article thumbnail

On Robots Killing People

Schneier on Security

A malfunctioning robot he went to inspect killed him when he obstructed its path, according to Gabriel Hallevy in his 2013 book, When Robots Kill: Artificial Intelligence Under Criminal Law. Fatalities in the first decades of aviation forced regulation, which required new developments in both law and technology.

article thumbnail

FBI Raids Chinese Point-of-Sale Giant PAX Technology

Krebs on Security

federal investigators today raided the Florida offices of PAX Technology , a Chinese provider of point-of-sale devices used by millions of businesses and retailers globally. FBI agents entering PAX Technology offices in Jacksonville today. Headquartered in Shenzhen, China, PAX Technology Inc. organizations. Source: WOKV.com.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Modernizing Health Care Security with SASE

Security Boulevard

Since 2013 and the most recent set of updates to the Health Insurance Portability and Accountability Act (HIPAA), U.S. health care providers have been adopting technologies faster than at any point in the preceding decades.

Insurance 112
article thumbnail

Two NSA Algorithms Rejected by the ISO

Schneier on Security

These algorithms were both designed by the NSA and made public in 2013. The risk of using NSA-designed ciphers, of course, is that they include NSA-designed backdoors. It's like examining alien technology. They are optimized for small and low-cost processors like IoT devices. Personally, I doubt that they're backdoored.

IoT 164
article thumbnail

MY TAKE: Cyber attacks on industrial controls, operational technology have only just begun

The Last Watchdog

And the risks are multiplying as more digital devices become connected in insufficiently secured environments. Monitoring and management of many existing industrial control systems’ (ICS) embedded devices, like pumps, valves and turbines, are ancient in technological terms. Dismantling the silos.

article thumbnail

U.S. Govt. Apps Bundled Russian Code With Ties to Mobile Malware Developer

Krebs on Security

But that story omitted an important historical detail about Pushwoosh: In 2013, one of its developers admitted to authoring the Pincer Trojan , malware designed to surreptitiously intercept and forward text messages from Android mobile devices. Pushwoosh says it is a U.S. ” GOV 311. ” FOREIGN ADTECH THREAT? ”

Mobile 246
article thumbnail

Anomali Appoints Chris Peterson as Vice President of Global Channel and Technology Partnerships

CyberSecurity Insiders

.–( BUSINESS WIRE )– Anomali , the leader in intelligence-driven extended detection and response (XDR) cybersecurity solutions, today announced that Chris Peterson has been named Vice President of Global Channel and Technology Partnerships. Leading venture firms including Google Ventures, General Catalyst, and IVP back Anomali.