Remove 2009 Remove Risk Remove Technology
article thumbnail

Facebook Flaws and Privacy Laws: A Journey into Early Social Media Security from 2009

Security Boulevard

Travel back to 2009 with the second-ever episode featuring discussions on early Facebook bugs, cross-site scripting vulnerabilities, and a pivotal Canadian privacy ruling involving Facebook. The post Facebook Flaws and Privacy Laws: A Journey into Early Social Media Security from 2009 appeared first on Security Boulevard.

Media 52
article thumbnail

Cybersecurity in Aviation: Rising Threats and Modernization Efforts

SecureWorld News

The expanding threat landscape: vulnerabilities and attack types The aviation ecosystem is an intricate web of airlines, airports, air navigation service providers, maintenance suppliers, and third-party technology vendors. A cyberattack on any link, be it a ground-handling contractor or a software provider, can trigger cascading failures.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Science Fiction Writers Helping Imagine Future Threats

Schneier on Security

More imagination leads to more movie-plot threats -- which contributes to overall fear and overestimation of the risks. But please, keep the people who actually know science and technology in charge. Last month, at the 2009 Homeland Security Science & Technology Stakeholders Conference in Washington D.C.,

article thumbnail

‘Spam Nation’ Villain Vrublevsky Charged With Fraud

Krebs on Security

Pavel Vrublevsky , founder of the Russian payment technology firm ChronoPay and the antagonist in my 2014 book “ Spam Nation ,” was arrested in Moscow this month and charged with fraud. prison for his role in the 2009 theft of more than $9 million from RBS Worldpay. Click to enlarge.

Banking 243
article thumbnail

CSRB Report on Microsoft

Adam Shostack

Running 46 parallel teams is an interesting approach, with some risks of silos. Recommendation 17: The Board believes that incorporating all known vulnerabilities across the entire technology stack in CVEs comprehensive repository would be a public benefit for industry and government customers, as well as security researchers.

article thumbnail

Belgium telecom operators Proximus and Orange drop Huawei

Security Affairs

Orange Belgium is using Huawei equipment since 2007 for its mobile network in Belgium and Luxembourg, while the collaboration between Proximus and the Shenzhen-based company started in 2009 for the progressive upgrading of its network. There’s also a growing concern about Huawei’s capacity to produce its equipment,” the source added.

Mobile 135
article thumbnail

Artificial Intelligence meets real talk at IRISSCON 2024

BH Consulting

But a hallmark of the event since it was first held in 2009 is visiting speakers who aren’t afraid to challenge popular narratives. Leaders guiding their organisations today need to know how to balance AI’s benefits – like real-time threat detection, rapid response, and automated defences – with new risks and complexities.