麻豆中文字幕丨欧美一级免费在线观看丨国产成人无码av在线播放无广告丨国产第一毛片丨国产视频观看丨七妺福利精品导航大全丨国产亚洲精品自在久久vr丨国产成人在线看丨国产超碰人人模人人爽人人喊丨欧美色图激情小说丨欧美中文字幕在线播放丨老少交欧美另类丨色香蕉在线丨美女大黄网站丨蜜臀av性久久久久蜜臀aⅴ麻豆丨欧美亚洲国产精品久久蜜芽直播丨久久99日韩国产精品久久99丨亚洲黄色免费看丨极品少妇xxx丨国产美女极度色诱视频www

IT experts warn of loophole in email encryption systems

Source: Xinhua| 2018-05-15 03:28:25|Editor: Mu Xuequan
Video PlayerClose

BERLIN, May 14 (Xinhua) -- IT experts in Germany and Belgium have identified a dangerous security flaw in email encryption services, Sebastian Schnitzler, professor for computer safety at the Muenster Technical College, warned on Monday.

Writing on Twitter, Schnitzler drew attention to "critical weaknesses" in PGP/GPG and S/MIME email encryption services which threaten the security of personal information from hackers. Schnitzler said he and other researchers at the Ruhr University Bochum and KU Leuven (the Catholic University of Leuven) had discovered two pathways through which hackers could access the original text of encrypted emails.

The academics recommended to government authorities and companies to refrain from using the affected encryption services until updates were released which closed the loophole. Warnings of the security flaw have been widely-publicized in German media reports being called an "#Efail".

Reacting to the news on Monday, the German Federal Office for Information Security (BSI) highlighted, however, that "#Efail" only posed a threat to users of email encryption services under certain circumstances. In order to succeed, hackers needed to have prior access to the transport route, mail server or email post-box.

Additionally, the flaw is limited to cases where recipients have activated settings enabling the execution of HTML code and the re-loading of external content. As a consequence, PGP/GPG and S/MIME encryption services could still be used without concern as long as they were "correctly implemented" and "configured safely."

TOP STORIES
EDITOR’S CHOICE
MOST VIEWED
EXPLORE XINHUANET
010020070750000000000000011105091371789401