article thumbnail

FBI, DHS, HHS Warn of Imminent, Credible Ransomware Threat Against U.S. Hospitals

Krebs on Security

Department of Homeland Security hastily assembled a conference call with healthcare industry executives warning about an “imminent cybercrime threat to U.S. ” The agencies on the conference call, which included the U.S. based Sky Lakes Medical Center’s computer systems. hospitals and healthcare providers.”

article thumbnail

Researchers show how to steal a Tesla Model X in a few minutes

Security Affairs

A team of researchers from the Computer Security and Industrial Cryptography (COSIC) group at the KU Leuven University in Belgium has demonstrated how to steal a Tesla Model X in minutes by exploiting vulnerabilities in the car’s keyless entry system. “When you combine them, you get a much more powerful attack.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Snowden Ten Years Later

Schneier on Security

I fly a lot—a quarter of a million miles per year—and being put on a TSA list, or being detained at the US border and having my electronics confiscated, would be a major problem. So would the FBI breaking into my home and seizing my personal electronics. The meeting presenters try to spice things up. Very probably.

article thumbnail

Whee! What a Great Event at the Second Annual WiE Legal Technology Showcase and Conference: eDiscovery Trends

eDiscovery Daily

As I noted yesterday , the Women in eDiscovery (WiE), Houston Chapter, in partnership with South Texas College of Law and the Association of Certified E-Discovery Specialists (ACEDS), hosted the second annual “Legal Technology Showcase & Conference” yesterday. Both events were at South Texas College of Law in downtown Houston.

article thumbnail

Highlights from DefCon 2018

Thales Cloud Protection & Licensing

There were many security issues present in corporate AD implementations, and hacking commonly-used voting machines was discussed. This year’s DefCon badges were electronic and contained a hidden game that could only be completed by connecting to the board over a serial interface and by interacting with other badge holders at the conference.

article thumbnail

Citing Failure to Cooperate, Court Orders Use of Specific Keyword Search Terms

eDiscovery Law

In the present case, the Court concluded that the failure to confer resulted in inadequate searches and, acknowledging Plaintiff’s argument that “[Defendant] alone is responsible for its illogical choices in constructing searches” indicated that, “which searches will be conducted is left to the Court.”. Plaintiff disagreed.

article thumbnail

Meet Bluetana, the Scourge of Pump Skimmers

Krebs on Security

The new app, now being used by agencies in several states, is the brainchild of computer scientists from the University of California San Diego and the University of Illinois Urbana-Champaign , who say they developed the software in tandem with technical input from the U.S. A copy of their paper is available here (PDF).