article thumbnail

An Untrustworthy TLS Certificate in Browsers

Schneier on Security

Vostrom filed papers in 2007 to do business as Packet Forensics, according to Virginia state records. Cory Doctorow does a great job explaining the context and the general security issues. Measurement Systems’ website was registered by Vostrom Holdings, according to historic domain name records. More details by Reardon.

Paper 117
article thumbnail

NON-STATE ACTORS IN THE CYBERSPACE: AN ATTEMPT TO A TAXONOMIC CLASSIFICATION, ROLE, IMPACT AND RELATIONS WITH A STATE’S SOCIOECONOMIC STRUCTURE

Security Affairs

This paper provides a taxonomic classification of non-state actors in the cyberspace, analyzing their role and impact on a state’s socioeconomic structure. For this reason, the behavior of each actor in the cyber arena is becoming a national security concern for every government. Follow me on Twitter: @securityaffairs and Facebook.

Paper 94
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TIFFs, PDFs, or Neither: How to Select the Best Production Format

eDiscovery Daily

Requesting parties may ask for ESI to be produced in native, PDF, TIFF, or paper files. Though TIFFs are more expensive to produce than native files, they offer security in the fact that they cannot be manipulated. Paper – As the least expensive option, paper production may be used for physical documents or printing digital documents.

article thumbnail

LightNeuron, a Turla’s backdoor used to compromise exchange mail servers

Security Affairs

Turla group (also known as Waterbug, Venomous Bear and KRYPTON) has been active since at least 2007 targeting government organizations and private businesses. LightNeuron is the first malware specifically designed to target Microsoft Exchange email servers, it runs with the same level of trust as spam filters and other security products.

Paper 69
article thumbnail

Winnti Group was planning a devastating supply-chain attack against Asian manufacturer

Security Affairs

Security experts at ESET revealed that Winnti Group continues to update its arsenal, they observed that the China-linked APT group using a new modular Windows backdoor that they used to infect the servers of a high-profile Asian mobile hardware and software manufacturer. ” reads the paper published by ESET. Pierluigi Paganini.

article thumbnail

Operation In(ter)reception targets Military and Aerospace employees in Europe and the Middle East

Security Affairs

Security experts from ESET uncovered a new sophisticated cyber-espionage campaign, dubbed “ Operation In(ter)recepti on ,” aimed at aerospace and military organizations in Europe and the Middle East. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Pierluigi Paganini.

article thumbnail

This is the old ChiefTech blog.: Gartner's top 10 - what about liquid security?

ChiefTech

Friday, 12 October 2007 Gartner's top 10 - what about liquid security? CSC calls this " liquid security ". Technorati tags: Gartner , 2008 , Trends , Deperimeterization , CSC , Liquid Security , Graham Chastney at 4:08 PM View blog reactions 0comments: Post a Comment Note: Only a member of this blog may post a comment.