Compal, the Taiwanese giant laptop manufacturer hit by ransomware

Security Affairs

The Taiwanese electronics manufacture Compal suffered a ransomware attack over the weekend, media blames the DoppelPaymer ransomware gang. It is the second-largest contract laptop manufacturer in the world behind Quanta Computer.

REvil ransomware gang recommends that Apple buy back its data stolen in Quanta hack

Security Affairs

REvil ransomware gang is attempting to extort Apple ahead of the Apple Spring Loaded event threatening to sell stolen blueprints belonging to the IT giant that were stolen from Quanta Computer. Quanta Computer is a Taiwan-based manufacturer of notebook computers and other electronic hardware.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

EVRAZ operations in North America disrupted by Ryuk ransomware

Security Affairs

Computer systems at EVRAZ, a multinational vertically integrated steel making and mining company, have been hit by Ryuk ransomware. In most of the plants, manufacturing operations were shut down at most plants.

#ModernDataMasters: Henrik Liliendahl, Chairman & CTO, Product Data Lake

Reltio

I got good grades in mathematics at school but it was an evening class in secondary school that I took in what was then called EDP (Electronic Data Processing) that got me started. We didn’t even have a computer at that school so the whole class was about things drawn on the blackboard. Then one day we had a trip to a larger college that actually had computers and I was hooked! I was educated in computer engineering but my first job was on the business side.

MDM 46

Use cases of secure IoT deployment

Thales Cloud Protection & Licensing

Requirements also included that the firmware was to be signed by the manufacturer and verified by the pacemaker. The solution allows the manufacturer to create an innovative process that maintains data safety throughout every communication. Use case 3: Smart meter manufacturer.

IoT 68

P2P Weakness Exposes Millions of IoT Devices

Krebs on Security

A peer-to-peer (P2P) communications technology built into millions of security cameras and other consumer electronics includes several critical security flaws that expose the devices to eavesdropping, credential theft and remote compromise, new research has found. The IoT malware Mirai proved this conclusively, as it rapidly spread to millions of devices using nothing more than the default credentials for IoT devices made by dozens of manufacturers.

IoT 207

The City of Durham shut down its network after Ryuk Ransomware attack

Security Affairs

Once it’s inside, Ryuk can spread across network servers through file shares to individual computers,” reads a post published by SBI. The City of Durham, North Carolina, was the last victim in order of time of the infamous Ryuk ransomware that infected its systems.

DHS warns of cyber attacks against small airplanes

Security Affairs

The scenario is disconcerting, hackers could manipulate the electronic systems in the small airplanes to force them displaying false flight data to the pilot, with unpredictable consequences. The expert focused the analysis on the Controller Area Network (CAN) bus implements by two commercially available avionics systems from aircraft manufacturers who specialize in light aircraft.

Steelcase office furniture giant hit by Ryuk ransomware attack

Security Affairs

It is the largest office furniture manufacturer in the world. Bleeping Computer, citing a source in the cybersecurity industry, confirmed that Steelcase suffered a Ryuk ransomware attack.

University of Florida Brings eDiscovery Teachings to a Chinese University: eDiscovery Best Practices

eDiscovery Daily

Computer” and “Nanjing Electric.”. “I I created a mock dispute in which Nanjing had manufactured motherboards and shipped those to U.S. Computer to be incorporated into a product that was then sold to consumers. computer sued Nanjing Electric for breach of contract.”. Electronic Discovery International eDiscoveryNeedless to say, eDiscovery is becoming more global than ever and we’ve certainly seen a lot of instances where non-U.S.

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

A DSP is an information society service that is an online marketplace, an online search engine or a cloud computing service. It is also clarified that data centre services other than cloud computing services are as well covered by the Directive and provides for a definition of this concept.

Why Workplace Automation is for Everyone

AIIM

Using such algorithms can free up entire departments, and certain tasks can then be delegated to automated computer processing. Aimed at protecting Google Compute Virtual Machines, Rubrik's service enables automated data lifecycle management across hundreds of projects.

US DoJ indicts Chinese hackers over state-sponsored cyber espionage

Security Affairs

aka Baobeilong, aka Zhang Jianguo, aka Atreexp, both nationals of the People’s Republic of China (China), with conspiracy to commit computer intrusions, conspiracy to commit wire fraud, and aggravated identity theft was announced today. The APT10 Group stole hundreds of gigabytes of sensitive data and information from the victims’ computer systems.

Nobody Doesn’t Like Terminating Sanctions for Fabrication of Text Messages: eDiscovery Case Law

eDiscovery Daily

Acosta granted the defendants’ motion for terminating sanctions where the plaintiff was found to have manufactured text messages to support her claims of sexual harassment, retaliation, and wrongful termination. She also failed to preserve her phones and withheld the native, electronic versions of the text messages, in all likelihood to conceal her wrongdoing.” As a result, he granted the defendant’s motion for terminating sanctions and dismissed the plaintiff’s claims with prejudice.

