article thumbnail

Police arrest two people over stealing sensitive data from defense giant

Security Affairs

Italian police have arrested two people that have been accused of stealing 10 GB of confidental data and military secrets from defense company Leonardo S.p.A. In January 2017, the internal cybersecurity structure of Leonardo SpA reported anomalous network traffic, outgoing from some workstations of the Pomigliano D’Arco plant.

Military 105
article thumbnail

DHS report – Voting systems in North Carolina county in 2016 were not hacked

Security Affairs

Computer faults that disrupted voting in a North Carolina county in 2016 were not caused by cyber attacks, a federal investigation states. The errors affecting the VR Systems electronic poll books forced officials to switch to paper registration records, the duration of the overall voting operations was extend ed due to the problems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US Army stopped using floppy disks as storage for SACCS system that manages nuclear weapons arsenal

Security Affairs

The news is quite curious, the US military will no longer use 8-inch floppy disks in an antiquated computer (SACCS) to manage nuclear weapons arsenal. This system runs on an IBM Series/1 Computer—a 1970s computing system— and uses 8-inch floppy disks.” ” One of the military working for Lt.

article thumbnail

MartyMcFly Malware: new Cyber-Espionage Campaign targeting Italian Naval Industry

Security Affairs

The victim was one of the most important leaders in the field of security and defensive military grade Naval ecosystem in Italy. It’s not hard to see what the payload does (CVE-2017-11882 ), but if you run it on a dynamic engine you would probably have more chances to prove it. Stage2: extracted Payload.

article thumbnail

Snowden Ten Years Later

Schneier on Security

I fly a lot—a quarter of a million miles per year—and being put on a TSA list, or being detained at the US border and having my electronics confiscated, would be a major problem. So would the FBI breaking into my home and seizing my personal electronics. Transferring files electronically is what encryption is for.

article thumbnail

Y2K: The New Year’s Disaster That Wasn’t

Unwritten Record

Governments and businesses around the world proactively prepared their computer systems to seamlessly to the year 2000 rather than travel back to 1900. The Air Force has many Military Working Dogs. This smooth transition to the 21st century wasn’t mere luck or an indication that our concerns were misplaced.

article thumbnail

The evolutions of APT28 attacks

Security Affairs

APT28 is a well known Russian cyber espionage group attributed, with a medium level of confidence, to Russian military intelligence agency GRU (by CrowdStrike). For example from 2017 to early 2018 APT28 used specific techniques such as: T1251 , T1329 , T1336 and T1319. Weaponization Timeline.