article thumbnail

Winnti Group was planning a devastating supply-chain attack against Asian manufacturer

Security Affairs

Winnti Group is back with a new modular Win backdoor that was used to infect the servers of a high-profile Asian mobile hardware and software manufacturer. The Winnti group was first spotted by Kaspersky in 2013, according to the researchers the gang has been active since 2007. Pierluigi Paganini. SecurityAffairs – Winnti, malware).

article thumbnail

New TSX Speculative Attack allows stealing sensitive data from latest Intel CPUs

Security Affairs

The Zombieload 2 attack only affects CPU supporting the Intel TSX instruction-set extension, a condition that is true in all Intel CPUs manufactured since 2013. The following video shows a ZombieLoad MDS attack: Additional technical details are available on the Zombieload website.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

French Firms Rocked by Kasbah Hacker?

Krebs on Security

Other victims included one of France’s largest hospital systems; a French automobile manufacturer; a major French bank; companies that work with or manage networks for French postal and transportation systems; a domestic firm that operates a number of airports in France; a state-owned railway company; and multiple nuclear research facilities.

Passwords 258
article thumbnail

Article 29 Working Party Opines on Mobile Apps

Hunton Privacy

On February 27, 2013, the Article 29 Working Party (the “Working Party”) adopted an Opinion (the “Opinion”) addressing personal data protection issues related to the development and use of applications on mobile devices. Operating system and device manufacturers should enable users to uninstall apps and ensure all user data is deleted.

article thumbnail

Sounding the Alarm on Emergency Alert System Flaws

Krebs on Security

“I found all kinds of problems back then, and reported it to the DHS, FBI and the manufacturer,” Pyle said in an interview with KrebsOnSecurity. According to the EAS wiki, in February 2013, hackers broke into the EAS networks in Great Falls, Mt. “But nothing ever happened. and Marquette, Mich.

Passwords 201
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

That is almost 2000 times more data in less than 20 years (Press 2013, Patrizio 2018). Techopedia (2021) defines a CSP as “a software environment where users can collaborate as well as create and work on different types of content such as text, audio and video pieces. IDC estimated the world created.16 Figure 2: Information Explosion.

article thumbnail

Predictions 2014: A Difficult Year To See

John Battelle's Searchblog

If you’re wondering what’s made me feel this way, a couple of choice articles from 2013 (and there were too many to count) should do the trick. Last year I asked a senior executive at a major auto manufacturer the age old question: “What business are you in?” Related: Predictions 2013. 2013: How I Did.

Marketing 111