article thumbnail

GUEST ESSAY: Where we stand on mitigating software risks associated with fly-by-wire jetliners

The Last Watchdog

So watch out for weak encryption protocols, insufficient network segregation, or insecure user authentication mechanisms. Software gaps Similarly, the availability of onboard Wi-Fi services has become increasingly common in commercial aircraft so passengers can stay connected to the internet even during a long flight.

Risk 239
article thumbnail

FTC Settles with Dental Practice Software Provider over Charges of Misleading Consumers with Respect to Data Encryption

Hunton Privacy

(“Schein”), agreed to settle FTC charges that accused the company of falsely advertising the level of encryption it used to protect patient data. The FTC asserted that, in 2012, the Dentrix G5 software incorporated a third party database engine that included a form of data protection that Schein advertised as “encryption.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Myth of Consumer-Grade Security

Schneier on Security

The Department of Justice wants access to encrypted consumer devices but promises not to infiltrate business products or affect critical infrastructure. Barr repeated a common fallacy about a difference between military-grade encryption and consumer encryption: "After all, we are not talking about protecting the nation's nuclear launch codes.

Military 100
article thumbnail

Experts linked ransomware attacks to China-linked APT27

Security Affairs

The APT group has been active since 2010, targeted organizations worldwide, including U.S. The hackers used the Windows drive encryption tool BitLocker to lock the servers. “Earlier this year, Security Joes and Profero responded to an incident involving ransomware and the encryption of several core servers.

article thumbnail

The OpenSSL Project addressed three vulnerabilities

Security Affairs

In 2010, the Open SSL project addressed three vulnerabilities, including two DDoS issues rated high severity. SecurityAffairs – hacking, encryption). The issue affects servers using OpenSSL 1.0.2 which are vulnerable to SSL version rollback attacks. If you want to receive the weekly Security Affairs Newsletter for free subscribe here.

article thumbnail

Nevada Updates Encryption Law and Mandates PCI DSS Compliance

Hunton Privacy

As of January 1, 2010, Nevada law will require businesses to use encryption when data storage devices that contain personal information are moved beyond the physical or logical controls of the business, in addition to continuing to require that personal information be encrypted if it is transferred outside the secure system of the business.

article thumbnail

SHARED INTEL: Ramifications of 86 cities storing citizens’ data in misconfigured AWS S3 buckets

The Last Watchdog

There was no need for a password or login credentials to access this information, and the data was not encrypted. This included citizens’ physical addresses, phone numbers, drivers’ licenses, tax documents, and more. based PeopleGIS. WizCase reached out to PeopleGIS and the S3 buckets in question have since been secured.

Access 199