Russian military plans to replace Windows with Astra Linux

Security Affairs

The Russian military is in the process of replacing the Windows system with the Linux distribution Astra Linux. Astra Linux is a Debian-based distro developed in Russia by the Scientific/Manufacturing Enterprise Rusbitech RusBITech about ten years ago.

From China with Love: New York Firm sold millions in PRC Surveillance Gear to US Government, Military

The Security Ledger

government: selling Chinese manufactured cameras and other gear to the U.S. Military, the Department of Energy and other government agencies that it claimed were "Made in the U.S.A".

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Supply-Chain Security

Schneier on Security

Earlier this month, the Pentagon stopped selling phones made by the Chinese companies ZTE and Huawei on military bases because they might be used to spy on their users. We have to trust the country where the software is written -- and the countries where all the components are manufactured.

Captured on Film: Armistice Day 1918

Unwritten Record

More than 350,00 African Americans served in segregated units in the United States military during World War I. “Our Wings of Victory,” the Manufacture of Military Aeroplanes During WWI. African American History Digitization Films Military Motion Pictures U.S.

Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?

Krebs on Security

The chips were alleged to have spied on users of the devices and sent unspecified data back to the Chinese military. Supermicro has assembly facilities in California, the Netherlands, and Taiwan, but its motherboards—its core product—are nearly all manufactured by contractors in China.

IT 285

Airbus suppliers were hit by four major attack in the last 12 months

Security Affairs

“The group has long been considered a tempting target because of the cutting-edge technologies that have made it one of the world’s biggest commercial plane manufacturers, as well as a strategic military supplier.”

Adding Backdoors at the Chip Level

Schneier on Security

One of the main concerns is that integrated circuits, e.g., for military or critical-infrastructure applications, could be maliciously manipulated during the manufacturing process, which often takes place abroad.

Australia banned Huawei from 5G network due to security concerns

Security Affairs

The US was the first country that warned of the security risks associated with the usage of the products manufactured by the Chinese telecommunications giant. Chinese-owned telecommunications firm Huawei has been banned from Australia’s 5G network due to security concerns.

NEW TECH: DataLocker introduces encrypted flash drive — with key pad

The Last Watchdog

DataLocker honed its patented approach to manufacturing encrypted portable drives and landed some key military and government clients early on; the company has continued branching out ever since. This could be in high security areas, relating to the government or military, or you might be in different countries, where secure Internet connections are not available. DataLocker actually got traction, early on, selling to the military.

MY TAKE: Iran’s cyber retaliation for Soleimani assassination continues to ramp up

The Last Watchdog

Touhill “Adversaries should remember that our military doctrine identifies cyber as one of our combined arms capabilities,” says Greg Touhill, president of AppGate Federal Group , a Florida-based supplier of software perimeter security systems. “To

MY TAKE: How state-backed cyber ops have placed the world in a constant-state ‘Cyber Pearl Harbor’

The Last Watchdog

That May 10th air strike by the Israel Defense Force marked the first use of military force in direct retaliation for cyber spying. This comes as no surprise to anyone in the military or intelligence communities. Russia explicitly recruits folks already engaged in criminal activities, and once recruited, they are contracted and connected to military organizations for direction and oversight,” Bort told me.

Dutch expelled two Russian spies over hack plan on Swiss lab working on Skripal case

Security Affairs

According to Dutch-based NRC newspaper and Swiss daily Tages-Anzeiger, Dutch intelligence services arrested two alleged Russian spies working for Russia’s GRU military intelligence service on suspicion of planning to hack the Spiez laboratory near Bern.

Archives*RM Testimonial #5

The Schedule

There are now over 300 tenant businesses in the sectors of manufacturing, design, and art. This testimonial about the intersections of archives and records management comes from Elizabeth McGorty, Archivist & Records Manager for Brooklyn Navy Yard Development Corporation.

Cyber mercenaries and insiders hired by Chinese intelligence to hack aerospace and tech firms

Security Affairs

” The Jiangsu Province Ministry of State Security (JSSD) is a foreign intelligence unit that is coordinated by China’s Ministry of State Security (MSS), the agency that is tasked for non-military foreign intelligence and domestic counterintelligence operations. According to the U.S.

MICROCHIPS Act aims at improving tech supply chain

Security Affairs

Two US senators have introduced legislation a bill, dubbed Manufacturing, Investment and Controls Review for Computer Hardware, Intellectual Property and Supply ACT (MICROCHIPS Act – S. military information.” MICROCHIPS Act ( S.

MY TAKE: Massive Marriott breach continues seemingly endless run of successful hacks

The Last Watchdog

I have a Yahoo email account, I’ve shopped at Home Depot and Target , my father was in the military and had a security clearance, which included a dossier on his family, archived at the U.S. Office of Personnel Management , I’ve had insurance coverage from Premera Blue Cross and I’ve stayed at the Marriott Marquis in San Francisco. Related: Uber hack shows DevOps risk.

Cell Phone Security and Heads of State

Schneier on Security

Just last month, the same group found eavesdropping capabilities in products from the Israeli cyberweapons manufacturer NSO Group operating in Algeria, Bangladesh, Greece, India, Kazakhstan, Latvia, South Africa -- 45 countries in all.

