Remove Computer and Electronics Remove Events Remove Presentation Remove Security
article thumbnail

REvil ransomware gang recommends that Apple buy back its data stolen in Quanta hack

Security Affairs

REvil ransomware gang is attempting to extort Apple ahead of the Apple Spring Loaded event threatening to sell stolen blueprints belonging to the IT giant that were stolen from Quanta Computer. Quanta Computer is a Taiwan-based manufacturer of notebook computers and other electronic hardware. Pierluigi Paganini.

article thumbnail

Free Tool: Honey Feed

Security Affairs

The entire system detect approximately 140k events per day. Following a set of interesting and very selective graphic views are presented. I am a computer security scientist with an intensive hacking background. I do have a MD in computer engineering and a PhD on computer security from University of Bologna.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Snowden Ten Years Later

Schneier on Security

I didn’t know either of them, but I have been writing about cryptography, security, and privacy for decades. I fly a lot—a quarter of a million miles per year—and being put on a TSA list, or being detained at the US border and having my electronics confiscated, would be a major problem. It made sense. Probably not.

article thumbnail

France: the CNIL has released its annual dawn raid Program for 2023: four national priorities and one priority coming from the EDPB!

DLA Piper Privacy Matters

As a reminder, in 2022, the CNIL priority topics were (i) direct marketing (ii) monitoring telework and (iii) the use of cloud computing (see our previous post ). This document provides guidance on the conditions applicable to the use of this technology which presents high risks to the data subjects’ right to privacy.

article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

based cyber intelligence firm Hold Security has been monitoring the communications between and among a businesses ID theft gang apparently operating in Georgia and Florida but targeting businesses throughout the United States. For the past several months, Milwaukee, Wisc. For the past several months, Milwaukee, Wisc. ” PHANTOM OFFICES.

article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

” The event, which was captured on video and also reported in Wired magazine, sent a message to the automotive industry. In fact, I remember starting a new job by flying to Auburn Hills, Michigan for the very first meeting of the Featherstone Group, a collection of automotive OEM executive and security professionals.

article thumbnail

Saudi Arabia’s New Data Protection Law – What you need to know

DLA Piper Privacy Matters

This include that data controllers must not use personal means of communications, including postal and electronic addresses, of the data subject in order to sent promotional or awareness materials without first obtaining the consent of the data subject, and providing the data subject with a mechanism to opt out.