Remove 2008 Remove Information Security Remove Technology
article thumbnail

Cisco to pay $8.6 million fine for selling flawed surveillance technology to the US Gov

Security Affairs

Back in 2008, a whistle-blower identifies a vulnerability in Cisco video surveillance software, but the tech giant continued to sell the software to US agencies until July 2013. million fine for selling flawed surveillance technology to the US Gov appeared first on Security Affairs. Cisco is going to pay $8.6

article thumbnail

Indian Court ordered to block email service Proton Mail

Security Affairs

. “In a Tuesday hearing streamed on YouTube , Justice M Nagaprasanna ordered the Indian government to block Proton Mail, bearing in mind the observations made in the course of the order, under the Information Technology Act 2008.” ” states TechCrunch.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chinese APT IronHusky use Win zero-day in recent wave of attacks

Security Affairs

“In late August and early September 2021, Kaspersky technologies detected attacks with the use of an elevation of privilege exploit on multiple Microsoft Windows servers. The attacks were conducted between late August and early September 2021 and aimed at companies in the defense industry and IT firms.

Hacking 118
article thumbnail

Hacking Nespresso machines to have unlimited funds to purchase coffee

Security Affairs

The attack is possible because the machines use a smart card payment system that leverages insecure technology, the MIFARE Classic smart cards. The vulnerability was disclosed by the security researcher Polle Vanhoof.

Hacking 145
article thumbnail

Using a Mythic agent to optimize penetration testing

SecureList

Being experts in systems security assessment and information security in general, we understand that a proactive approach always works better than simply responding to incidents that have already occurred. Besides, the ability to detect the tool becomes a key performance indicator for these technologies.

article thumbnail

STEPS FORWARD: Math geniuses strive to make a pivotal advance — by obfuscating software code

The Last Watchdog

Digital technology, like music, is all about math. Simply put, iO must be achieved in order to preserve privacy and security while tapping into the next generation of IT infrastructure. It will, of course, be vital to have these next-gen, AI-infused systems run securely, in ways that preserve individual privacy.

Software 182
article thumbnail

Why do CISOs Keep Quitting on Florida?

SecureWorld News

Chief Information Security Officers (CISO) have the luxury of being an incredibly hot commodity, so they can pretty much pick and choose where they work, as they are almost guaranteed to have a job waiting for them somewhere. The state is now looking for the third person to fill that role in a year. And this is increasing cyber risk.

CISO 98