Delta Electronics, a tech giants’ contractor, hit by Conti ransomware

Security Affairs

Delta Electronics, a Taiwanese contractor for multiple tech giants such as Apple, Dell, HP and Tesla, was hit by Conti ransomware. Taiwanese electronics manufacturing company Delta Electronics was hit by the Conti ransomware that took place this week.

Compal, the Taiwanese giant laptop manufacturer hit by ransomware

Security Affairs

The Taiwanese electronics manufacture Compal suffered a ransomware attack over the weekend, media blames the DoppelPaymer ransomware gang. It is the second-largest contract laptop manufacturer in the world behind Quanta Computer.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

REvil ransomware gang recommends that Apple buy back its data stolen in Quanta hack

Security Affairs

REvil ransomware gang is attempting to extort Apple ahead of the Apple Spring Loaded event threatening to sell stolen blueprints belonging to the IT giant that were stolen from Quanta Computer. Quanta Computer is a Taiwan-based manufacturer of notebook computers and other electronic hardware.

#ModernDataMasters: Henrik Liliendahl, Chairman & CTO, Product Data Lake


I got good grades in mathematics at school but it was an evening class in secondary school that I took in what was then called EDP (Electronic Data Processing) that got me started. We didn’t even have a computer at that school so the whole class was about things drawn on the blackboard. Then one day we had a trip to a larger college that actually had computers and I was hooked! I was educated in computer engineering but my first job was on the business side.

MDM 46

LPE zero-day flaw in Razer Synapse allows attackers to take over Windows PCs

Security Affairs

Razer is a popular manufacturer of computer accessories, including gaming mouses and keyboards. A zero-day vulnerability in Razer Synapse could allow threat actors to gain Windows admin privileges by plugging in a Razer mouse or keyboard.

EVRAZ operations in North America disrupted by Ryuk ransomware

Security Affairs

Computer systems at EVRAZ, a multinational vertically integrated steel making and mining company, have been hit by Ryuk ransomware. In most of the plants, manufacturing operations were shut down at most plants.

BlackMatter ransomware gang hit Technology giant Olympus

Security Affairs

Olympus issued a statement to announce that its European, Middle East and Africa computer network was hit by a ransomware attack. Japan-headquartered Olympus manufactures optical and digital reprography technology for the medical and life sciences industries.

Understanding Blockchain and its Impact on Legal Technology, Part Two

eDiscovery Daily

Much speculation centered around the name being based on a setting in the 1996 movie Rising Sun; however, it was believed the true authors were several cryptography and computer science experts of non-Japanese descent. Areas such as financial services, technology, manufacturing, pharmaceutical, and energy industries all needed systems with these two factors. Blockchain Electronic Discovery Project Management

P2P Weakness Exposes Millions of IoT Devices

Krebs on Security

A peer-to-peer (P2P) communications technology built into millions of security cameras and other consumer electronics includes several critical security flaws that expose the devices to eavesdropping, credential theft and remote compromise, new research has found. The IoT malware Mirai proved this conclusively, as it rapidly spread to millions of devices using nothing more than the default credentials for IoT devices made by dozens of manufacturers.

IoT 210

University of Florida Brings eDiscovery Teachings to a Chinese University: eDiscovery Best Practices

eDiscovery Daily

Computer” and “Nanjing Electric.”. “I I created a mock dispute in which Nanjing had manufactured motherboards and shipped those to U.S. Computer to be incorporated into a product that was then sold to consumers. computer sued Nanjing Electric for breach of contract.”. Electronic Discovery International eDiscoveryNeedless to say, eDiscovery is becoming more global than ever and we’ve certainly seen a lot of instances where non-U.S.

Use cases of secure IoT deployment

Thales Cloud Protection & Licensing

Requirements also included that the firmware was to be signed by the manufacturer and verified by the pacemaker. The solution allows the manufacturer to create an innovative process that maintains data safety throughout every communication. Use case 3: Smart meter manufacturer.

Cloud 68

A job ad published by the UK’s Ministry of Defence revealed a secret hacking squad

Security Affairs

The existence of a secret SAS mobile hacker squad, named MAB5 and under the control of the Computer Network Operations (CNO) Exploitation, was revealed by a job ad published by the UK’s Ministry of Defence on an external website, reported Alan Turnbull of Secret Bases.

