article thumbnail

Russia-linked hackers target Ukrainian military with Infamous Chisel Android malware

Security Affairs

Russia-linked threat actors have been targeting Android devices of the Ukrainian military with a new malware dubbed Infamous Chisel. The GCHQ’s National Cyber Security Centre (NCSC) and agencies in the United States, Australia, Canada, and New Zealand have published an analysis of the Android malware.

Military 115
article thumbnail

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Krebs on Security

as members of the PLA’s 54 th Research Institute, a component of the Chinese military. Attorney General Bill Barr said at a press conference today that the Justice Department doesn’t normally charge members of another country’s military with crimes (this is only the second time the agency has indicted Chinese military hackers).

Military 233
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Military Bases & Mobile Biometrics: Ensure Accurate Identity Verification Is Always In-Hand

HID Global

Ensure accurate identity verification with mobile biometrics for military bases. Discover authentication readers for secure and speedy access to sensitive zones.

article thumbnail

Security Affairs newsletter Round 462 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Every week the best security articles from Security Affairs are free for you in your email box. A new round of the weekly SecurityAffairs newsletter arrived! Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.

article thumbnail

Security Affairs newsletter Round 460 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Every week the best security articles from Security Affairs are free for you in your email box. Iran Crisis Russia-Aligned TAG-70 Targets European Government and Military Mail Servers in New Espionage Campaign U.S. A new round of the weekly SecurityAffairs newsletter arrived!

Military 102
article thumbnail

FIDO - Leading the Zero Trust Passwordless Authentication Evolution

Thales Cloud Protection & Licensing

FIDO - Leading the Zero Trust Passwordless Authentication Evolution. It’s no secret that passwords have become one of the weakest links in enterprise security. Zero Trust approaches are crucial in helping modern organisations achieve better security outcomes. Zero Trust Security. The Role of Passwordless Authentication.

article thumbnail

As 2-factor authentication falls short, ‘adaptive multi-factor authentication’ goes mainstream

The Last Watchdog

The use of an additional form of authentication to protect the accessing of a sensitive digital system has come a long way over the past decade and a half. Related: Why data science is the key to securing networks. LW: Let’s come back to ‘adaptive authentication.’ LW: Let’s come back to ‘adaptive authentication.’