Remove 2009 Remove Access Remove Manufacturing Remove Military
article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

The year started with the revelation of Spectre and Meltdown – major security flaws affecting processors manufactured by Intel, ARM and AMD. million personal data records, and a second breach, in which customers’ names, addresses and email addresses were accessed. Patches were rushed out , but many. caused problems of their own.

article thumbnail

The role of a secret Dutch mole in the US-Israeli Stuxnet attack on Iran

Security Affairs

That mole then provided much -needed inside access when it came time to slip Stuxnet onto those systems using a USB flash drive.” Germany provided technical specifications and knowledge about the ICS systems manufactured by Siemens that were controlling the centrifuges at the Natanz Iranian plant. ” wrote the journalists.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST POST: How China’s updated digital plans impacts U.S. security and diplomacy

The Last Watchdog

By embedding Chinese infrastructure in networks around the world, the Chinese government could have the ability to access information traveling across these networks for their own national interests and continue their lucrative intellectual property theft operations. Those providers will be discussed in detail in the following blog.

Security 201
article thumbnail

MY TAKE: How state-backed cyber ops have placed the world in a constant-state ‘Cyber Pearl Harbor’

The Last Watchdog

That May 10th air strike by the Israel Defense Force marked the first use of military force in direct retaliation for cyber spying. This comes as no surprise to anyone in the military or intelligence communities. nuclear arsenal in 2003 • Breaches of computers at the Department of Commerce in 2006 • Hacking of military systems at U.S.

IoT 171