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

There are so many reasons why manufacturers connect their products to the Internet, whether it’s industrial machines, medical devices, consumer goods or even cars. It’s also enabling manufacturers to respond faster to security vulnerabilities, market demand, and even natural disasters.

Sopra Steria hit by the Ryuk ransomware gang

Security Affairs

A cyber attack was detected on the Sopra Steria computer network on the evening of October 20. French IT outsourcer Sopra Steria hit by ‘cyberattack’, Ryuk ransomware suspected.

93 Percent of Legal Professionals Surveyed by Consilio Think AI Will Be Helpful to Legal: eDiscovery Trends

eDiscovery Daily

When you travel to Dallas for the Masters Conference (which is today) and forget your laptop charger, then make a trip to Best Buy to get a replacement — only to get back to the hotel and find out that the one you bought doesn’t fit your laptop (even though it listed the laptop manufacturer on the package) you wind up typing your blog post on the hotel computer in the Business Center. Analysis Electronic DiscoveryThe things I do to get a blog post out.

Hackers Breached Virginia Bank Twice in Eight Months, Stole $2.4M

Krebs on Security

The email allowed the intruders to install malware on the victim’s PC and to compromise a second computer at the bank that had access to the STAR Network , a system run by financial industry giant First Data that the bank uses to handle debit card transactions for customers. That second computer had the ability to manage National Bank customer accounts and their use of ATMs and bank cards.

Hacking avionics systems through the CAN bus

Security Affairs

The expert focused the analysis on the Controller Area Network (CAN) bus implements by two commercially available avionics systems from aircraft manufacturers who specialize in light aircraft. The CAN is a crucial component in vehicles and aircraft that allows data and signaling information to be’ exchanged between the onboard computer systems. However, electronic controls for flaps, trim, engine controls, and autopilot systems are becoming more common,” explained Kiley.

List of data breaches and cyber attacks in December 2020 – 148 million records breached

IT Governance

What else would you expect from the final month of 2020 than the highest number of publicly disclosed incidents we’ve ever recorded? We logged 134 security incidents in December, which accounted for 148,354,955 breached records. That brings the total for 2020 to more than 20 billion.

Securing Elections

Schneier on Security

Today, we conduct our elections on computers. Our registration lists are in computer databases. And our tabulation and reporting is done on computers. We do this for a lot of good reasons, but a side effect is that elections now have all the insecurities inherent in computers. In 2007, the states of California and Ohio conducted audits of their electronic voting machines. Elections serve two purposes.

Paper 69

Mitsubishi Electric discloses data breach, media blame China-linked APT

Security Affairs

“An internal survey found that computers and servers at headquarters and major sites were subject to numerous unauthorized accesses.” Mitsubishi Electric disclosed a security breach that might have exposed personal and confidential corporate information.

GUEST ESSAY: The story behind how DataTribe is helping to seed ‘Cybersecurity Valley’ in Maryland

The Last Watchdog

Later in that decade, Frederick Terman returned to Stanford from Harvard as dean of the engineering school and encouraged the development of electronics in local businesses. In 1951, Terman went on to become the founder of the 660-acre Stanford Industrial Park (later named Stanford Research Park), which blossomed as electronic and technology companies signed long-term leases to make the Stanford Industrial Park their home. There’s oil in the state of Maryland – “cyber oil.”

Supply Chain Security 101: An Expert’s View

Krebs on Security

BK: But certainly there are some areas of computer hardware and network design where you absolutely must have far greater integrity assurance? But the bottom line is that doing this is really much harder [for non-nuclear electronic components] because of all the offshoring now of electronic parts, as well as the software that runs on top of that hardware. It’s n ow almost impossible to for consumers to buy electronics stuff that isn’t Internet-connected.

Gaining New Workflow Efficiency at Fluid Components International

Synergis Software

When the senior management of Fluid Components International sent Karyn Dawes and her team on a quest to replace their manual document management with a computer system, their first choice was rejected for cost and complexity. Now they have more than document management, they have a complete engineering information management and workflow solution that serves multiple departments including manufacturing.

Who Is Infosource? An Interview With Johann Hoepfner About Printing, Capture, and More

Document Imaging Report

Frequently in the past we have had hardware manufacturers ask us about software, not just capture and imaging but also document management software and solutions. I started to understand bigger printers and bigger computers. All of the printer, copier manufacturers were there.

Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?

Krebs on Security

based tech firm to secretly embed tiny computer chips into electronic devices purchased and used by almost 30 different companies. based tech giant Supermicro was somehow caught up in a plan to quietly insert a rice-sized computer chip on the circuit boards that get put into a variety of servers and electronic components purchased by major vendors, allegedly including Amazon and Apple.

