article thumbnail

Compal, the Taiwanese giant laptop manufacturer hit by ransomware

Security Affairs

The Taiwanese electronics manufacture Compal suffered a ransomware attack over the weekend, media blames the DoppelPaymer ransomware gang. It is the second-largest contract laptop manufacturer in the world behind Quanta Computer. “According to the Internet PTT, 30% of the computers have been hit. .

article thumbnail

The software-defined vehicle: The architecture behind the next evolution of the automotive industry

IBM Big Data Hub

Simultaneously, onboard electronics evolve from individual electronic control units to high-performance computers with higher performance and simplified integration. On the backend, IBM Connected Vehicle Insight helps manufacturers build their connected vehicle use cases.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

In the NIS Directive, the obligations that apply to an entity that falls under the scope of the NIS Directive depend on its qualification as ‘operator of essential services’ (“OES”) or ‘digital service provider’ (“DSP”): An OES is defined as a public or private entity of a type referred to in Annex II, which meets certain criteria.

article thumbnail

EU to Force IoT, Wireless Device Makers to Improve Security

eSecurity Planet

The European Union is poised to place more demands on manufacturers to design greater security into their wireless and Internet of Things (IoT) devices. Manufacturers will be required to adhere to the new cybersecurity safeguards when designing and producing these products. Bambenek agreed. EU Amendment Applies to Many Devices.

IoT 100
article thumbnail

Leveraging IBM Cloud for electronic design automation (EDA) workloads

IBM Big Data Hub

Electronic design automation (EDA) is a market segment consisting of software, hardware and services with the goal of assisting in the definition, planning, design, implementation, verification and subsequent manufacturing of semiconductor devices (or chips). This area of focus is known as design for manufacturability (DFM).

Cloud 92
article thumbnail

Understanding IoT Security Challenges – An Interview with an Industry Expert

Thales Cloud Protection & Licensing

IoT devices typically have a small memory and a rudimentary operating system with no real user interface, and that presents a challenge as they have limited power, communication, and computing capabilities. An important and challenging part of the product lifecycle is to maintain a device’ trusted identity.

IoT 92
article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

BK: But certainly there are some areas of computer hardware and network design where you absolutely must have far greater integrity assurance? TS: The government still has regular meetings on supply chain risk management, but there are no easy answers to this problem. TS: Like a lot of things in security, the economics always win.

Security 203