article thumbnail

Snatch group claims to have hacked military provider HENSOLDT France

Security Affairs

The Snatch ransomware group claims to have hacked HENSOLDT France, a company specializing in military and defense electronics. HENSOLDT is a company specializing in military and defense electronics.

Military 120
article thumbnail

New US Electronic Warfare Platform

Schneier on Security

The Army is developing a new electronic warfare pod capable of being put on drones and on trucks.the Silent Crow pod is now the leading contender for the flying flagship of the Army's rebuilt electronic warfare force. It's hard to tell what this thing can do.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Maze ransomware operators claim to have breached LG Electronics

Security Affairs

Maze ransomware operators claims to have breached the South Korean multinational electronics company LG Electronics. Researchers at Cyble discovered a data leak of LG Electronics published by Maze ransomware operators. In 2014 its global sales reached $55.91

article thumbnail

Germany and the Netherlands agreded to build TEN, the first ever joint military internet

Security Affairs

The governments of Germany and The Netherlands agreed to build the first-ever joint military Internet, so-called TEN (Tactical Edge Networking). Government officials from Germany and the Netherlands signed an agreement for the building of the first-ever joint military Internet, so-called TEN (Tactical Edge Networking). “The name of this new Dutch-German military internet is the Tactical Edge Networking, or TEN, for short.” SecurityAffairs – TEN, military).

article thumbnail

Swiss army asks its personnel to use the Threema instant-messaging app

Security Affairs

The Swiss army has banned foreign instant messaging apps such as Signal, Telegram, and WhatsApp and only allows its members to use the Threema messaging app, which is developed in Switzerland. The Swiss army will cover the annual subscription to its personnel.

FOIA 119
article thumbnail

Encryption: How It Works, Types, and the Quantum Future

eSecurity Planet

Encryption and the development of cryptography have been a cornerstone of IT security for decades and remain critical for data protection against evolving threats. This article looks at encryption, how it fits into cryptology, how cryptographic algorithms work, types, use cases, and more.

article thumbnail

RIM-brain in Movies and TV

The Texas Record

Near the end of the movie the Rebel Alliance infiltrates the Imperial Center of Military Research on the planet Scarif (i.e., K-2SO was then able to login to the computer system in the Scarif base. But here is where it gets weird and causes RIM-Brain. Ah, working from home!

ROT 97
article thumbnail

A job ad published by the UK’s Ministry of Defence revealed a secret hacking squad

Security Affairs

The existence of a secret SAS mobile hacker squad, named MAB5 and under the control of the Computer Network Operations (CNO) Exploitation, was revealed by a job ad published by the UK’s Ministry of Defence on an external website, reported Alan Turnbull of Secret Bases.

Military 116
article thumbnail

List of data breaches and cyber attacks in June 2021 – 9.8 million records breached

IT Governance

But don’t be fooled by that number – it comes from 106 incidents, which is roughly average for the year. If you find yourself facing a cyber security disaster, IT Governance is here to help. million records breached appeared first on IT Governance UK Blog.

article thumbnail

List of data breaches and cyber attacks in April 2021 – 1 billion records breached

IT Governance

It was another busy month in the cyber security sector, as we discovered 143 incidents that resulted in 1,098,897,134 breached records. In case you missed it, you may also be interested in our first quarterly review of data breaches and cyber attacks.

article thumbnail

The Myth of Consumer-Grade Security

Schneier on Security

And it would be foolish to weaken them, even at the request of law enforcement. Barr repeated a common fallacy about a difference between military-grade encryption and consumer encryption: "After all, we are not talking about protecting the nation's nuclear launch codes. The thing is, that distinction between military and consumer products largely doesn't exist. Before the Internet revolution, military-grade electronics were different from consumer-grade.

article thumbnail

Court Denies Criminal Defendant’s Motion to Suppress Evidence Obtained via Warrantless Search: eDiscovery Case Law

eDiscovery Daily

The defendant was also subject to the Oregon National Guard’s acceptable use policy and Employees of the Oregon National Guard, including the defendant, were required to sign the policy before they received computer access. Case Law Electronic Discovery Email Privacy

article thumbnail

Police arrest two people over stealing sensitive data from defense giant

Security Affairs

Italian police have arrested two people that have been accused of stealing 10 GB of confidental data and military secrets from defense company Leonardo S.p.A. Media reported that the exfiltrated data included confidential accounting information and military designs.

