Remove Computer and Electronics Remove Military Remove Risk Remove Security
article thumbnail

Snatch gang claims the hack of the Department of Defence South Africa

Security Affairs

Snatch gang claims the hack of the Department of Defence South Africa and added the military organization to its leak site. The group claims to have stolen Military contracts, internal call signs and personal data, for a total of 1.6 HENSOLDT is a company specializing in military and defense electronics. TB of data.

article thumbnail

MY TAKE: Why security innovations paving the way for driverless cars will make IoT much safer

The Last Watchdog

Intelligent computing systems have been insinuating themselves into our homes and public gathering places for a while now. Driverless autos, trucks and military transport vehicles are on a fast track for wide deployment in the next five years. military and intelligence agencies. Get ready for smart ground transportation.

IoT 133
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Snowden Ten Years Later

Schneier on Security

I didn’t know either of them, but I have been writing about cryptography, security, and privacy for decades. This was before David Miranda, Greenwald’s partner, was detained at Heathrow airport by the UK authorities; but even without that, I knew there was a risk. I started doubting my own security procedures.

article thumbnail

RIM-brain in Movies and TV

The Texas Record

While watching Rogue One , I could not help but notice the implications for the protection and security of Imperial records. Near the end of the movie the Rebel Alliance infiltrates the Imperial Center of Military Research on the planet Scarif (i.e., K-2SO was then able to login to the computer system in the Scarif base.

article thumbnail

Episode 103: On the Voice-Controlled Internet, How Will We Authenticate?

The Security Ledger

But securing these interfaces has, thus far, been an afterthought. But securing these interfaces has, thus far, been an afterthought. In this podcast we speak with Ben Rafferty of the firm Semafone about the challenges of securing voice-based systems. Voice based interfaces are growing in popularity, complexity and influence.

article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

In fact, I remember starting a new job by flying to Auburn Hills, Michigan for the very first meeting of the Featherstone Group, a collection of automotive OEM executive and security professionals. Steve Grobman, CTO with Intel’s security group had this to say: CNBC: Yeah, so I think that nothing is ever impossible.

article thumbnail

The Hacker Mind Podcast: A Hacker From Hollywood

ForAllSecure

Welcome to the hacker mind and original podcast from for all security. He told her he really wanted to create faster planes so that he could sell them to the US military. Bluetooth mitigates the risk of collisions through its use of spread spectrum technologies. I'm Robert Vamosi. Lamarr: I thought the aeroplane was too slow.