Nobody Doesn’t Like Terminating Sanctions for Fabrication of Text Messages: eDiscovery Case Law

eDiscovery Daily

Acosta granted the defendants’ motion for terminating sanctions where the plaintiff was found to have manufactured text messages to support her claims of sexual harassment, retaliation, and wrongful termination. She also failed to preserve her phones and withheld the native, electronic versions of the text messages, in all likelihood to conceal her wrongdoing.” As a result, he granted the defendant’s motion for terminating sanctions and dismissed the plaintiff’s claims with prejudice.

93 Percent of Legal Professionals Surveyed by Consilio Think AI Will Be Helpful to Legal: eDiscovery Trends

eDiscovery Daily

When you travel to Dallas for the Masters Conference (which is today) and forget your laptop charger, then make a trip to Best Buy to get a replacement — only to get back to the hotel and find out that the one you bought doesn’t fit your laptop (even though it listed the laptop manufacturer on the package) you wind up typing your blog post on the hotel computer in the Business Center. Analysis Electronic DiscoveryThe things I do to get a blog post out.

EU to Force IoT, Wireless Device Makers to Improve Security

eSecurity Planet

The European Union is poised to place more demands on manufacturers to design greater security into their wireless and Internet of Things (IoT) devices. Manufacturers will be required to adhere to the new cybersecurity safeguards when designing and producing these products.

IoT 69

Steelcase office furniture giant hit by Ryuk ransomware attack

Security Affairs

It is the largest office furniture manufacturer in the world. Bleeping Computer, citing a source in the cybersecurity industry, confirmed that Steelcase suffered a Ryuk ransomware attack.

Why Workplace Automation is for Everyone


Using such algorithms can free up entire departments, and certain tasks can then be delegated to automated computer processing. Aimed at protecting Google Compute Virtual Machines, Rubrik's service enables automated data lifecycle management across hundreds of projects.

Hackers Breached Virginia Bank Twice in Eight Months, Stole $2.4M

Krebs on Security

The email allowed the intruders to install malware on the victim’s PC and to compromise a second computer at the bank that had access to the STAR Network , a system run by financial industry giant First Data that the bank uses to handle debit card transactions for customers. That second computer had the ability to manage National Bank customer accounts and their use of ATMs and bank cards.

DHS warns of cyber attacks against small airplanes

Security Affairs

The scenario is disconcerting, hackers could manipulate the electronic systems in the small airplanes to force them displaying false flight data to the pilot, with unpredictable consequences. The expert focused the analysis on the Controller Area Network (CAN) bus implements by two commercially available avionics systems from aircraft manufacturers who specialize in light aircraft.

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

A DSP is an information society service that is an online marketplace, an online search engine or a cloud computing service. It is also clarified that data centre services other than cloud computing services are as well covered by the Directive and provides for a definition of this concept.

The City of Durham shut down its network after Ryuk Ransomware attack

Security Affairs

Once it’s inside, Ryuk can spread across network servers through file shares to individual computers,” reads a post published by SBI. The City of Durham, North Carolina, was the last victim in order of time of the infamous Ryuk ransomware that infected its systems.

US DoJ indicts Chinese hackers over state-sponsored cyber espionage

Security Affairs

aka Baobeilong, aka Zhang Jianguo, aka Atreexp, both nationals of the People’s Republic of China (China), with conspiracy to commit computer intrusions, conspiracy to commit wire fraud, and aggravated identity theft was announced today. The APT10 Group stole hundreds of gigabytes of sensitive data and information from the victims’ computer systems.

Securing Elections

Schneier on Security

Today, we conduct our elections on computers. Our registration lists are in computer databases. And our tabulation and reporting is done on computers. We do this for a lot of good reasons, but a side effect is that elections now have all the insecurities inherent in computers. In 2007, the states of California and Ohio conducted audits of their electronic voting machines. Elections serve two purposes.

Paper 81

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

There are so many reasons why manufacturers connect their products to the Internet, whether it’s industrial machines, medical devices, consumer goods or even cars. It’s also enabling manufacturers to respond faster to security vulnerabilities, market demand, and even natural disasters.

Cloud 72

Sopra Steria hit by the Ryuk ransomware gang

Security Affairs

A cyber attack was detected on the Sopra Steria computer network on the evening of October 20. French IT outsourcer Sopra Steria hit by ‘cyberattack’, Ryuk ransomware suspected.

Enhance your security posture by detecting risks on authenticator devices

Thales Cloud Protection & Licensing

Jailbreaking is the process of exploiting the flaws of a locked-down electronic device to install software other than what the manufacturer has made available for that device. When a device is in debugging mode, a computer connected to the device can read all data, and control the apps.

