article thumbnail

The Myth of Consumer-Grade Security

Schneier on Security

The Department of Justice wants access to encrypted consumer devices but promises not to infiltrate business products or affect critical infrastructure. Barr repeated a common fallacy about a difference between military-grade encryption and consumer encryption: "After all, we are not talking about protecting the nation's nuclear launch codes.

article thumbnail

Lazarus Group North Korea strikes South Korean software firm

CyberSecurity Insiders

Lazarus hacking group aka APT group from North Korea has hit the news headlines for launching a supply chain attack on a software company operating in lines with US Technology firms SolarWinds and Kaseya firms. MATA is a malicious software framework that can infect machines operating on Windows, Linux and MacOS OSes.

Software 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Where we stand on mitigating software risks associated with fly-by-wire jetliners

The Last Watchdog

Government Accountability Office in 2020 about increasing risk due to connected aircraft technology developments. So watch out for weak encryption protocols, insufficient network segregation, or insecure user authentication mechanisms. There was another warning from the U.S. And those incidents may only be increasing.

Software 264
article thumbnail

Finalists: Best Professional Certification Program

SC Magazine

Advancements in cyber technology and increasingly sophisticated tactics of bad actors require all security professionals to be in a constant state of learning. Similarly, companies need to have the assurance that their security team maintains the skills needed to protect systems and data. FINALIST | BEST PROFESSIONAL CERTIFICATION PROGRAM.

article thumbnail

ISaPWN – research on the security of ISaGRAF Runtime

SecureList

The following potential vectors of attacks on ISaGRAF-based devices have been identified: A remote unauthenticated attacker could execute privileged commands of the IXL service on devices with ISaGRAF Runtime versions released before 2010. A remote attacker could easily implement a password brute force attack in ISaGRAF Runtime.

article thumbnail

Experts linked ransomware attacks to China-linked APT27

Security Affairs

The APT group has been active since 2010, targeted organizations worldwide, including U.S. The hackers used the Windows drive encryption tool BitLocker to lock the servers. Researchers at Positive Technologies attributed a Polar ransomware attack from April 2020 to APT27, based on the use of malware normally used by this group.

article thumbnail

STEPS FORWARD: How the Middle East led the U.S. to adopt smarter mobile security rules

The Last Watchdog

One consensus tenant that emerged from this whirlwind of rule-making in the ME and EU was the requirement to “containerize” business data, that is keep data encrypted at all times, including when accessed by and stored on mobile devices. BYOD threw a monkey wrench into IT operations starting in 2010 or so.

Mobile 205