article thumbnail

Weekly podcast: TSB, hotel locks and NATO exercise

IT Governance

This week, we discuss TSB’s chaotic system upgrade, a security flaw in electronic hotel locks and a major NATO cyber security exercise. According to F-Secure , flaws in the equipment’s software – Vision by VingCard – mean it’s possible to create master keys that open doors without leaving any record.

article thumbnail

New HiatusRAT campaign targets Taiwan and U.S. military procurement system

Security Affairs

Then they analyzed the connections made to this server to identify potential targets and discovered that over 91% of the inbound connections were from Taiwan, and there appeared to be a preference for Ruckus-manufactured edge devices. military procurement system appeared first on Security Affairs. ” continues the report.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Australian Defense Department will replace surveillance cameras from Chinese firms Hikvision and Dahua

Security Affairs

An internal audit of surveillance equipment in Australian government and agency offices revealed the presence of more than 900 built systems manufactured by Chinese companies Hikvision and Dahua. The presence of cameras poses an unacceptable risk to national security.

article thumbnail

Vladimir Putin ‘s computers still run Windows XP, Media reports

Security Affairs

Astra Linux is a Debian-based distro developed in Russia by the Scientific/Manufacturing Enterprise Rusbitech RusBITech about ten years ago. The Astra Linux distribution was initially used only by private companies, later Russian government agencies started using it after it was certified to handle classified information.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

This week, in our last podcast of the year, we revisit some of the biggest information security stories from the past 12 months. As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events.

article thumbnail

2022 Cyber Security Review of the Year

IT Governance

Google , Clearview AI , and Meta all receives hefty penalties in 2022, demonstrating the continued important of effective information security. But these were far from the only notable cyber security headlines of the year. Meanwhile, GDPR (General Data Protection Regulation) enforcement continues apace.

Security 132
article thumbnail

Vulnerabilities in Weapons Systems

Schneier on Security

Military software is unlikely to be any more secure than commercial software. In 2018, a 29-country NATO exercise, Trident Juncture , that included cyberweapons was disrupted by Russian GPS jamming. NATO does try to test cyberweapons outside such exercises, but has limited scope in doing so.

Military 144