Researchers break into Windows encryption feature
With effort, hackers are able to break into an encryption feature available on newer versions of Windows.

Researchers can break into BitLocker, the disk encryption feature available in Windows 7, Vista and Server 2008.
German experts from the Franhofer Institute for Secure Information Technology (SIT) revealed five attack strategies against BitLocker and the way its Trusted Platform Module (TPM) sealing mechanism works.
In certain circumstances, the researchers claim that dedicated hackers could "circumvent the protection and break confidentiality with limited effort".
"Our attacks neither exploit vulnerabilities in the encryption itself nor do they directly attack the TPM," the researchers claim in a report.
"They rather exploit sequences of actions that Trusted Computing fails to prevent, demonstrating limitations of the technology."
One attack took advantage of the boot process, where BitLocker needs to interact with the user to obtain a password or a key file from a USB memory stick, or both.
The program code interacting with the user is unencrypted, so an attacker with physical access is able to modify it.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The hacker could replace the original BitLocker boot code with a manipulated version, and spoof the user interaction with BitLocker.
The researchers made it clear that that they were using targeted attacks', where an attacker would devote considerable effort in trying to access data on a disk, for example in corporate espionage.
BitLocker is better designed to withstand real-world opportunistic attacks' for example, if a computer was stolen and somebody was trying to access the data to see what they could get.
Paul Cooke from Microsoft confirmed as much in a blog post. He said: "This research is similar to other published attacks where the owner leaves a computer unattended in a hotel room and anyone with access to the room could tamper with this computer.
"This sort of targeted attack poses a relatively low risk to folks who use BitLocker in the real world."
He added: "These sorts of targeted threats are not new and are something we've addressed in the past; in 2006 we discussed similar attacks, where we've been straightforward with customers and partners that BitLocker does not protect against these unlikely, targeted attacks."
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
Windows Troubleshooting Platform 'is serving malware'
News Troubleshooting service used as a pathway to con victims into downloading malware
By Jane McCallion
-
Windows 8 woes & Kent Police data protection fines: IT Pro's web comments round-up
News Windows 8 and the ICO's decision to fine Kent Police £100K for a data breach were hot conversation topics this week.
By Caroline Donnelly
-
McAfee issues critical fix for defective software update
News Security vendor acts after latest updates stops users accessing the internet.
By Rene Millman
-
Boost the performance of your PC
Tutorials Top tips to help you fine tune your PC for free.
By Mike Jennings
-
Microsoft urges users to apply latest security patch
News Update address flaws in Remote Desktop Protocol
By Connor Jones
-
Microsoft squeezes out Duqu workaround
News Duqu is still causing trouble, as Microsoft recognises a Windows flaw and offers a workaround.
By Tom Brewster
-
Q&A: Eugene Kaspersky on taking on the big boys
In-depth Kaspersky's chief executive tells IT PRO about how his company plans to climb the security ladder, toppling the likes of Symantec and McAfee along the way.
By Tom Brewster
-
Microsoft downplays Windows vulnerability
News Microsoft says a vulnerability could allow remote code execution, but it's not likely anyone will be able to do it.
By Tom Brewster