article thumbnail

Supply-Chain Attack against the Electron Development Platform

Schneier on Security

Electron is a cross-platform development system for many popular communications apps, including Skype, Slack, and WhatsApp. The vulnerability is not part of the applications themselves but of the underlying Electron framework -- ­and that vulnerability allows malicious activities to be hidden within processes that appear to be benign.

article thumbnail

FBI, DHS, HHS Warn of Imminent, Credible Ransomware Threat Against U.S. Hospitals

Krebs on Security

Department of Homeland Security hastily assembled a conference call with healthcare industry executives warning about an “imminent cybercrime threat to U.S. ” The agencies on the conference call, which included the U.S. based Sky Lakes Medical Center’s computer systems. hospitals and healthcare providers.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Missouri Governor Vows to Prosecute St. Louis Post-Dispatch for Reporting Security Vulnerability

Krebs on Security

In a press conference this morning, Missouri Gov. But in a press conference Thursday morning , Gov. “A hacker is someone who subverts computer security with malicious or criminal intent,” the attorney Joe Martineau said. ” Missouri Gov. Thankfully, these failures were discovered.”

Security 312
article thumbnail

The Green Agenda: IDP’s Role in Shaping Sustainable Business Practices

Info Source

Petra Beck | Senior Analyst, Software Practice at Infosource AIIM selected “Guardians of the Future” as the theme for their annual global conference. It’s important to remember that the majority of energy consumed by a data center is used for cooling and redundancy infrastructure; less than 10% is used for computing.

Paper 52
article thumbnail

The Sedona Conference Has an Updated Commentary on Rule 45 Subpoenas to Non-Parties: eDiscovery Best Practices

eDiscovery Daily

Last week, The Sedona Conference® (TSC) and its Working Group 1 on Electronic Document Retention & Production (WG1) announced the publication of the Public Comment Version of The Sedona Conference Commentary on Rule 45 Subpoenas to Non-Parties, Second Edition. So many stories, so little time.

article thumbnail

DLA Piper Privacy Matters - Untitled Article

DLA Piper Privacy Matters

Germany’s Data Protection Conference (DSK) recently made public an expert opinion on Section 702 of the US Foreign Intelligence Surveillance Act (FISA), which came under close scrutiny in the July 16, 2020 decision of the Court of Justice of the European Union (Schrems II). By: Andrew Serwin, Carol A.F.

article thumbnail

“Master” Your Knowledge of eDiscovery With This Conference in Washington DC Again This Year: eDiscovery Trends

eDiscovery Daily

And, it’s time for another The Master’s Conference DC event! The Master’s Conference brings together leading experts and professionals from law firms, corporations and the bench to develop strategies, practices and resources for managing eDiscovery and the information life cycle. Click here to register for the conference.