article thumbnail

Estonian National charged with helping Russia acquire U.S. hacking tools and electronics

Security Affairs

made electronics on behalf of the Russian government and military. The Estonian man is accused of having helped the Russian government and military to purchase US-made electronics and hacking tools. manufacturers on behalf of Russian end-users, including defense contractors and other Russian government agencies.

article thumbnail

Snatch ransomware gang claims the hack of the food giant Kraft Heinz

Security Affairs

Kraft Heinz is an American food company, it is one of the largest food and beverage manufacturers globally. ” The Snatch ransomware was first spotted at the end of 2019, Sophos researchers discovered a piece of the Snatch ransomware that reboots computers it infects into Safe Mode to bypass resident security solutions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

P2P Weakness Exposes Millions of IoT Devices

Krebs on Security

A peer-to-peer (P2P) communications technology built into millions of security cameras and other consumer electronics includes several critical security flaws that expose the devices to eavesdropping, credential theft and remote compromise, new research has found.

IoT 260
article thumbnail

Use cases of secure IoT deployment

Thales Cloud Protection & Licensing

A Fortune 500 Biotech Company recognized the need to protect its pacemaker customers, by assuring that the data transferred between patients’ devices and the back-end networks was consistently secure and would remain authenticated throughout the communication. Cars are getting smarter and more connected every day.

IoT 71
article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

A DSP is an information society service that is an online marketplace, an online search engine or a cloud computing service. The deployment models of cloud computing should include private, community, public and hybrid cloud and be interpreted in accordance with the ISO/IEC 17788:2014 standard.

article thumbnail

The City of Durham shut down its network after Ryuk Ransomware attack

Security Affairs

Once it’s inside, Ryuk can spread across network servers through file shares to individual computers,” reads a post published by SBI. “IT officials are working to get the communication systems back online.” 911 calls, though, are being answered.”

article thumbnail

The software-defined vehicle: The architecture behind the next evolution of the automotive industry

IBM Big Data Hub

Simultaneously, onboard electronics evolve from individual electronic control units to high-performance computers with higher performance and simplified integration. OEMs also need to encrypt messages within a vehicle and all other communications that extend beyond it.