article thumbnail

Key aerospace player Safran Group leaks sensitive data

Security Affairs

It collaborates with Airbus, the second-largest aerospace company globally after Boeing, to manufacture aerospace equipment. Also, the company manufactures surface-to-air defense systems and missiles. It is crucial to ensure that leaked keys are in longer bit-lengths and encoded using secure encryption/hashing algorithms.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

The year started with the revelation of Spectre and Meltdown – major security flaws affecting processors manufactured by Intel, ARM and AMD. Information including their names, email addresses, and encrypted passwords may have been compromised. For more information on each story, simply follow the links in the transcript on our blog.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New European Union Dual-Use Regulation Enters Into Force

Data Matters

As from September 9, 2021, Regulation (EU) 2021/821 ( EU Dual-Use Regulation Recast ) replaces the existing Council Regulation (EC) 428/2009 setting up the European Union (EU) regime for the control of exports, transfer, brokering, and transit of “dual-use” items ( EU Dual-Use Regulation ). Key changes. New controls on technical assistance.

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

For example, in 2009, the Obama administration provided financial incentives to utilities in the United States. And I remember asking questions, who were the manufacturers? There's been a few different ones that have been on eBay for different manufacturers and I bought a few of them. Environmental effects caused by pollution.

article thumbnail

MY TAKE: How state-backed cyber ops have placed the world in a constant-state ‘Cyber Pearl Harbor’

The Last Watchdog

China has been taking methodical steps to transform itself from the source of low-end manufactured goods to the premier supplier of high-end products and services. By contrast China takes a long view, as explicitly outlined in its Made in China 2025 manifesto. WannaCry leveraged copies of cyber weapons stolen from the NSA. What’s coming next?

IoT 171