Remove 10
Remove 2017 Remove Authentication Remove Government Remove Military
article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

Hello and welcome to the final IT Governance podcast of 2018. Even government and public bodies’ websites – including, ironically, the ICO – were found to be running cryptomining software after a third-party plug-in was compromised, but it transpired. The NIS Directive was enacted in the UK as the NIS Regulations on 10 May.

article thumbnail

GUEST ESSAY: Why the hack of South Korea’s weapons, munitions systems was so predictable

The Last Watchdog

The disclosure that malicious intruders hacked the computer systems of the South Korean government agency that oversees weapons and munitions acquisitions for the country’s military forces is not much of a surprise. In October 2017, for instance, South Korea accused North Korea of stealing the South Korean-U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Cyber Insurance Backstop

Schneier on Security

In the first week of January, the pharmaceutical giant Merck quietly settled its years-long lawsuit over whether or not its property and casualty insurers would cover a $700 million claim filed after the devastating NotPetya cyberattack in 2017.

Insurance 116
article thumbnail

CyberheistNews Vol 13 #19 [Watch Your Back] New Fake Chrome Update Error Attack Targets Your Users

KnowBe4

Date/Time: TOMORROW, Wednesday, May 10, @ 2:00 PM (ET) Can't attend live? Here's how Weak Password Test works: Reports on the accounts that are affected Tests against 10 types of weak password related threats Does not show/report on the actual passwords of accounts Just download the install and run it Results in a few minutes!

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Increasingly, thought leaders, professional organizations, and government agencies are beginning to provide answers. Creating an enterprise-wide governance structure. More and more, directors are viewing cyber-risk under the broader umbrella of corporate strategy and searching for ways to help mitigate that risk.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Vamosi: Bowen’s public inquiry revealed findings of multiple buffer overflows, software updates without authentication, and inadequate randomization of the ballots so that valid secrecy can be compromised -- among other vulnerabilities. Very strange, right? That didn’t keep him quiet.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Vamosi: Bowen’s public inquiry revealed findings of multiple buffer overflows, software updates without authentication, and inadequate randomization of the ballots so that valid secrecy can be compromised -- among other vulnerabilities. Very strange, right? That didn’t keep him quiet.