article thumbnail

To Make the Internet of Things Safe, Start with Manufacturing

Thales Cloud Protection & Licensing

Typically, when they are manufactured, IoT devices receive their initial identity in the form of a “digital birth certificate.” Therefore, manufacturing is the first critical link in the chain to establish trust across the IoT. Digitally signing software and firmware to ensure integrity and protect from malware.

article thumbnail

The Week in Cyber Security and Data Privacy: 12 – 18 February 2024

IT Governance

It is not known how long the database was publicly available, nor whether anyone else accessed it. Source New Manufacturing USA Yes 20,415 TECA Srl Source New Transport Italy Yes 16.7 Fowler sent a responsible disclosure notice when he discovered the database and it was secured the following day. Date breached: 384,658,212 records.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 Ways to Protect Smart Devices from Criminal Exploits

Thales Cloud Protection & Licensing

Smart Devices are particularly vulnerable to a “Zero-Day Exploit” attack, whereby hackers take advantage of a security vulnerability at the device level, to access the network it’s connected to. Once “in” the network, the thieves accessed the database for client records, and ultimately stole 10 gigabytes of customer data.

article thumbnail

The Week in Cyber Security and Data Privacy: 5 – 11 February 2024

IT Governance

Further victims of last year’s Perry Johnson & Associates data breach identified Last year, the medical transcription company PJ&A (Perry Johnson & Associates) suffered a data breach in which an unauthorised third party was able to access its computer network. TB JP Original Corp Source New Manufacturing USA Yes 1.2

article thumbnail

Securing the Identities of Connected Cars

Thales Cloud Protection & Licensing

Manufacturing is one of the most attacked industries, facing a range of cybersecurity challenges. To understand why we need this kind of hybrid approach, let us examine the use case of a manufacturing enterprise who put trust inthe added value of the joint Thales and PrimeKey solution. Use case: manufacturing enterprise.

article thumbnail

Anatomy of a Quantum Attack

Thales Cloud Protection & Licensing

Research by the Organization of American States found cyberattacks against critical infrastructure and manufacturing are more likely to target industrial control systems than steal data. During a recent webinar , we discussed the potential impacts from a quantum-age cyberattack and the scenarios are chilling. Data security.

article thumbnail

6,009,014 MovieBoxPro Accounts Breached in Another Data Scraping Incident

IT Governance

Source (New) IT services USA Yes 1,382 Worthen Industries Source 1 ; source 2 (Update) Manufacturing USA Yes 1,277 R.J. Source (New) Manufacturing USA Yes Unknown Human Events. Source 1 ; source 2 (Update) Insurance USA Yes 75,101 Airsoftc3.com Source (New) Media USA Yes Unknown GDI Services, Inc.