Remove 2017 Remove Encryption Remove Manufacturing Remove Military
article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

The year started with the revelation of Spectre and Meltdown – major security flaws affecting processors manufactured by Intel, ARM and AMD. million US customers had been affected by 2017’s Equifax breach , bringing the total number of victims to 147.9 Dixons Carphone admitted suffering a major data breach in July 2017, involving 5.9

article thumbnail

It is time to re-evaluate Cyber-defence solutions

Security Affairs

The Brazilian aerospace giant Embrarer manufactures commercial, executive and military aircraft and are the world’s third largest aircraft manufacturer after Boeing and Airbus. The Cyber-attack resulted in a large volume of data to be encrypted including database servers and backup data.

IT 91
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Supply-Chain Security

Schneier on Security

Earlier this month, the Pentagon stopped selling phones made by the Chinese companies ZTE and Huawei on military bases because they might be used to spy on their users. In 2017, the Indian government identified 42 smartphone apps that China subverted. It's a legitimate fear, and perhaps a prudent action. I could go on.

article thumbnail

Cell Phone Security and Heads of State

Schneier on Security

Encryption ranges from very weak to possibly strong , depending on which flavor the system uses. In 2017, the public-interest forensics group Citizen Lab uncovered an extensive eavesdropping campaign against Mexican lawyers , journalists , and opposition politicians -- presumably run by the government. This is changing.

Security 101
article thumbnail

MY TAKE: How state-backed cyber ops have placed the world in a constant-state ‘Cyber Pearl Harbor’

The Last Watchdog

That May 10th air strike by the Israel Defense Force marked the first use of military force in direct retaliation for cyber spying. This comes as no surprise to anyone in the military or intelligence communities. nuclear arsenal in 2003 • Breaches of computers at the Department of Commerce in 2006 • Hacking of military systems at U.S.

IoT 171