Tomorrow’s Quantum Computers Are Already Threatening Today’s Data

Large-scale quantum computing could be just five years away.

Source: Tomorrow’s Quantum Computers Are Already Threatening Today’s Data

Advertisements

Details on an Air Force drone? $200 on the dark web

This does not make sense. Why is a personal router issue the Captain’s problem? What has his training got to do with it? If his computer was allowed outside secure facilities, it should have been hardened enough to presume insecure and vulnerable networks elsewhere.

After further investigation, Recorded Future learned that the hacker gained access to the information “through a previously disclosed FTP vulnerability in Netgear routers,” referring to a method of sharing files over the internet. The hacker “infiltrated the computer of a captain” stationed at Creech Air Force Base in Nevada, who just months earlier completed a Cyber Awareness Challenge training program meant to guard against such attacks.

The hacked documents represent embarrassing security vulnerabilities and raises questions about basic cyber-hygiene in the U.S. military apparatus.

Source: Details on an Air Force drone? $200 on the dark web

Exigent Circumstances: iOS 12’s USB Restricted Mode and Warrantless iPhone Access

Apple’s USB Restricted Mode may prompt police to argue they don’t need a warrant to access iPhone data thanks to “exigent circumstances.”

Source: Exigent Circumstances: iOS 12’s USB Restricted Mode and Warrantless iPhone Access

How Congress Can De-Escalate the Second Crypto War: Fund Research and Broker a Crypto Armistice

Policymakers could make progress on the problem of law-enforcement access to encrypted data with more research and a better relationship between the government and the tech community. Congress can help on both fronts.

Source: How Congress Can De-Escalate the Second Crypto War: Fund Research and Broker a Crypto Armistice

The FBI’s Gigantic Math Error

Oh what is a double or triple counting error. It is not like they know PhD researchers in Cambridge. May be their database got hacked!

On the serious side, it is a problem with no clear solution.

In an increasingly interconnected digital world, strong cybersecurity is essential to safeguarding private data, financial transactions, personal communications, and critical infrastructure. Encryption is one of the few technologies we have that reliably protects sensitive data from identity thieves, credit card fraud, and other criminal activity.Against this backdrop, high-ranking officials in the FBI and other law enforcement agencies have claimed for years that criminals are using strong encryption to frustrate information gathering in criminal investigations. They have dubbed this the “Going Dark” problem, conjuring a future in which criminals roam free from the reach of law enforcement.

Source: The FBI’s Gigantic Math Error

Explaining the ‘Mystery’ of Numbers Stations

There are two kinds of dedicated radio listeners. Most are those who listen regularly to their FM or AM station of choice, or to a station that only broadcasts on the internet. The rest are dedicated to other frequency scales: high frequency (also known as shortwave), followed by very high frequency and, after that, the ultra high frequency range, which includes police scanner talk and even satellite signals.

Source: Explaining the ‘Mystery’ of Numbers Stations