china
Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program
In this episode, we discuss the recent Microsoft security breach where China-backed hackers gained access to numerous email inboxes, including those of several federal government agencies, using a stolen Microsoft signing key ...
MOVEit Cyberattack, The Problem with Password Rotations, Military Alert on Free Smartwatches
Several major organizations, including British Airways and the BBC, fell victim to the recent MOVEit cyberattack. We discuss the alarming trend of hackers targeting trusted suppliers to gain access to customer data, ...
China’s New Measures for Security Assessment of Data Exports: Explained
The Cyberspace Administration of China (CAC) recently deliberated and adopted “Measures for Security Assessment of Data Exports.” These came into effect on 1st September 2022. Considering the volume of data consistently being ...
China’s New Rules for Personal Information Protection Certification: All You Need To Know
The Cyberspace Administration of China (CAC) and the State Administration of Market Regulation (SAMR) announced, on November 18, 2022, a new authentication certification rule (“Rules”) related to implementing personal information protection. The ...
Friday Squid Blogging: Peruvian Squid-Fishing Regulation Drives Chinese Fleets Away
A Peruvian oversight law has the opposite effect: Peru in 2020 began requiring any foreign fishing boat entering its ports to use a vessel monitoring system allowing its activities to be tracked ...
Another Malware with Persistence
Here’s a piece of Chinese malware that infects SonicWall security appliances and survives firmware updates. On Thursday, security firm Mandiant published a report that said threat actors with a suspected nexus to ...
Reddit Hacked, Preventing Accidental Location Sharing, Developer Hacks His Own Company
Reddit announced that it was the victim of a phishing attack aimed at its employees, resulting in unauthorized access to internal documents, code, and some unspecified business systems. Advice on managing device ...
AIs as Computer Hackers
Hacker “Capture the Flag” has been a mainstay at hacker gatherings since the mid-1990s. It’s like the outdoor game, but played on computer networks. Teams of hackers defend their own computers while ...
‘Finish Him!’ US Kills Huawei With Final Tech Ban
U.S. cuts off Huawei’s last sources of technology. Export licenses for chips and other tech components are finished ...
Breaking RSA with a Quantum Computer
A group of Chinese researchers have just published a paper claiming that they can—although they have not yet done so—break 2048-bit RSA. This is something to take seriously. It might not be ...