Remove 10
Remove 2013 Remove 2014 Remove Manufacturing Remove Security
article thumbnail

Tracing the Supply Chain Attack on Android

Krebs on Security

” “At present, pre-installed partners cover the entire mobile phone industry chain, including mobile phone chip manufacturers, mobile phone design companies, mobile phone brand manufacturers, mobile phone agents, mobile terminal stores and major e-commerce platforms,” reads a descriptive blurb about the company.

Cloud 254
article thumbnail

Tracing the Supply Chain Attack on Android

Krebs on Security

” “At present, pre-installed partners cover the entire mobile phone industry chain, including mobile phone chip manufacturers, mobile phone design companies, mobile phone brand manufacturers, mobile phone agents, mobile terminal stores and major e-commerce platforms,” reads a descriptive blurb about the company.

Cloud 169
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL: Coming very soon — ‘passwordless authentication’ as a de facto security practice

The Last Watchdog

10 report from Microsoft details how hacking groups backed by Russia, China and Iran are using such tactics to systemically meddle in elections and policy debates in the U.S. Toward this end, along came the FIDO Alliance in early 2013. and across Europe. These are folks who otherwise would have been working on company premises.

article thumbnail

NEW TECH: Semperis introduces tools to improve security resiliency of Windows Active Directory

The Last Watchdog

organizations between January 2013 and July 2019. NotPetya wrought $10 billion in damages , according to Tom Bossert a senior Department of Homeland Security official at the time. Attack exposure Semperis actually launched in 2014 to provide disaster recovery services specifically for AD systems. million from U.S.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

This week, in our last podcast of the year, we revisit some of the biggest information security stories from the past 12 months. As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events. caused problems of their own.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

Here, Motherboard talks about personal data being sold for less than $10 a pop in a case that sounds eerily similar to the previously mentioned Medicare one. Here's the issue I (and many others) have with these statements and I want to make it crystal clear: Security is not a boolean proposition. They also blacklist vpn IP addresses.

Security 111
article thumbnail

10 Personal Finance Lessons for Technology Professionals

Troy Hunt

So here it is - 10 Personal Financial Lessons for Technology Professionals. I don't just mean at the crazy rich end of the scale (4 of the world's top 10 richest people did it in tech - Bezos, Gates, Zuckerberg and Ellison), but at all levels of our profession. Intro: This Industry Rocks!

Education 111