article thumbnail

NEW TECH: DataLocker introduces encrypted flash drive — with key pad

The Last Watchdog

DataLocker honed its patented approach to manufacturing encrypted portable drives and landed some key military and government clients early on; the company has continued branching out ever since. Park: The trend nowadays is to move everything to the cloud. DataLocker actually got traction, early on, selling to the military.

article thumbnail

US and UK agencies warn of Russia-linked APT28 exploiting Cisco router flaws

Security Affairs

The APT28 group (aka Fancy Bear , Pawn Storm , Sofacy Group , Sednit , and STRONTIUM ) has been active since at least 2007 and it has targeted governments, militaries, and security organizations worldwide. The group was involved also in the string of attacks that targeted 2016 Presidential election.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kevin Mitnick, Hacker Turned Cybersecurity Leader, Dies at 59

eSecurity Planet

military systems and launch nuclear missiles through mere whistling. Mitnick understood where the greatest cybersecurity dangers were, and he used his platform at KnowBe4 to promote training all employees to be aware of attack vectors and to educate organizations worldwide.

article thumbnail

Security Affairs newsletter Round 253

Security Affairs

Google sued by New Mexico attorney general for collecting student data through its Education Platform. FireEye Mandiant M-Trends 2020 report: 500+ new Malware strains in 2019. Twitter, Facebook, and Instagram blocked in Turkey as Idlib military crisis escalates. ISS reveals malware attack impacted parts of the IT environment.

article thumbnail

Episode 255: EDM, Meet CDM – Cyber Dance Music with Niels Provos

The Security Ledger

Related Stories Citing Attacks On Small Utilities, Dragos Launches Community Defense Program FBI: Iranian APT Targets Israeli-Made PLCs Used In Critical Industries BitCoins To Bombs: North Korea Funds Military With Billions In Stolen Cryptocurrency In this episode of The Security Ledger Podcast (#255) Paul speaks with Niels Provos – a cybersecurity (..)

article thumbnail

Have We Become Apathetic About Breaches?

Thales Cloud Protection & Licensing

One such example is the recent disclosure that military personnel wearing Strava devices are revealing highly sensitive information about their locations and activities. But like many trends, I’m not sure this one is here to stay. They simply got used to the noise, and are understandably overwhelmed.

IoT 89
article thumbnail

Is the federal government ready for robotic process automation?

CGI

Don’t think of the shambling, clanking humanoid automatons from 1950s sci-fi, or even the sleek bomb-disposal robots used today by the military and police departments. The conference runs from July 22-25, with an agenda full of educational deep dives, intriguing talks and engaging networking social events.