Remove 11
Remove 2021 Remove Manufacturing Remove Presentation Remove Security
article thumbnail

The Week in Cyber Security and Data Privacy: 5 – 11 February 2024

IT Governance

Compromised data includes policyholders’ and their families’ civil status, dates of birth and social security numbers, as well as the name of their health insurer and information relating to their contracts. It has since been confirmed by Anukul Peedkaew, the permanent secretary of social development and human security.

article thumbnail

B. Braun Infusomat pumps could be hacked to alter medication doses

Security Affairs

The five previously unreported vulnerabilities in the medical system are: CVE-2021-33886 – Use of Externally-Controlled Format String (CVSS 7.7) CVE-2021-33885 – Insufficient Verification of Data Authenticity (CVSS 9.7) CVE-2021-33882 – Missing Authentication for Critical Function (CVSS 8.2) Pierluigi Paganini. The post B.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly Vulnerability Recap – August 14, 2023 – Old or New, Vulnerabilities Need Management

eSecurity Planet

No one likes the hassle of dealing with patch management or vulnerability management , but it is universally agreed that security breaches are far worse. Google announced this week that it will now push out weekly security updates to Chrome to help make users more secure.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

It seems everything smart is hackable, with IoT startups sometimes repeating security mistakes first made decades ago. How then does one start securing it? Welcome to the hacker by original podcast from for all secure, it's about challenging our expectations about the people who hack for a living.

IoT 52
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

It seems everything smart is hackable, with IoT startups sometimes repeating security mistakes first made decades ago. How then does one start securing it? Welcome to the hacker by original podcast from for all secure, it's about challenging our expectations about the people who hack for a living.

IoT 52
article thumbnail

DJI drone tracking data exposed in the US

Security Affairs

Over 80,000 drone IDs were exposed in the leak of a database containing information from airspace monitoring devices manufactured by DJI. Over 80,000 drone IDs were exposed in a data leak after a database containing information from dozens of airspace monitoring devices manufactured by the Chinese-owned DJI was left accessible to the public.

Military 121
article thumbnail

Group-IB Hi-Tech Crime Trends 2020/2021 report

Security Affairs

Group-IB , a global threat hunting and intelligence company, has presented its annual Hi-Tech Crime Trends 2020/2021 report. Forecasts and recommendations set out in Hi-Tech Crime Trends 2020-2021 seek to prevent financial damage and manufacturing downtimes.