article thumbnail

Compal, the Taiwanese giant laptop manufacturer hit by ransomware

Security Affairs

The Taiwanese electronics manufacture Compal suffered a ransomware attack over the weekend, media blames the DoppelPaymer ransomware gang. It is the second-largest contract laptop manufacturer in the world behind Quanta Computer. “According to the Internet PTT, 30% of the computers have been hit. .

article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

Service providers and 5G-enabled device manufacturers both have critical roles to play in the success and sustainability of this wireless network rollout. Consumer electronics, business, network appliances, and industrial IoT (IIoT) devices are all driving the exponential growth of IoT systems. How is 5G Different? What is 5G?

Risk 136
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 Ways to Protect Smart Devices from Criminal Exploits

Thales Cloud Protection & Licensing

3 Ways to Protect Smart Devices from Criminal Exploits madhav Thu, 07/20/2023 - 07:28 When people think of home or business security, they are usually worried about protecting against a physical breaking in via a window or door and a burglar stealing valuables such as jewelry, cash, electronics, and equipment.

article thumbnail

EU to Force IoT, Wireless Device Makers to Improve Security

eSecurity Planet

The European Union is poised to place more demands on manufacturers to design greater security into their wireless and Internet of Things (IoT) devices. Manufacturers will be required to adhere to the new cybersecurity safeguards when designing and producing these products. IoT Security Neglected. Bambenek agreed.

IoT 107
article thumbnail

Vulnerability Recap 3/25/24 – More Ivanti Issues to Patch

eSecurity Planet

We also saw a physical security issue in Saflok electronic locks, which affects hotels in over a hundred countries. IT teams should pay close attention to vulnerability news so they know when and how to patch their business systems. The vulnerability affects Mac computers with M-series silicon chips.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

There are so many reasons why manufacturers connect their products to the Internet, whether it’s industrial machines, medical devices, consumer goods or even cars. Additionally, many auto manufacturers now have the ability to remotely update software to fix vulnerabilities or even upgrade functionality. They have design constraints.

IoT 78
article thumbnail

What is Employee Monitoring? Full Guide to Getting It Right

eSecurity Planet

These can come in a variety of forms we’ll discuss in more detail below, but the most common in a modern office setting is software monitoring, where a piece of software is installed onto employees’ computers, which can then track things such as web activity. How to Monitor Employee Productivity Right.

IT 124