article thumbnail

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Krebs on Security

as members of the PLA’s 54 th Research Institute, a component of the Chinese military. Attorney General Bill Barr said at a press conference today that the Justice Department doesn’t normally charge members of another country’s military with crimes (this is only the second time the agency has indicted Chinese military hackers).

Military 253
article thumbnail

U.S. Hacks QakBot, Quietly Removes Botnet Infections

Krebs on Security

attorney for the Southern District of California, at a press conference this morning in Los Angeles. Don Alway , assistant director in charge of the FBI’s Los Angeles field office, said federal investigators gained access to an online panel that allowed cybercrooks to monitor and control the actions of the botnet.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly Podcast: Russian cyber crimes, Facebook breach and Tory conference app

IT Governance

This week, we discuss Russian cyber crime, the Facebook breach affecting 90 million users and the Conservative Party’s conference app breach. Facebook has fixed the vulnerability and reset the access tokens of the 50 million affected users. Hello and welcome to the IT Governance podcast for Friday, 5 October.

article thumbnail

50 Years Makes a Difference! How Film Research Has Changed Since the 1972 Conference on Audiovisual Archives

Unwritten Record

You may have heard that the National Archives is partnering with the University of Maryland Cinema and Media Studies Program to present Films of State , an online conference on government-produced moving images (if not, check out my last blog post for more background). In addition, “access” meant something completely different at the time.

article thumbnail

The Myth of Consumer-Grade Security

Schneier on Security

The Department of Justice wants access to encrypted consumer devices but promises not to infiltrate business products or affect critical infrastructure. The thing is, that distinction between military and consumer products largely doesn't exist. More consumer products became approved for military applications.

Military 104
article thumbnail

Security Affairs newsletter Round 464 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Cybersecurity US holds conference on military AI use with dozens of allies to determine ‘responsible’ use DFSA’s Cyber Risk Management Guidelines: A Blueprint for Cyber Resilience?

Security 109
article thumbnail

Calendar Meeting Links Used to Spread Mac Malware

Krebs on Security

The attackers impersonate established cryptocurrency investors and ask to schedule a video conference call. “When the project team clicks the link, they encounter a region access restriction,” SlowMist wrote. The North Korean regime is known to use stolen cryptocurrencies to fund its military and other state projects.

Phishing 279