Episode 167: Made in America? Trade Tensions highlight Supply Chain Risk

The Security Ledger

» Related Stories From China with Love: New York Firm sold millions in PRC Surveillance Gear to US Government, Military Episode 165: Oh, Canada! That decision followed years of warnings from security professionals about security vulnerabilities, back door accounts and suspicious patterns of behavior from cameras and other technology manufactured in the People Republic of China.

Vladimir Putin ‘s computers still run Windows XP, Media reports

Security Affairs

In June, the Russian military announced it was in the process of replacing the Windows system with the Linux distribution Astra Linux . Astra Linux is a Debian-based distro developed in Russia by the Scientific/Manufacturing Enterprise Rusbitech RusBITech about ten years ago.

MY TAKE: Michigan’s Cyber Range hubs provide career paths to high-schoolers, underutilized adults

The Last Watchdog

Meanwhile, Pinckney’s Darga has taken the initiative to spearhead efforts to cater to military veterans and to disabled individuals, as well, particularly persons with autism. Ford and for its giant furniture manufacturing companies.

Summer Road Trip: Chicago and Pittsburgh

Unwritten Record

The photographs in the American Unofficial Collection of World War I Photographs (165-WW NAID 533461 ) of people at work are fascinating: ( 165-WW-594A-2 : Shells manufactured for Ordnance Dept.; 165-WW-303A-109 : Type of carburetor manufactured by the Stomberg Motor Devices Co.,

North Korea-linked ScarCruft APT adds Bluetooth Harvester to its arsenal

Security Affairs

Cyber attacks conducted by the APT37 group mainly targeted government, defense, military, and media organizations in South Korea. The hackers targeted organizations in the chemicals, manufacturing, electronics, aerospace, healthcare, and automotive sectors.

The role of a secret Dutch mole in the US-Israeli Stuxnet attack on Iran

Security Affairs

The development of the deadly cyber weapon started under the administration of George Bush Junior as part of a military operation named “ Olympic Games ”, but the Obama administration has been pushing a more energetic on the offensive program.

Russian Sednit APT used the first UEFI rootkit of ever in attacks in the wild

Security Affairs

” The Sednit APT group has been active since at least 2007 and it has targeted governments, militaries, and security organizations worldwide. Security experts from ESET have spotted the first UEFI rootkit of ever, the code tracked as LoJax was used in attacks in the wild.

Weekly podcast: TSB, hotel locks and NATO exercise

IT Governance

A spokesperson for the Swedish lock manufacturer, Assa Abloy, said: “Vision Software is a 20-year-old product, which has been compromised after 12 years and thousands of hours of intensive work by two employees at F-Secure.

Government By Numbers: Some Interesting Insights

John Battelle's Searchblog

Examples include identity (from driver’s licenses and SSNs to Visa, MasterCard, Amex, and Facebook), delivery of important information and items (from the Post Office to Telcos, Internet, and FedEx and UPS), and protection (outsourcing both prisons and military jobs to private companies).

Weekly podcast: 2018 end-of-year roundup

IT Governance

The year started with the revelation of Spectre and Meltdown – major security flaws affecting processors manufactured by Intel, ARM and AMD. And security researchers from UpGuard discovered ten years’ worth of sensitive documents from more than 100 manufacturing companies exposed on a publicly accessible rsync server belonging to the engineering firm Level One Robotics.

Student Societies of Amherst Academy & Their Questions

Archives Blogs

Is the manufacturing interest of our Country more important than agriculture?”. Which ought most to be encouraged, Commerce or Manufacture?”. Have military heroes been beneficial to the world?”. Ought Quakers to be compelled to do military duty?”.

Business, Meet Mission: With His Final #SOTU, Obama Reframed The Climate Debate

John Battelle's Searchblog

We’ve protected an open internet,” he said, “We’ve launched next-generation manufacturing hubs, and online tools that give an entrepreneur everything he or she needs to start a business in a single day.”.

A Flurry of Recent Cybersecurity Activity from the Trump Administration

Data Matters

Awareness and education are needed ,” as users, developers, manufacturers, and infrastructure operators all can lack the knowledge and capabilities to protect the Internet. Soon after he took office, President Trump issued Executive Order (EO) 13800, Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.

On Open Platforms, Wifi, Home Automation, and Kitty Litter

John Battelle's Searchblog

Another wonderful example is the Global Positioning System (GPS), once the realm only of the United States military, but now the driver of countless commercial opportunities around the globe (again thanks to decisions made during the Clinton administration).

Representative Mary Bono Mack Releases Discussion Draft of the SAFE Data Act

Hunton Privacy

Representative Bono Mack is Chairman of the House Subcommittee on Commerce, Manufacturing and Trade. On June 13, 2011, Representative Mary Bono Mack (R-CA) released a discussion draft of the Secure and Fortify Data Act (the “SAFE Data Act”), which is designed to “protect consumers by requiring reasonable security policies and procedures to protect data containing personal information, and to provide for nationwide notice in the event of a security breach.”