malware. Kaspersky Lab came across Poison Frog while scanning its ...
Revisiting Glupteba: Still Relevant Five Years after Debut
In the fast-paced world of cybersecurity, malware normally gets a brief period in the spotlight before it falls into oblivion. This is not the case with Glupteba, a backdoor first spotted in ...
End-to-End Encryption with Max Krohn from Keybase.io
You’re listening to the Shared Security Podcast, exploring the trust you put in people, apps, and technology…with your host, Tom Eston. In episode 86 for September 16th 2019: All about end-to-end encryption ...
Attackers Using Excel 4.0 Macro Dropper to Spread ServHelper Backdoor
Digital attackers are using an Excel 4.0 macro dropper to infect unsuspecting users with a new variant of the ServHelper backdoor. In summer 2019, researchers at Deep Instinct detected a new attack ...

