Delta Electronics, a tech giants’ contractor, hit by Conti ransomware

Security Affairs

Delta Electronics, a Taiwanese contractor for multiple tech giants such as Apple, Dell, HP and Tesla, was hit by Conti ransomware. Taiwanese electronics manufacturing company Delta Electronics was hit by the Conti ransomware that took place this week.

New US Electronic Warfare Platform

Schneier on Security

The Army is developing a new electronic warfare pod capable of being put on drones and on trucks.the Silent Crow pod is now the leading contender for the flying flagship of the Army's rebuilt electronic warfare force. Insiders call this cognitive electronic warfare ).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

NEW TECH: DigiCert Document Signing Manager leverages PKI to advance electronic signatures

The Last Watchdog

Most of us, by now, take electronic signatures for granted. Related: Why PKI will endure as the Internet’s secure core. Yet electronic signatures do have their security limitations. It adds trust and security into each signature, with the ability to easily work with third-party signing workflows such as Adobe, DocuSign, or other signing workflow platforms,” he says. Signing can be done anywhere using any type of supported computing device.

Electronic Records, Third-Party Systems, and Contracts

The Texas Record

Take a moment to think about the systems your local government or agency uses to manage its electronic records. What would your ideal Electronic Document and Records Management System (EDRMS) look like? The contract covers the security of the records.

Maze ransomware operators claim to have breached LG Electronics

Security Affairs

Maze ransomware operators claims to have breached the South Korean multinational electronics company LG Electronics. Researchers at Cyble discovered a data leak of LG Electronics published by Maze ransomware operators. SecurityAffairs – LG Electronics, Maze ransomware).

What Counts as “Good Faith Security Research?”

Krebs on Security

Department of Justice (DOJ) recently revised its policy on charging violations of the Computer Fraud and Abuse Act (CFAA), a 1986 law that remains the primary statute by which federal prosecutors pursue cybercrime cases. ” What constitutes “good faith security research?”

Details of a Computer Banking Scam

Schneier on Security

This is a longish video that describes a profitable computer banking scam that’s run out of call centers in places like India. And three, it’s an evolving tactic that gets around banks increasingly flagging blocking suspicious electronic transfers.

Digital Vs. Electronic Records Management FAQs and Differences

Armstrong Archives

The terms “digital” and “electronic” are often used interchangeably these days, including when it comes to talking about records management. Digital Vs. Electronic Records – FAQs and Differences. What is an electronic record? Why is electronic records management important?

Meet the Computer Scientist Who Helped Push for Paper Ballots

Dark Reading

Security Pro File: Award-winning computer scientist and electronic voting expert Barbara Simons chats up her pioneering days in computer programming, paper-ballot backups, Internet voting, math, and sushi

Class Action Targets Experian Over Account Security

Krebs on Security

In July’s Experian, You Have Some Explaining to Do , we heard from two different readers who had security freezes on their credit files with Experian and who also recently received notifications from Experian that the email address on their account had been changed.

RCE flaw in Electronic Arts Origin client exposes gamers to hack

Security Affairs

Electronic Arts (EA) has fixed a security issue in the Windows version of its gaming client Origin that allowed hackers to remotely execute code on an affected computer. Electronic Arts (EA) has addressed a vulnerability in the Windows version of its gaming client Origin that allowed hackers to remotely execute code on an affected computer. Electronic Arts already released a security patch for the remote code execution vulnerability.

Supply-Chain Attack against the Electron Development Platform

Schneier on Security

Electron is a cross-platform development system for many popular communications apps, including Skype, Slack, and WhatsApp. Security vulnerabilities in the update system allows someone to silently inject malicious code into applications. The vulnerability is not part of the applications themselves but of the underlying Electron framework -- ­and that vulnerability allows malicious activities to be hidden within processes that appear to be benign.

Missouri Governor Vows to Prosecute St. Louis Post-Dispatch for Reporting Security Vulnerability

Krebs on Security

Louis Post-Dispatch ran a story about how its staff discovered and reported a security vulnerability in a Missouri state education website that exposed the Social Security numbers of 100,000 elementary and secondary teachers. On Wednesday, the St.

CryptoAgility to take advantage of Quantum Computing

Thales Cloud Protection & Licensing

CryptoAgility to take advantage of Quantum Computing. What is quantum computing and what changes will it bring? You’d probably do the computation a few times, supplemented by further checking using a classical computer, to make sure you arrive at the same result).

Security Vulnerability in ESS ExpressVote Touchscreen Voting Computer

Schneier on Security

Of course the ESS ExpressVote voting computer will have lots of security vulnerabilities. It's a computer, and computers have lots of vulnerabilities. This particular vulnerability is particularly interesting because it's the result of a security mistake in the design process. Someone didn't think the security through, and the result is a voter-verifiable paper audit trail that doesn't provide the security it promises. Yes, they're computers.

