Remove 12
Remove 2013 Remove Encryption Remove IT Remove Manufacturing
article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

This week, in our last podcast of the year, we revisit some of the biggest information security stories from the past 12 months. The year started with the revelation of Spectre and Meltdown – major security flaws affecting processors manufactured by Intel, ARM and AMD. Hello and welcome to the final IT Governance podcast of 2018.

article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

Vamosi: One sunny morning in 2013. It's a process of protecting critical information through encryption and being aware of the potential for eavesdropping on conversations. In this episode, I'm going to discuss how hard it is to be absolutely invisible online. As you know, I don't really talk about criminal hackers on the hacker mind.

Privacy 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Microsoft Exchange Attack Saga Continues

eSecurity Planet

approach in that the attackers copy and exfiltrate a company’s data just prior to encrypting it. Microsoft reports that the tool has been tested for Exchange Server 2013, 2016 and 2019. Using this technique, Krebs tweeted on March 12 that an estimated 82,000 servers were still vulnerable to these attack exploits.

article thumbnail

10 Personal Finance Lessons for Technology Professionals

Troy Hunt

When you boil it down, what do those three things have in common? Those are choices. Money is not peace of mind. Money’s not happiness. Money is, at its essence, that measure of a man’s choices. This is part of the opening monologue of the Ozark series and when I first heard it, I immediately stopped the show and dropped it into this blog post.

Education 111