IT 195

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

I’m Robert Vamosi and in this episode I’m discussing the weird science of how the physics of light and sound --not keyboards or code -- can be used to compromise electronic devices and the consequences of that in the real world.

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

I’m Robert Vamosi and in this episode I’m discussing the weird science of how the physics of light and sound --not keyboards or code -- can be used to compromise electronic devices and the consequences of that in the real world.

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

I’m Robert Vamosi and in this episode I’m discussing the weird science of how the physics of light and sound --not keyboards or code -- can be used to compromise electronic devices and the consequences of that in the real world.

Understanding IoT Security Challenges – An Interview with an Industry Expert

Thales Cloud Protection & Licensing

IoT devices typically have a small memory and a rudimentary operating system with no real user interface, and that presents a challenge as they have limited power, communication, and computing capabilities. Take for example the supply chain involving the production of a piece of electronic circuitry, embedding it in an elevator, installing it in a smart building, and subsequently commissioning it to the facility operator.

IoT 77

Different types of cyber attacks

IT Governance

Malware is designed to disrupt and gain unauthorised access to a computer system. Social engineering deceives and manipulates individuals into divulging sensitive information by convincing them to click malicious links or grant access to a computer, building or system. This is done via electronic communication, most commonly by email, and can inflict enormous damage on organisations. It then monitors your computer activity and collects personal information.

Regulation of AI-Based Applications: The Inevitable New Frontier

AIIM

There must be a balance between promoting AI innovation, its social utility, and safeguarding consumer rights, even though it is “ uncharted territory for an age that is passing the baton from human leadership to machine learning emergence, automation, robotic manufacturing and deep learning reliance. ”. According to the 2019 IDC study of spending on Artificial Intelligence (AI), it's estimated to reach $35.8 billion in 2019 and is expected to double by 2022 to $ 79.2

AUSTRALIA: Assistance and Access Act, December 2018 – Holy grail of uncertainty created by new rushed-in data encryption laws

DLA Piper Privacy Matters

It also amends a host of other Criminal Code and Crimes legislation providing new and additional powers to national intelligence agencies, including the Australian Border Force, in relation to the use of existing computer and data access warrants and powers, a crackdown on whistle-blowers, as well as increased penalties for non-compliance (up to AUD$10 million per offence in many cases).

#ModernDataMasters: Henrik Liliendahl, Chairman & CTO, Product Data Lake

Reltio

I got good grades in mathematics at school but it was an evening class in secondary school that I took in what was then called EDP (Electronic Data Processing) that got me started. We didn’t even have a computer at that school so the whole class was about things drawn on the blackboard. Then one day we had a trip to a larger college that actually had computers and I was hooked! I was educated in computer engineering but my first job was on the business side.

Hacking The Hacker. Stopping a big botnet targeting USA, Canada and Italy

Security Affairs

Finally the de-packed payload presented many interesting features; for example, it was weaponized with evasion techniques such as: timing delay (through sleep ), loop delay by calling 9979141 times GetSystemTimeAsFileTime API, BIOS versioning harvesting, system manufacturer information and system fingerprinting to check if it was running on the virtual or physical environment. I am a computer security scientist with an intensive hacking background.

On Open Platforms, Wifi, Home Automation, and Kitty Litter

John Battelle's Searchblog

Two years ago he sold his cleantech startup Zensi to Belkin International , a 30-year old computer networking and accessory firm in Los Angeles. Zensi specialized in monitoring a building’s electrical information, tapping into the structure’s electronic grid and sampling the “voltage noise” that spikes across the wires. The post On Open Platforms, Wifi, Home Automation, and Kitty Litter appeared first on John Battelle's Search Blog.

List of data breaches and cyber attacks in May 2020 – 8.8 billion records breached

IT Governance

ATM manufacturer Diebold Nixdorf hit by ransomware attack (unknown). Advanced Computer Software Group exposed data of 190 law firms (10,000). Tesla has been getting rid of computers without wiping the hard drives (unknown).

2019 end-of-year review part 1: January to June

IT Governance

Among other news: Lancashire-based Lad Media was wound up , and its director, Keith Hancock, was banned from forming or managing an organisation for four years, after the company was deemed to have violated the PECR (Privacy and Electronic Communications Regulations).

White House Proposes Cybersecurity Legislation

Hunton Privacy

If enacted, this legislation will affect many government and private-sector owners and operators of cyber systems, including all critical infrastructure, such as energy, financial systems, manufacturing, communications and transportation. As we reported last week , on May 12, 2011, the Obama administration announced a comprehensive cybersecurity legislative proposal in a letter to Congress.