New Rules Announced for Border Inspection of Electronic Devices

Threatpost

Cloud Security Cryptography Government Mobile Security Privacy ACLU cameras computers digital privacy digital search Electronic Frontier Foundation Encryption passcodes phones reasonable suspicion tablets U.S. The U.S. Customs and Border Patrol announced new restrictions on when agents can copy data from digital devices at border crossing points.

Keeping up with Quantum Technology | Quantum Computing

Everteam

While everyone is digging deep into the Artificial Intelligence, Machine Learning, Blockchain and many other new digital transformation phenomena, Quantum Computing has been transformed from theory to reality. Listed under one of the ten strategic technology trends for 2019 according to Gartner, Quantum Computing has been grabbing the headlines. Let’s move to how it’s related to computers. What is Quantum Computing? Quantum Computing quantum computing

More Attacks against Computer Automatic Update Systems

Schneier on Security

As in the ASUS case, the samples were using digitally signed binaries from three other Asian vendors: Electronics Extreme, authors of the zombie survival game called Infestation: Survivor Stories , Innovative Extremist, a company that provides Web and IT infrastructure services but also used to work in game development, Zepetto, the South Korean company that developed the video game Point Blank. Me on supply chain security.

Magecart cybercrime group stole customers’ credit cards from Newegg electronics retailer

Security Affairs

Magecart hackers have stolen customers’ credit card data from the computer hardware and consumer electronics retailer Newegg. The Magecart cybercrime group is back, this time the hackers have stolen customers’ credit card data from the computer hardware and consumer electronics retailer Newegg. behind the Ticketmaster and British Airways data breaches has now victimized popular computer hardware and consumer electronics retailer Newegg.

The Race is On! Crypto Agility vs Quantum Computing. Who is ahead?

Thales Cloud Protection & Licensing

Preparing for Data Security in the Quantum Computing Era. Each passing day brings the world closer to the exciting reality of powerful quantum computing. Weather prediction, air traffic control, urban planning, defense strategies, medical research and so much more will be affected by the new era of computing power in ways we can’t even yet predict. Quantum readiness, or crypto-agility, is critical to protecting and securing data and fending off new threats.

Acer suffered the second security breach in a few months

Security Affairs

Taiwanese electronics technology giant Acer discloses a security breach suffered by its after-sales service systems in India after an isolated attack. Bad news for the Taiwanese electronics technology giant Acer, it disclosed a second security breach this year.

Sales 69

REvil ransomware gang recommends that Apple buy back its data stolen in Quanta hack

Security Affairs

REvil ransomware gang is attempting to extort Apple ahead of the Apple Spring Loaded event threatening to sell stolen blueprints belonging to the IT giant that were stolen from Quanta Computer. Quanta Computer is a Taiwan-based manufacturer of notebook computers and other electronic hardware.

Security Service of Ukraine arrested a man operating a huge DDoS botnet

Security Affairs

Security Service of Ukraine (SSU) has arrested a hacker who controlled a DDoS botnet composed of 100,000 devices that was available for rent. The crook was advertising his botnet on closed forums and in Telegram chats, he accepted payments through electronic platforms such as Webmoney.

Supreme Court of Pennsylvania Ruling on Common Law Duty to Protect Electronic Employee Data

Hunton Privacy

The case arose from a data breach in which criminals accessed UPMC’s computer systems and stole the personal and financial information of 62,000 current and former UPMC employees. This information included names, birth dates, Social Security numbers, addresses, tax forms and bank account data, all of which the employees were required to provide as a condition of employment.

Security Affairs newsletter Round 293

Security Affairs

Every week the best security articles from Security Affairs free for you in your email box. The post Security Affairs newsletter Round 293 appeared first on Security Affairs. A new round of the weekly SecurityAffairs newsletter arrived!

Securing Elections

Schneier on Security

Today, we conduct our elections on computers. Our registration lists are in computer databases. And our tabulation and reporting is done on computers. We do this for a lot of good reasons, but a side effect is that elections now have all the insecurities inherent in computers. In 2007, the states of California and Ohio conducted audits of their electronic voting machines. We can securely bank online, but can't securely vote online.

Paper 74

Supply Chain Security 101: An Expert’s View

Krebs on Security

alongside Tony Sager , senior vice president and chief evangelist at the Center for Internet Security and a former bug hunter at the U.S. National Security Agency. We talked at length about many issues, including supply chain security, and I asked Sager whether he’d heard anything about rumors that Supermicro — a high tech firm in San Jose, Calif. Tony Sager, senior vice president and chief evangelist at the Center for Internet Security.

