article thumbnail

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Krebs on Security

as members of the PLA’s 54 th Research Institute, a component of the Chinese military. Attorney General Bill Barr said at a press conference today that the Justice Department doesn’t normally charge members of another country’s military with crimes (this is only the second time the agency has indicted Chinese military hackers).

Military 251
article thumbnail

NATO military command center should be fully operational in 2023

Security Affairs

The NATO military command center should be fully operational in 2023, every member states will contribute with its cyber capabilities to the military hub. NATO alliance is aware of growing threats in the cyberspace and the new NATO military command center aims to respond them. 31 at its military hub in Belgium.

Military 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Testing & Automation Pay Off for NSA's DevSecOps Project

Dark Reading

Communication with stakeholders, extensive testing, and robust automation pays dividends for military intelligence agency, one of several presenters at GitLab's virtual Commit conference.

Military 130
article thumbnail

50 Years Makes a Difference! How Film Research Has Changed Since the 1972 Conference on Audiovisual Archives

Unwritten Record

You may have heard that the National Archives is partnering with the University of Maryland Cinema and Media Studies Program to present Films of State , an online conference on government-produced moving images (if not, check out my last blog post for more background).

article thumbnail

The Myth of Consumer-Grade Security

Schneier on Security

In his keynote address at the International Conference on Cybersecurity, Attorney General William Barr argued that companies should weaken encryption systems to gain access to consumer devices for criminal investigations. The thing is, that distinction between military and consumer products largely doesn't exist.

Military 108
article thumbnail

Reimagining Democracy

Schneier on Security

Some questions to think about: Representative democracies were built under the assumption that travel and communications were difficult. Limit financial and military power? What could democracy look like if it were reinvented today? Would it even be democracy­—what comes after democracy? Future people (and animals)? Corporations?

article thumbnail

Hunting the ICEFOG APT group after years of silence

Security Affairs

Military contractors, shipbuilders, satellite operators, high-tech companies ) in Japan and South Korea. This week, Chi-en (Ashley) Shen presented at the CONFidence cybersecurity conference held in Poland her analysis on new samples of malware associated with the ICEFOG group.