article thumbnail

NEW TECH: DataLocker introduces encrypted flash drive — with key pad

The Last Watchdog

Co-founder Jay took a business trip to South Korea in the fall of 2007. DataLocker honed its patented approach to manufacturing encrypted portable drives and landed some key military and government clients early on; the company has continued branching out ever since. Park: The trend nowadays is to move everything to the cloud.

article thumbnail

Russia-linked APT28 has been scanning vulnerable email servers in the last year

Security Affairs

The APT28 group (aka Fancy Bear , Pawn Storm , Sofacy Group , Sednit , and STRONTIUM ) has been active since at least 2007 and it has targeted governments, militaries, and security organizations worldwide. The cyberespionage group continues to target members of defense companies, embassies, governments, and the military.

Phishing 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best Enterprise VPN Solutions for 2021

eSecurity Planet

The internet and, now, cloud computing transformed the way we conduct business. The downside to this long-term trend is that communications online, never mind on public cloud platforms, present vulnerabilities via web attacks and malware. The best VPN solutions offer military-grade encryption with 256-bit AES. Server Prowess.

article thumbnail

The Hacker Mind Podcast: The Fog of Cyber War

ForAllSecure

Centre for Defence: In 2007, a struggle over a divisive Soviet statutes set the standard for a new form of Russian interference in the affairs of foreign states. The fact of the matter is that cybersecurity systems have never been better security of our workstations or servers or cloud instances or mobile devices has never been better.

article thumbnail

MY TAKE: Rising geopolitical tensions suggest a dire need for tighter cybersecurity in 2024

The Last Watchdog

Infamous cyber opsattributed to Russia-backed hackers fall into a pattern that’s worth noting: • C yber a ttack s on Estonia (2007) Websites of Estonian banks, media outlets and government bodies get knocked down in a dispute over a Soviet-era war memorial. • The wider context is all too easy to overlook.

article thumbnail

MY TAKE: How state-backed cyber ops have placed the world in a constant-state ‘Cyber Pearl Harbor’

The Last Watchdog

That May 10th air strike by the Israel Defense Force marked the first use of military force in direct retaliation for cyber spying. This comes as no surprise to anyone in the military or intelligence communities. nuclear arsenal in 2003 • Breaches of computers at the Department of Commerce in 2006 • Hacking of military systems at U.S.

IoT 171