article thumbnail

Authorities arrest 3 Indonesian hackers behind many Magecart attacks

Security Affairs

The Indonesian National Police in a joint press conference with Interpol announced the result of an investigation dubbed ‘Operation Night Fury’ that allowed to arrest three hackers that carried out Magecart attacks to steal payment card data. The men face up to 10 years in prison under article 363 of the Indonesian Criminal Code.

article thumbnail

Mitsubishi Electric discloses data breach, media blame China-linked APT

Security Affairs

This morning, at a press conference, Yoshii Kan, a secretary-general of Japan, said that the company had reported the intrusion. “An internal survey found that computers and servers at headquarters and major sites were subject to numerous unauthorized accesses.” ” reported the Asahi Shimbun.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FBI, DHS, HHS Warn of Imminent, Credible Ransomware Threat Against U.S. Hospitals

Krebs on Security

Department of Homeland Security hastily assembled a conference call with healthcare industry executives warning about an “imminent cybercrime threat to U.S. ” The agencies on the conference call, which included the U.S. based Sky Lakes Medical Center’s computer systems. hospitals and healthcare providers.”

article thumbnail

Researchers show how to steal a Tesla Model X in a few minutes

Security Affairs

A team of researchers from the Computer Security and Industrial Cryptography (COSIC) group at the KU Leuven University in Belgium has demonstrated how to steal a Tesla Model X in minutes by exploiting vulnerabilities in the car’s keyless entry system. “When you combine them, you get a much more powerful attack.”

article thumbnail

Supply-Chain Attack against the Electron Development Platform

Schneier on Security

Electron is a cross-platform development system for many popular communications apps, including Skype, Slack, and WhatsApp. The vulnerability is not part of the applications themselves but of the underlying Electron framework -- ­and that vulnerability allows malicious activities to be hidden within processes that appear to be benign.

article thumbnail

Missouri Governor Vows to Prosecute St. Louis Post-Dispatch for Reporting Security Vulnerability

Krebs on Security

In a press conference this morning, Missouri Gov. But in a press conference Thursday morning , Gov. “A hacker is someone who subverts computer security with malicious or criminal intent,” the attorney Joe Martineau said. ” Missouri Gov. Thankfully, these failures were discovered.”

Security 338
article thumbnail

Conferences as conversation starters | ZDNet

Collaboration 2.0

Conferences as conversation starters By Oliver Marks | June 30, 2008, 10:00am PDT Summary Ten years ago Comdex - the gigantic Las Vegas hi tech conference and show - was reaching its high point. Topics Web , Industry , Conference , Web 2.0 Hot Topics iPhone iPad Enterprise 2.0 He is based in San Francisco.