Remove 10
article thumbnail

The role of a secret Dutch mole in the US-Israeli Stuxnet attack on Iran

Security Affairs

Stuxnet is a malicious computer worm developed to target SCADA systems that was first uncovered in 2010, but researchers believe its development begun at least 2005. In June 2009, the attackers launched a new version of Stuxnet, followed by other variants in March and April 2010.

article thumbnail

SEC and FINRA Issue 2020 Examination Priorities for Broker-Dealers and Investment Advisers

Data Matters

Focus areas for such examinations will include sales practices, supervision of high-risk personnel and compliance with key regulatory requirements (including Rule 15c2-11 under the Securities Exchange Act of 1934, as amended (Exchange Act), the locate requirement of Regulation SHO and the obligation to file suspicious activity reports (SARs)).

Retail 68
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SEC and FINRA Issue 2020 Examination Priorities (Including Cybersecurity) for Broker-Dealers and Investment Advisers

Data Matters

OCIE also will focus on recommendations and advice provided to retail investors, with a particular emphasis on seniors, retirees, teachers and military personnel, as well as products that the SEC considers higher risk (e.g., Trading and Risk Management Practices (Including Best Execution). Information Security .

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

In 2010, she was interviewed by O'Reilly Media. Halderman : In 2010, Washington D.C. When I look at nuclear submarines and the software that runs them, it has to be zero defect, because lives are at risk. Does it have some of the well known OWASP top 10 vulnerabilities? held a pilot of a new Internet voting system.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

In 2010, she was interviewed by O'Reilly Media. Halderman : In 2010, Washington D.C. When I look at nuclear submarines and the software that runs them, it has to be zero defect, because lives are at risk. Does it have some of the well known OWASP top 10 vulnerabilities? held a pilot of a new Internet voting system.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

In 2010, she was interviewed by O'Reilly Media. Halderman : In 2010, Washington D.C. When I look at nuclear submarines and the software that runs them, it has to be zero defect, because lives are at risk. Does it have some of the well known OWASP top 10 vulnerabilities? held a pilot of a new Internet voting system.