New US Electronic Warfare Platform

Schneier on Security

The Army is developing a new electronic warfare pod capable of being put on drones and on trucks.the Silent Crow pod is now the leading contender for the flying flagship of the Army's rebuilt electronic warfare force. Insiders call this cognitive electronic warfare ).

NEW TECH: DigiCert Document Signing Manager leverages PKI to advance electronic signatures

The Last Watchdog

Most of us, by now, take electronic signatures for granted. Yet electronic signatures do have their security limitations. As digital transformation has quickened, it has become clear that electronic signatures are destined to become even more pervasively used to conduct business remotely. Signing can be done anywhere using any type of supported computing device. Related: Why PKI will endure as the Internet’s secure core.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Maze ransomware operators claim to have breached LG Electronics

Security Affairs

Maze ransomware operators claims to have breached the South Korean multinational electronics company LG Electronics. Researchers at Cyble discovered a data leak of LG Electronics published by Maze ransomware operators. SecurityAffairs – LG Electronics, Maze ransomware).

Details of a Computer Banking Scam

Schneier on Security

This is a longish video that describes a profitable computer banking scam that’s run out of call centers in places like India. And three, it’s an evolving tactic that gets around banks increasingly flagging blocking suspicious electronic transfers.

Supply-Chain Attack against the Electron Development Platform

Schneier on Security

Electron is a cross-platform development system for many popular communications apps, including Skype, Slack, and WhatsApp. From a news article : At the BSides LV security conference on Tuesday, Pavel Tsakalidis demonstrated a tool he created called BEEMKA , a Python-based tool that allows someone to unpack Electron ASAR archive files and inject new code into Electron's JavaScript libraries and built-in Chrome browser extensions.

Computer giant Acer hit by $50 million ransomware attack

Bleeping Computer

The REvil ransomware operation claims to have stolen unencrypted data after hacking electronics and computer giant Acer. [.]. Security

More Attacks against Computer Automatic Update Systems

Schneier on Security

As in the ASUS case, the samples were using digitally signed binaries from three other Asian vendors: Electronics Extreme, authors of the zombie survival game called Infestation: Survivor Stories , Innovative Extremist, a company that provides Web and IT infrastructure services but also used to work in game development, Zepetto, the South Korean company that developed the video game Point Blank.

Syrian Electronic Army Members Indicted for Conspiracy

Dark Reading

Two men have been charged for their involvement in a plot to commit computer hacking as members of the Syrian Electronic Army

Meet the Computer Scientist Who Helped Push for Paper Ballots

Dark Reading

Security Pro File: Award-winning computer scientist and electronic voting expert Barbara Simons chats up her pioneering days in computer programming, paper-ballot backups, Internet voting, math, and sushi

CryptoAgility to take advantage of Quantum Computing

Thales Cloud Protection & Licensing

CryptoAgility to take advantage of Quantum Computing. What is quantum computing and what changes will it bring? You’d probably do the computation a few times, supplemented by further checking using a classical computer, to make sure you arrive at the same result).

New Rules Announced for Border Inspection of Electronic Devices


Cloud Security Cryptography Government Mobile Security Privacy ACLU cameras computers digital privacy digital search Electronic Frontier Foundation Encryption passcodes phones reasonable suspicion tablets U.S. The U.S. Customs and Border Patrol announced new restrictions on when agents can copy data from digital devices at border crossing points.

Security Vulnerability in ESS ExpressVote Touchscreen Voting Computer

Schneier on Security

Of course the ESS ExpressVote voting computer will have lots of security vulnerabilities. It's a computer, and computers have lots of vulnerabilities. I am continuously amazed by how bad electronic voting machines are. Yes, they're computers. But they also seem to be designed by people who don't understand computer (or any) security

Smashing Security podcast #232: Zoomolympics and language matters

Graham Cluley

Video gaming giant Electronic Arts suffers a hack following slack security, the Japanese Olympics are proving unpopular with everyone apart from cybercriminals, and le coq est mort. Data loss Podcast Coq Coronavirus data breach Electronic Arts Japan Olympic Games Smashing Security video game

Magecart cybercrime group stole customers’ credit cards from Newegg electronics retailer

Security Affairs

Magecart hackers have stolen customers’ credit card data from the computer hardware and consumer electronics retailer Newegg. The Magecart cybercrime group is back, this time the hackers have stolen customers’ credit card data from the computer hardware and consumer electronics retailer Newegg. behind the Ticketmaster and British Airways data breaches has now victimized popular computer hardware and consumer electronics retailer Newegg.

