article thumbnail

NEW TECH: DataLocker introduces encrypted flash drive — with key pad

The Last Watchdog

One sliver of the $90 billion, or so, companies are expected to spend this year on cybersecurity products and services is an estimated $85 million they will shell out for encrypted flash drives. Co-founder Jay took a business trip to South Korea in the fall of 2007. Related: How DataLocker got its start h. Park: Exactly.

article thumbnail

NEW TECH: DataLocker extends products, services to encrypt data on portable storage devices

The Last Watchdog

Related: Marriott reports huge data breach Ever thought about encrypting the data held on a portable storage device? Launched as a one-man operation in 2007, DataLocker has grown into a leading manufacturer of encrypted external drives, thumb drives, flash drives and self-encrypting, recordable CDs and DVDs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China-linked APT41 group targets Hong Kong with Spyder Loader

Security Affairs

Winnti (aka APT41 , Axiom, Barium , Blackfly) is a cyberespionage group that has been active since at least 2007. The attacks detailed by Cybereason targeted technology and manufacturing companies primarily located in East Asia, Western Europe, and North America.

article thumbnail

Boyne Resorts ski and golf resort operator hit with WastedLocker ransomware

Security Affairs

The ransomware encrypted files and renamed their filenames by adding the “ easy2lock” extension, this extension was previously associated with recent WastedLocker ransomware infections. Most of the victims belong to the manufacturing industry, followed by IT and media and telecommunications sectors.

article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

since Q3 of 2007. According to the 2021 IBM Threat Force Intelligence Index , Manufacturing was the industry most likely to be attacked last year, comprising 23.2% In fact, the 55-69 age group have had uninterrupted control of over 40% of the wealth in the U.S. Business targets. of cyber attacks IBM handled.

article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

It's a process of protecting critical information through encryption and being aware of the potential for eavesdropping on conversations. It's cool because the first eight architects are the manufacturer Samsung and the rest of them are unique for your particular device. Operational Security is typically a military process.

Privacy 52
article thumbnail

MY TAKE: How state-backed cyber ops have placed the world in a constant-state ‘Cyber Pearl Harbor’

The Last Watchdog

China has been taking methodical steps to transform itself from the source of low-end manufactured goods to the premier supplier of high-end products and services. Navy War College and the Pentagon in 2006-2007 • Operation Aurora hacks of Adobe, Juniper Networks, Northrop Grumman, Dow Chemical and dozens of other marquee U.S.

IoT 123