Remove Communications Remove Computer and Electronics Remove Education Remove Security
article thumbnail

Estonian National charged with helping Russia acquire U.S. hacking tools and electronics

Security Affairs

made electronics on behalf of the Russian government and military. The Estonian man is accused of having helped the Russian government and military to purchase US-made electronics and hacking tools. “Shevlyakov also attempted to acquire computer hacking tools.” ” reads a press release published by DoJ.

article thumbnail

Security Affairs newsletter Round 293

Security Affairs

Every week the best security articles from Security Affairs free for you in your email box. The post Security Affairs newsletter Round 293 appeared first on Security Affairs. A new round of the weekly SecurityAffairs newsletter arrived! Pierluigi Paganini. SecurityAffairs – hacking, newsletter).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

“Beyond the border scam”, pay attention to the instance of the new Nigerian fraud

Security Affairs

Security researcher Salvatore Lombardo shared details about a new instance of Nigerian fraud that he called ‘Beyond the border scam.’ He is also the author of the book “La Gestione della Cyber Security nella Pubblica Amministrazione”. Education improves awareness” is his slogan.

article thumbnail

Wannacry, the hybrid malware that brought the world to its knees

Security Affairs

In the early afternoon of Friday 12 May 2017, the media broke the news of a global computer security attack carried out through a malicious code capable of encrypting data residing in information systems and demanding a ransom in cryptocurrency to restore them, the Wannacry ransomware.

IT 96
article thumbnail

Cyber is Cyber is Cyber

Lenny Zeltser

Information security? Computer security, perhaps? If we examine the factors that influence our desire to use one security title over the other, we’ll better understand the nature of the industry and its driving forces. Paul Melson and Loren Dealy Mahler viewed cybersecurity as a subset of information security.

article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

based cyber intelligence firm Hold Security has been monitoring the communications between and among a businesses ID theft gang apparently operating in Georgia and Florida but targeting businesses throughout the United States. For the past several months, Milwaukee, Wisc. ” PHANTOM OFFICES. . ” PHANTOM OFFICES.

article thumbnail

Snowden Ten Years Later

Schneier on Security

I didn’t know either of them, but I have been writing about cryptography, security, and privacy for decades. I fly a lot—a quarter of a million miles per year—and being put on a TSA list, or being detained at the US border and having my electronics confiscated, would be a major problem. It made sense. Probably not.