Top 5 Cyber Attack news headlines trending on Google

CyberSecurity Insiders

As Singla was charged with 17 counts of causing damage to computer networks with full intention, he is likely to face imprisonment for 10 years and 3 million penalties. News Google Kaspersky McDonald's APT41 Cyberattack News Today Securolytics Electronic Arts

REvil ransomware says they hit Acer, Acer reports "abnormal situations"

Bleeping Computer

The REvil ransomware operation claims to have stolen unencrypted data after hacking electronics and computer giant Acer. [.]. Security

The Race is On! Crypto Agility vs Quantum Computing. Who is ahead?

Thales Cloud Protection & Licensing

Preparing for Data Security in the Quantum Computing Era. Each passing day brings the world closer to the exciting reality of powerful quantum computing. Weather prediction, air traffic control, urban planning, defense strategies, medical research and so much more will be affected by the new era of computing power in ways we can’t even yet predict. Quantum computing is a threat to public key infrastructure and security systems that rely on it.

Keysight’s Automotive Cybersecurity Test System Selected by Eastern Michigan University’s School of Information Security & Applied Computing

CyberSecurity Insiders

NYSE: KEYS), a leading technology company that delivers advanced design and validation solutions to help accelerate innovation to connect and secure the world, and Eastern Michigan University’s (EMU) School of Information Security & Applied Computing, announced that EMU has selected Keysight’s Automotive Cybersecurity Penetration Test System to support the next generation of cybersecurity engineers and researchers studying at the EMU GameAbove College of Engineering and Technology.

REvil ransomware gang recommends that Apple buy back its data stolen in Quanta hack

Security Affairs

REvil ransomware gang is attempting to extort Apple ahead of the Apple Spring Loaded event threatening to sell stolen blueprints belonging to the IT giant that were stolen from Quanta Computer. Quanta Computer is a Taiwan-based manufacturer of notebook computers and other electronic hardware.

Financial Cyberthreats in 2020


Even though, in 2020, we have seen ever more sophisticated cyberattacks, the overall statistics look encouraging: the number of users hit by computer and mobile malware declines, so does financial phishing. Some of them lacked the devices, so employees had to use their home computers for work.

Episode 208: Getting Serious about Hardware Supply Chains with Goldman Sachs’ Michael Mattioli

The Security Ledger

In this week’s Security Ledger Podcast, sponsored by Trusted Computing Group, we’re talking about securing the hardware supply chain. In this week’s Security Ledger Podcast, sponsored by Trusted Computing Group, we’re talking about securing the hardware supply chain.

Amicus Brief on CFAA

Adam Shostack

The EFF has filed an amicus brief on the Computer Fraud and Abuse Act: Washington, D.C.—The

Old Tech Spills Digital Dirt on Past Owners


Researcher buys old computers, flash drives, phones and hard drives and finds only two properly wiped devices out of 85 examined. Cryptography Privacy data breach data disposal data integrity data wiping hard drives insecure data leaky data old electronics personal identifiable information PII secure data

Spotlight Podcast: Two Decades On TCG Tackles Trustworthiness For The Internet of Things

The Security Ledger

In this Spotlight Edition of The Security Ledger Podcast, sponsored by Trusted Computing Group (TCG), we’re joined by Intel Fellow Claire Vishik to talk about the evolving concept of online “trust.” Claire Vishik, Intel Fellow & Director, Trusted Computing Group.

Podcast Episode 128: Do Security and Privacy have a Booth at CES?

The Security Ledger

In this episode of The Security Ledger podcast (#128): you're going to hear a lot from the annual Consumer Electronics Show (CES) out in Las Vegas this week, but are any of the new gadgets being released secure? And do security and privacy have a seat at the table at the world's largest electronics event? And do security and privacy have a seat at the table at the world’s largest electronics event?

Wi-Fi Devices as Physical Object Sensors

Schneier on Security

The new 802.11bf standard will turn Wi-Fi devices into object sensors: In three years or so, the Wi-Fi specification is scheduled to get an upgrade that will turn wireless devices into sensors capable of gathering data about the people and objects bathed in their signals.

Exclusive Tips To Stop Cyberbullying [For Teens, Parents & Schools]


Cyberbullying also known as online bullying, is a form of bullying which occurs electronically via the internet. It occurs on digital devices such as mobile phones, tablets, and most especially computers. Want to stop cyberbullying? Check out our tips exclusive for teens and parents.

MeteorExpress Wiper Responsible for the Iranian Railway Attack

Heimadal Security

Earlier this month, Iran’s transportation ministry confirmed a cyberattack against its computer systems, which has caused the portal page of the ministry and its affiliated pages to go offline. What’s more, electronic tracking of trains across Iran failed.

