Remove 2013 Remove Risk Remove Surveillance
article thumbnail

Cisco to pay $8.6 million fine for selling flawed surveillance technology to the US Gov

Security Affairs

Back in 2008, a whistle-blower identifies a vulnerability in Cisco video surveillance software, but the tech giant continued to sell the software to US agencies until July 2013. Cisco finally addressed the flaws in 2013 and stopped selling Cisco Video Surveillance Manager (VSM) in 2014. Cisco is going to pay $8.6

article thumbnail

Attorney General William Barr on Encryption Policy

Schneier on Security

But, in the world of cybersecurity, we do not deal in absolute guarantees but in relative risks. All systems fall short of optimality and have some residual risk of vulnerability a point which the tech community acknowledges when they propose that law enforcement can satisfy its requirements by exploiting vulnerabilities in their products.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attorney General Barr and Encryption

Schneier on Security

But, in the world of cybersecurity, we do not deal in absolute guarantees but in relative risks. All systems fall short of optimality and have some residual risk of vulnerability -- a point which the tech community acknowledges when they propose that law enforcement can satisfy its requirements by exploiting vulnerabilities in their products.

article thumbnail

NSA "Red Disk" Data Leak

Schneier on Security

The disk image, when unpacked and loaded, is a snapshot of a hard drive dating back to May 2013 from a Linux-based server that forms part of a cloud-based intelligence sharing system, known as Red Disk. Chris Vickery, director of cyber risk research at security firm UpGuard, found the data and informed the government of the breach in October.

article thumbnail

CISA adds bugs exploited by commercial surveillance spyware to Known Exploited Vulnerabilities catalog

Security Affairs

Five of the issues added by CISA to its catalog are part of the exploits used by surveillance vendors to target mobile devices with their commercial spyware: CVE-2021-30900 – Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability. The exploits were used to install commercial spyware and malicious apps on targets’ devices.

Spyware 98
article thumbnail

Policy vs Technology

Schneier on Security

He didn't become a senator until 2013.) My most recent two books, Data and Goliath -- about surveillance -- and Click Here to Kill Everybody -- about IoT security -- are really about the policy implications of technology. Authentication risks surrounding someone's intimate partner is a good example.). They still are.

article thumbnail

Navigating Rogue Waves; Balancing Privacy and Security

Security Boulevard

| [link] Introduction In 2013, Edward Snowden leaked over 200,000 classified National Security Agency documents concerning widespread government surveillance practices. This Article Navigating Rogue Waves; Balancing Privacy and Security was first published on Signpost Six. |