Cloud 72

Hacking avionics systems through the CAN bus

Security Affairs

The expert focused the analysis on the Controller Area Network (CAN) bus implements by two commercially available avionics systems from aircraft manufacturers who specialize in light aircraft. The CAN is a crucial component in vehicles and aircraft that allows data and signaling information to be’ exchanged between the onboard computer systems. However, electronic controls for flaps, trim, engine controls, and autopilot systems are becoming more common,” explained Kiley.

List of data breaches and cyber attacks in June 2021 – 9.8 million records breached

IT Governance

We found a comparatively low 9,780,931 breached records from publicly disclosed security incidents in June 2021. But don’t be fooled by that number – it comes from 106 incidents, which is roughly average for the year.

List of data breaches and cyber attacks in December 2020 – 148 million records breached

IT Governance

What else would you expect from the final month of 2020 than the highest number of publicly disclosed incidents we’ve ever recorded? We logged 134 security incidents in December, which accounted for 148,354,955 breached records. That brings the total for 2020 to more than 20 billion.

Enhance your security posture by detecting risks on authenticator devices

Thales Cloud Protection & Licensing

Jailbreaking is the process of exploiting the flaws of a locked-down electronic device to install software other than what the manufacturer has made available for that device. When a device is in debugging mode, a computer connected to the device can read all data, and control the apps.

Cloud 62

Supply Chain Security 101: An Expert’s View

Krebs on Security

BK: But certainly there are some areas of computer hardware and network design where you absolutely must have far greater integrity assurance? But the bottom line is that doing this is really much harder [for non-nuclear electronic components] because of all the offshoring now of electronic parts, as well as the software that runs on top of that hardware. It’s n ow almost impossible to for consumers to buy electronics stuff that isn’t Internet-connected.

Gaining New Workflow Efficiency at Fluid Components International

Synergis Software

When the senior management of Fluid Components International sent Karyn Dawes and her team on a quest to replace their manual document management with a computer system, their first choice was rejected for cost and complexity. Now they have more than document management, they have a complete engineering information management and workflow solution that serves multiple departments including manufacturing.

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

Service providers and 5G-enabled device manufacturers both have critical roles to play in the success and sustainability of this wireless network rollout. Edge computing is the relatively new focus on traffic as close as possible to the client device and user.

Mitsubishi Electric discloses data breach, media blame China-linked APT

Security Affairs

“An internal survey found that computers and servers at headquarters and major sites were subject to numerous unauthorized accesses.” Mitsubishi Electric disclosed a security breach that might have exposed personal and confidential corporate information.

GUEST ESSAY: The story behind how DataTribe is helping to seed ‘Cybersecurity Valley’ in Maryland

The Last Watchdog

Later in that decade, Frederick Terman returned to Stanford from Harvard as dean of the engineering school and encouraged the development of electronics in local businesses. In 1951, Terman went on to become the founder of the 660-acre Stanford Industrial Park (later named Stanford Research Park), which blossomed as electronic and technology companies signed long-term leases to make the Stanford Industrial Park their home. There’s oil in the state of Maryland – “cyber oil.”

The Hacker Mind Podcast: Car Hacking 0x05


You can do what's called a replay attack by capturing the codes and replaying them, or you can use a previously successful rollover sequence to calculate the key fob code of the next car from the same manufacturer. So you don't have one computer, you actually have many throughout the vehicle.

Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?

Krebs on Security

based tech firm to secretly embed tiny computer chips into electronic devices purchased and used by almost 30 different companies. based tech giant Supermicro was somehow caught up in a plan to quietly insert a rice-sized computer chip on the circuit boards that get put into a variety of servers and electronic components purchased by major vendors, allegedly including Amazon and Apple.

IT 183

Who Is Infosource? An Interview With Johann Hoepfner About Printing, Capture, and More

Info Source

Frequently in the past we have had hardware manufacturers ask us about software, not just capture and imaging but also document management software and solutions. I started to understand bigger printers and bigger computers. All of the printer, copier manufacturers were there.

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This means imaging the “art of the possible” for a new future using a cloud computing model to deliver transformative change. DRM is used by publishers, manufacturers and IP owners for digital content and device monitoring” (Techopedia 2021). Abstract.

The Hacker Mind Podcast: Hacking With Light And Sound


I’m Robert Vamosi and in this episode I’m discussing the weird science of how the physics of light and sound --not keyboards or code -- can be used to compromise electronic devices and the consequences of that in the real world.