Ransomware: 8 Things That You Must Know

Joseph Steinberg

Remember to keep backups disconnected from your computer and network so that if any ransomware (or other malware) gets onto the network it cannot infect the backups. Ransomware, like other types of malware, can spread via “smart devices” that are not considered by most people to be “computers.”

Sodinokibi/REvil Ransomware Gang Hit Acer with $50M Ransom Demand

Security Boulevard

The Sodinokibi/REvil ransomware gang has reportedly infected Taiwanese multinational electronics corporation Acer and demanded a ransom of $50 million. Those responsible for the Sodinokibi ransomware strain announced on their data leaks website that they had breached the computer giant.

Sealed U.S. Court Records Exposed in SolarWinds Breach

Krebs on Security

Nicholas Weaver , a lecturer at the computer science department at University of California, Berkeley, said the court document system doesn’t hold documents that are classified for national security reasons.

Homemade TEMPEST Receiver

Schneier on Security

Tom's Guide writes about home brew TEMPEST receivers: Today, dirt-cheap technology and free software make it possible for ordinary citizens to run their own Tempest programs and listen to what their own -- and their neighbors' -- electronic devices are doing.

What is adware?


It can occur on a computer, mobile phone, or another electronic device. Adware, short for advertising supported software, is a type of unwanted software designed to put advertisements on your screen. While there are presentations of Adware that can pose potential security risks, the main problem with Adware is that it’s a nuisance: inhibiting your […]. The post What is adware? appeared first on The SiteLock Blog. Malware

On Blockchain Voting

Schneier on Security

While current election systems are far from perfect, Internet- and blockchain-based voting would greatly increase the risk of undetectable, nation-scale election failures.Online voting may seem appealing: voting from a computer or smart phone may seem convenient and accessible.

Estonian hacker Pavel Tsurkan pleads guilty for operating a proxy botnet.

Security Affairs

Estonian hacker Pavel Tsurkan has pleaded guilty in a United States court to the counts of computer fraud and of creating and operating a proxy botnet. The Estonian national Pavel Tsurkan has pleaded guilty in a United States court to two counts of computer fraud and abuse.

Five Interesting Israeli CyberSecurity Companies

Joseph Steinberg

About 15 years ago, when I mentioned in a talk that hackers would soon be able to manipulate treatment devices, modify imaging and test results , modify patient records, and take operating room computers offline , several members of the audience told me that I was paranoid.

What’s Your Fail-Safe Posture? Before You Learn How to Fly, Learn How to Fall

CyberSecurity Insiders

Way back in 1975, two members of the Institute of Electrical and Electronics Engineers (IEEE) authored a report about how to protect computer systems.

Meet Jackware that is 10 times more dangerous than Ransomware

CyberSecurity Insiders

Going by the details, we are nowadays using many connecting devices that have tiny computers installed in them such as cars, smart doors, smart appliances, security cameras, healthcare-related devices such as a BP monitoring unit, and whatnot.

Data Breach at Legal Service Provider May Have Compromised Health Info of 36,000 Patients in Pittsburgh

Hot for Security

“This event did not occur at UPMC or affect the security of its electronic patient records or other computer systems.” Computer forensic specialists determined that the attackers gained access to employee email accounts for nearly three months, between April 1 and June 25.

New IRS Site Could Make it Easy for Thieves to Intercept Some Stimulus Payments

Krebs on Security

In this case, fraudsters would simply need to identify the personal information for a pool of Americans who don’t normally file tax returns, which may well include a large number of people who are disabled, poor or simply do not have easy access to a computer or the Internet. The U.S.

Three Charged in July 15 Twitter Compromise

Krebs on Security

was charged in a criminal complaint in Northern California with aiding and abetting intentional access to a protected computer. also was charged in California with conspiracy to commit wire fraud, money laundering and unauthorized access to a computer.

Scams 216

Canada Uses Civil Anti-Spam Law in Bid to Fine Malware Purveyors

Krebs on Security

Section 8 involves the surreptitious installation of computer programs on computers or networks including malware and spyware. “CASL defines spam as commercial electronic messages without consent or the installation of software without consent or the intercepting of electronic messages,” Barratt said.

The Myth of Consumer-Grade Security

Schneier on Security

Before the Internet revolution, military-grade electronics were different from consumer-grade. That started to change in the 1980s, when consumer electronics started to become the place where innovation happened. And a lot of battle-hardened technologies are the same computer hardware and software products as the commercial items, but in sturdier packaging. The US nuclear system Barr mentions is one such example -- and it uses ancient computers and 8-inch floppy drives.