Remove 2017 Remove Blog Remove Government Remove Manufacturing
article thumbnail

Marcus “MalwareTech” Hutchins Pleads Guilty to Writing, Selling Banking Malware

Krebs on Security

Marcus Hutchins, a 24-year-old blogger and malware researcher arrested in 2017 for allegedly authoring and selling malware designed to steal online banking credentials, has pleaded guilty to criminal charges of conspiracy and to making, selling or advertising illegal wiretapping devices. The government says between July 2012 and Sept.

article thumbnail

How your staff make security decisions: The psychology of information security

IT Governance

The majority of employees within an organisation are hired to execute specific jobs, such as marketing, managing projects, and manufacturing goods. The information in this blog was taken from Leron Zinatullin’s The Psychology of Information Security. A version of this blog was originally published on 6 February 2017.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Why consumers are destined to play a big role in securing the Internet of Things

The Last Watchdog

billion IoT devices in use as of 2017, half are consumer gadgets, like smart TVs, speakers, watches, baby cams and home thermostats; much of the rest is made up of things like smart electric meters and security cameras in corporate and government use. This column originally appeared on Avast Blog.).

IoT 189
article thumbnail

GUEST ESSAY: 5 security steps all companies should adopt from the Intelligence Community

The Last Watchdog

This cycle takes a holistic approach to detecting and deterring external threats and enforcing best-of-class data governance procedures. Per a 2017 CNN source , nearly 100,000 agents from as many as 80 nations operate within the United States with the intention of targeting businesses to gain access to key U.S.

Security 149
article thumbnail

China-linked threat actors have breached telcos and network service providers

Security Affairs

Chinese hackers employed open-source tools for reconnaissance and vulnerability scanning, according to the government experts, they have utilized open-source router specific software frameworks, RouterSploit and RouterScan [ T1595.002 ], to identify vulnerable devices to target. To nominate, please visit:?. Pierluigi Paganini.

article thumbnail

New Report: Discovering Consumer Attitudes Toward Connected Car Security

Thales Cloud Protection & Licensing

Survey data shows that ownership of connected cars in 2017 is 28% in the U.S. residents (87%) believe the government should implement stricter data security regulations for connected cars, and in the UK, that percentage was even higher at 92. between August 31st and September 7th, 2017, using an email invitation and an online poll.

Security 103
article thumbnail

Health Sector Council Released Cybersecurity Recommendations for Medical Devices and Health IT

Data Matters

On January 28, 2019, the Healthcare and Public Health Sector Coordinating Council released the “ Medical Device and Health IT Joint Security Plan ” (“JSP” or “Plan”)—cybersecurity recommendations for medical device manufacturers, healthcare information technology vendors, and healthcare providers. The JSP is an effort to respond to that call.