HHS Releases Guidance on HIPAA and Cloud Computing

Hunton Privacy

Earlier this month, the Department of Health and Human Services’ Office for Civil Rights issued guidance (the “Guidance”) for HIPAA-covered entities that use cloud computing services involving electronic protected health information (“ePHI”). The BAA must establish the permitted and required uses and disclosures of ePHI, and require the BAA to appropriately safeguard ePHI, including by implementing the requirements of the HIPAA Security Rule.

Midterm Election Security: Why Patching Is a Critical Issue

Data Breach Today

Many of the computer devices to be used for electronic voting in November's midterm elections have unpatched older operating systems that make them vulnerable, says Darien Kindlund, a data scientist at the cybersecurity firm Insight Engines, which advises governments and others

Data officers raid two properties over Matt Hancock CCTV footage leak

The Guardian Data Protection

Computer equipment and electronic devices seized in connection with images of minister kissing aide Two residential properties in the south of England have been raided by data protection officers, as part of their investigation into who leaked CCTV footage of Matt Hancock kissing an aide in his office. Matt Hancock Media Newspapers Politics Newspapers & magazines Coronavirus Data protection Data and computer security Health policy Digital media Surveillance

GUEST ESSAY: Understanding the security limits of the static and dynamic passwords we rely on

The Last Watchdog

For better or worse, we will continue to use passwords to access our computing devices and digital services for years to come. Here is an overview of the passwords we’re now using – and their respective security limitations: Static passwords. With fast advancements in computer technology, it has become possible to crack static passwords using, in essence, brute force. Dynamic passwords need to be securely managed. We all rely on passwords.

Top Database Security Solutions for 2021

eSecurity Planet

Naturally, database vendors are leading providers of database security tools, and a growing number of cloud-based database providers are moving deeper into the data security space. Security is paramount. Read our in-depth review of the McAfee Data Center Security Suite.

Cloud 73

Court Rules Fraud Involving a Computer Is Not ‘Computer Fraud’ under Crime Protection Policy

Hunton Privacy

18, 2016), that a crime protection insurance policy does not cover loss resulting from a fraudulent email directing funds to be sent electronically to the imposter’s bank account because the scheme did not constitute “computer fraud” under the policy. GAIC denied coverage, claiming that the loss did not directly result from the use of a computer nor did the use of a computer cause the transfer of the funds.

Maryland Court Finds Coverage for Lost Data and Slow Computers After Ransomware Attack

Hunton Privacy

State Auto Property and Casualty Insurance Company , finding coverage for a cyber attack under a non-cyber insurance policy after the insured’s server and networked computer system were damaged as a result of a ransomware attack. National Ink’s server and networked computers experienced a ransomware attack, which prevented National Ink from accessing the logos, designs and software that are stored on these servers.

The Future of Payments Security

Thales Cloud Protection & Licensing

The Future of Payments Security. Even when banking organizations are upgrading security posture to safeguard sensitive financial information, hackers can steal the data intelligently by tying known vulnerabilities together, and making it turn out to be a potential attack. Data security.

Cloud 116

The Myth of Consumer-Grade Security

Schneier on Security

They affect national security. They're critical to national security as well as personal security. Before the Internet revolution, military-grade electronics were different from consumer-grade. That started to change in the 1980s, when consumer electronics started to become the place where innovation happened. And a lot of battle-hardened technologies are the same computer hardware and software products as the commercial items, but in sturdier packaging.

EU to Force IoT, Wireless Device Makers to Improve Security

eSecurity Planet

The European Union is poised to place more demands on manufacturers to design greater security into their wireless and Internet of Things (IoT) devices. has made some strides on IoT security at the federal level; it remains to be seen if the EU initiative will spur the U.S.

IoT 71

Microsoft Calls for Legislative Action to Set Rules for Cloud Computing

Hunton Privacy

Microsoft is urging Congress and the information technology industry to act now to ensure that cloud computing is guided by an international commitment to privacy, security and transparency for consumers, businesses and government. Information Security Online Privacy Cloud Computing Computer Fraud and Abuse Act Electronic Communications Privacy Act Microsoft

RIM-brain in Movies and TV

The Texas Record

While watching Rogue One , I could not help but notice the implications for the protection and security of Imperial records. K-2SO was then able to login to the computer system in the Scarif base. Imperial security guards) in charge of these systems were fooled.

ROT 73

US DoJ announced to have shut down the Russian RSOCKS Botnet

Security Affairs

The RSOCKS was composed of millions of compromised computers and other electronic devices around the world, including industrial control systems, time clocks, routers, audio/video streaming devices, and smart garage door openers. The U.S.