Remove 2017 Remove Computer and Electronics Remove Government Remove Military
article thumbnail

US Army stopped using floppy disks as storage for SACCS system that manages nuclear weapons arsenal

Security Affairs

The news is quite curious, the US military will no longer use 8-inch floppy disks in an antiquated computer (SACCS) to manage nuclear weapons arsenal. The use of 8-inch floppy disks was also confirmed by a report published by the US Government Accountability Office (GAO). ” One of the military working for Lt. .

article thumbnail

Snowden Ten Years Later

Schneier on Security

I fly a lot—a quarter of a million miles per year—and being put on a TSA list, or being detained at the US border and having my electronics confiscated, would be a major problem. So would the FBI breaking into my home and seizing my personal electronics. Transferring files electronically is what encryption is for.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MartyMcFly Malware: new Cyber-Espionage Campaign targeting Italian Naval Industry

Security Affairs

The victim was one of the most important leaders in the field of security and defensive military grade Naval ecosystem in Italy. It’s not hard to see what the payload does (CVE-2017-11882 ), but if you run it on a dynamic engine you would probably have more chances to prove it. Stage2: extracted Payload.

article thumbnail

Y2K: The New Year’s Disaster That Wasn’t

Unwritten Record

Governments and businesses around the world proactively prepared their computer systems to seamlessly to the year 2000 rather than travel back to 1900. The Air Force has many Military Working Dogs. Humanity’s worst fears about a Y2K meltdown on January 1, 2000 never came to pass. Is it time for a ferret unit?

article thumbnail

The evolutions of APT28 attacks

Security Affairs

APT28 is a well known Russian cyber espionage group attributed, with a medium level of confidence, to Russian military intelligence agency GRU (by CrowdStrike). For example from 2017 to early 2018 APT28 used specific techniques such as: T1251 , T1329 , T1336 and T1319. Weaponization Timeline.

article thumbnail

The Hacker Mind Podcast: The Hunt for Ghost #1

ForAllSecure

Hollywood Studios spent a decade creating a robust hardware certification process that includes military grade encryption with a complicated set of keys, all to protect the latest blockbuster releases. It is totally controlled by the government by the censors.

article thumbnail

Amid Growing Threats, White House Dismantles Top Cybersecurity Post

Data Matters

Then President Obama noted, “[n]o single official oversees cybersecurity policy across the federal government, and no single agency has the responsibility or authority to match the scope and scale of the challenge.” Then word came out that the position would be eliminated altogether.