Military 111
article thumbnail

Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?

Krebs on Security

based tech firm to secretly embed tiny computer chips into electronic devices purchased and used by almost 30 different companies. There aren’t any corroborating accounts of this scoop so far, but it is both fascinating and terrifying to look at why threats to the global technology supply chain can be so difficult to detect, verify and counter. The chips were alleged to have spied on users of the devices and sent unspecified data back to the Chinese military.

IT 222
article thumbnail

Brazil Nominates Directors of the Brazil Data Protection Authority; Senate Approval Pending

Hunton Privacy

It also establishes that the ANPD will be initially linked to the Brazilian Presidency. The Presidency will have two years to review the ANPD structure, during which time it may convert the ANPD into an independent public authority.

Military 121
article thumbnail

Happy 13th Birthday, KrebsOnSecurity!

Krebs on Security

You just knew 2022 was going to be The Year of Crypto Grift when two of the world’s most popular antivirus makers — Norton and Avira — kicked things off by installing cryptocurrency mining programs on customer computers. KrebsOnSecurity turns 13 years old today.

Security 232
article thumbnail

2019 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

The webcast is CLE accredited in selected states, so come check it out! Court Orders Defendant to Respond to Interrogatories to Identify Number of Phone Calls it Made : In Franklin v. Case Law Electronic Discovery

article thumbnail

DHS report – Voting systems in North Carolina county in 2016 were not hacked

Security Affairs

Computer faults that disrupted voting in a North Carolina county in 2016 were not caused by cyber attacks, a federal investigation states. The Feds’ report said it didn’t find any malware or evidence of remote access to the Durham County Board of Elections systems.

article thumbnail

List of data breaches and cyber attacks in May 2020 – 8.8 billion records breached

IT Governance

Granted, the majority of those were the result of a leaky database belonging to the Thai phone network AIS that was quickly resolved – but it was a dire month even if you discount that. Indonesia’s Tokopedia probing after hackers breach its systems (91 million).

article thumbnail

US Army stopped using floppy disks as storage for SACCS system that manages nuclear weapons arsenal

Security Affairs

The news is quite curious, the US military will no longer use 8-inch floppy disks in an antiquated computer (SACCS) to manage nuclear weapons arsenal. It’s official, the US strategic command has announced that it has replaced the 8-inch floppy disks in an ancient computer to receive nuclear launch orders from the President with a “highly-secure solid state digital storage solution.” ” One of the military working for Lt.

article thumbnail

MY TAKE: Why security innovations paving the way for driverless cars will make IoT much safer

The Last Watchdog

Intelligent computing systems have been insinuating themselves into our homes and public gathering places for a while now. Driverless autos, trucks and military transport vehicles are on a fast track for wide deployment in the next five years. military and intelligence agencies. Grimm received a $216,000 MEDC grant to set up shop in Sparta and direct its expertise towards discovering security flaws in autonomous vehicle systems under development by Detroit’s big car makers.

IoT 102
article thumbnail

MartyMcFly Malware: new Cyber-Espionage Campaign targeting Italian Naval Industry

Security Affairs

The victim was one of the most important leaders in the field of security and defensive military grade Naval ecosystem in Italy. Opening up The Excel File it gets infected. Those objects are real Encrypted Ole Objects where the Encrypted payload sits on “EncryptedPackage” section and information on how to decrypt it are available on “EncryptionInfo” xml descriptor. And why the attacker used an encrypted payload if the victim cannot open it?

article thumbnail

Capturing Paper Documents - Best Practices and Common Questions

AIIM

Therefore, it's important to understand and leverage scanning as a fundamental tool for business today. And why is it important? Scanning is important, but it is not easy to do correctly. To a greater or lesser degree, most significant information management initiatives will involve a scanning capability to capture hard copy paper documents as electronic images. What are the costs of scanning and capturing paper electronically? What is Capture?

Paper 61
article thumbnail

Cyber is Cyber is Cyber

Lenny Zeltser

If you’re in the business of safeguarding data and the systems that process it, what do you call your profession? Computer security, perhaps? If we examine the factors that influence our desire to use one security title over the other, we’ll better understand the nature of the industry and its driving forces. This might be because the industry continues to embrace the lexicon used in government and military circles, where cyber reigns supreme.

article thumbnail

Y2K: The New Year’s Disaster That Wasn’t

Unwritten Record

“Since the Council began its work, the enormity of the year 2000 problem has become increasingly apparent. It is not just a Federal systems problem or an American problem, it is a global problem.” Governments and businesses around the world proactively prepared their computer systems to seamlessly to the year 2000 rather than travel back to 1900. The Air Force has many Military Working Dogs. Is it time for a ferret unit?

article thumbnail

Episode 103: On the Voice-Controlled Internet, How Will We Authenticate?

