article thumbnail

The US Military Buys Commercial Location Data

Schneier on Security

Vice has a long article about how the US military buys commercial location data worldwide. military is buying the granular movement data of people around the world, harvested from innocuous-seeming apps, Motherboard has learned. This isn’t new, this isn’t just data of non-US citizens, and this isn’t the US military.

Military 107
article thumbnail

New HiatusRAT campaign targets Taiwan and U.S. military procurement system

Security Affairs

military procurement system. military procurement system and was spotted targeting Taiwan-based organizations The choice of the new targets in the latest campaign suggests a strategic interest of the People’s Republic of China according to the 2023 ODNI threat assessment. military server used for contract proposals and submissions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Autoclerk travel reservations platform data leak also impacts US Government and military

Security Affairs

. “The data Our team viewed highly sensitive data exposing the personal details of government and military personnel, and their travel arrangements to locations around the world, both past and future.” The list of affected users includes the US government, military, and Department of Homeland Security (DHS). .

article thumbnail

GUEST ESSAY: A Memorial Day call to upskill more veterans for in-demand cybersecurity roles

The Last Watchdog

Meanwhile, 200,000 well-trained and technically skilled military service members are discharged each year. Yet, there’s still work to be done to make this path more accessible and known among the veteran and transitioning military community. Many government and non-profit organizations like VetJobs and VetsinTech are doing just this.

article thumbnail

When Your Smart ID Card Reader Comes With Malware

Krebs on Security

government employees and contractors have been issued a secure smart ID card that enables physical access to buildings and controlled spaces, and provides access to government computer networks and systems at the cardholder’s appropriate security level. Here’s one example. government smart cards.

article thumbnail

Chinese Government Agents Charged with Hacking, IP Theft

Adam Levin

This action is yet another example of criminal efforts by the (Ministry of State Security) to facilitate the theft of private data for China’s commercial gain,” said U.S. The post Chinese Government Agents Charged with Hacking, IP Theft appeared first on Adam Levin. Attorney Adam Braverman.

article thumbnail

GUEST ESSAY: Preparing for the dire cybersecurity consequences of Russia’s invasion of Ukraine

The Last Watchdog

These Russian cyber actors are government organizations and include other parties who take their orders from the Russian military or intelligence organizations – while not technically under government control. As the United States and other nations condemn Russia’s actions, the odds of Russian cyber actors targeting the U.S.,