Remove Computer and Electronics Remove Cybersecurity Remove Military Remove Security
article thumbnail

Estonian National charged with helping Russia acquire U.S. hacking tools and electronics

Security Affairs

made electronics on behalf of the Russian government and military. The Estonian man is accused of having helped the Russian government and military to purchase US-made electronics and hacking tools. “Shevlyakov also attempted to acquire computer hacking tools.”

article thumbnail

The Myth of Consumer-Grade Security

Schneier on Security

They affect national security. In his keynote address at the International Conference on Cybersecurity, Attorney General William Barr argued that companies should weaken encryption systems to gain access to consumer devices for criminal investigations. They're critical to national security as well as personal security.

Military 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 414 by Pierluigi Paganini – International edition

Security Affairs

Every week the best security articles from Security Affairs are free for you in your email box. A new round of the weekly SecurityAffairs newsletter arrived! billion rubles. billion rubles.

article thumbnail

Police arrest two people over stealing sensitive data from defense giant

Security Affairs

Italian police have arrested two people that have been accused of stealing 10 GB of confidental data and military secrets from defense company Leonardo S.p.A. The two people are the former employee of the IT security management of Leonardo SpA, Arturo D’Elia, who is currently in jail, and Antonio Rossi, head of the CERT (Cyber ??Emergency

Military 110
article thumbnail

MY TAKE: Why security innovations paving the way for driverless cars will make IoT much safer

The Last Watchdog

Intelligent computing systems have been insinuating themselves into our homes and public gathering places for a while now. Driverless autos, trucks and military transport vehicles are on a fast track for wide deployment in the next five years. military and intelligence agencies. Get ready for smart ground transportation.

IoT 103
article thumbnail

DHS report – Voting systems in North Carolina county in 2016 were not hacked

Security Affairs

Computer faults that disrupted voting in a North Carolina county in 2016 were not caused by cyber attacks, a federal investigation states. The errors affecting the VR Systems electronic poll books forced officials to switch to paper registration records, the duration of the overall voting operations was extend ed due to the problems.

article thumbnail

Cyber is Cyber is Cyber

Lenny Zeltser

Are you in cybersecurity? Information security? Computer security, perhaps? If we examine the factors that influence our desire to use one security title over the other, we’ll better understand the nature of the industry and its driving forces. Yet, the term cybersecurity is growing in popularity.