The Security Ledger

» Related Stories Episode 100: Estonia’s Former CIO talks about engineering a secure electronic vote Fitness apps: Good for your health, not so much for military security Episode 101: The Dystopian IoT looks a lot like the Printer Ink Aisle and City of Atlanta Employees phished on Rogue Wi-Fi. Voice makes interacting with e-commerce sites like Amazon frictionless, which is why companies like Amazon love them and see them as the future of computing.

article thumbnail

The evolutions of APT28 attacks

Security Affairs

APT28 is a well known Russian cyber espionage group attributed, with a medium level of confidence, to Russian military intelligence agency GRU (by CrowdStrike). It is classified as the operations needed to build and/or to prepare a complex attack.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Whether it’s designing or just playing CTFs, John Hammond knows a lot about the gamification of infosec. Electronic Things. Often I would just use a screwdriver and break a toaster, for example, down to its smallest components, and then try and map out its circuitry.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Whether it’s designing or just playing CTFs, John Hammond knows a lot about the gamification of infosec. Electronic Things. Often I would just use a screwdriver and break a toaster, for example, down to its smallest components, and then try and map out its circuitry.

article thumbnail

On Open Platforms, Wifi, Home Automation, and Kitty Litter

John Battelle's Searchblog

The term is loaded, but it’s worth unpacking. When the Clinton administration declared the Internet a “free trade zone” in 1997 , it helped create one of the most powerful open platforms in the history of business. Anyone can access civilian GPS data – it’s open and free to all. That’s a pretty astonishing number, and it continues to climb. If they did, we didn’t think it would be meaningful.”

article thumbnail

The Hacker Mind Podcast: A Hacker From Hollywood

ForAllSecure

It's about challenging our expectations about the people who hack for a living. The film won some artistic praise, but it was also banned in several countries, including Germany. It also offered her a clean start in Hollywood. But whatever it is, inventions are early for me.

article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

Vamosi: Maybe you remember this: In 2014, researchers Charlie Miller and Chris Valasek succeeded in hacking a Jeep Cherokee while a reporter was driving it on a freeway during rush hour in St Louis, Missouri. So I'd say it's definitely possible. So I definitely think it's possible.

article thumbnail

Mayhem Moves To Production With The Department Of Defense

ForAllSecure

As a young professor, I spent 4 weeks every summer visiting these sites as part of the (unremarkably named) Computer Science Study Group , a research program run by DARPA and the Institute for Defense Analysis. I didn’t even have to turn off my electronics during takeoff!

article thumbnail

Mayhem Moves To Production With The Department Of Defense

ForAllSecure

As a young professor, I spent 4 weeks every summer visiting these sites as part of the (unremarkably named) Computer Science Study Group , a research program run by DARPA and the Institute for Defense Analysis. I didn’t even have to turn off my electronics during takeoff!

article thumbnail

MAYHEM MOVES TO PRODUCTION WITH THE DEPARTMENT OF DEFENSE

ForAllSecure

As a young professor, I spent 4 weeks every summer visiting these sites as part of the (unremarkably named) Computer Science Study Group , a research program run by DARPA and the Institute for Defense Analysis. I didn’t even have to turn off my electronics during takeoff!

article thumbnail

The Hacker Mind Podcast: The Hunt for Ghost #1

ForAllSecure

Ghost #1 was a digital film server that should have stayed blacklisted but due to a unique software flaw it continued to produce pirated films. And it's also the story of the Two Horses gang and how they created a shadowy network of private cinemas in China. It's called Allied.

article thumbnail

Amid Growing Threats, White House Dismantles Top Cybersecurity Post

Data Matters

Warner (D-VA) who called the move “mindboggling” and cybersecurity expert Bruce Schneier, who called it “a spectacularly bad idea.”. In 2016, the Commission on Enhancing National Cybersecurity issued its Report on Securing and Growing the Digital Economy that called for reinforcing this approach. should understand that “the costs to them… will be so high that they will simply consign all their cyberwarfare plans to their computer memories to gather electronic dust.”.