article thumbnail

New US Electronic Warfare Platform

Schneier on Security

The Army is developing a new electronic warfare pod capable of being put on drones and on trucks.the Silent Crow pod is now the leading contender for the flying flagship of the Army's rebuilt electronic warfare force. Insiders call this cognitive electronic warfare ).

article thumbnail

Delta Electronics, a tech giants’ contractor, hit by Conti ransomware

Security Affairs

Delta Electronics, a Taiwanese contractor for multiple tech giants such as Apple, Dell, HP and Tesla, was hit by Conti ransomware. Taiwanese electronics manufacturing company Delta Electronics was hit by the Conti ransomware that took place this week.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LockBit ransomware strikes Foxconn Electronics of Mexico

CyberSecurity Insiders

Foxconn, an electronics manufacturer from Mexico, has released a press statement that it was hit by Lockbit ransomware in the last week of May and is recovering data through a business continuity plan.

article thumbnail

Details of a Computer Banking Scam

Schneier on Security

This is a longish video that describes a profitable computer banking scam that’s run out of call centers in places like India. And three, it’s an evolving tactic that gets around banks increasingly flagging blocking suspicious electronic transfers.

Banking 268
article thumbnail

Supply-Chain Attack against the Electron Development Platform

Schneier on Security

Electron is a cross-platform development system for many popular communications apps, including Skype, Slack, and WhatsApp. From a news article : At the BSides LV security conference on Tuesday, Pavel Tsakalidis demonstrated a tool he created called BEEMKA , a Python-based tool that allows someone to unpack Electron ASAR archive files and inject new code into Electron's JavaScript libraries and built-in Chrome browser extensions.

article thumbnail

NEW TECH: DigiCert Document Signing Manager leverages PKI to advance electronic signatures

The Last Watchdog

Most of us, by now, take electronic signatures for granted. Yet electronic signatures do have their security limitations. As digital transformation has quickened, it has become clear that electronic signatures are destined to become even more pervasively used to conduct business remotely. Signing can be done anywhere using any type of supported computing device. Related: Why PKI will endure as the Internet’s secure core.

article thumbnail

Maze ransomware operators claim to have breached LG Electronics

Security Affairs

Maze ransomware operators claims to have breached the South Korean multinational electronics company LG Electronics. Researchers at Cyble discovered a data leak of LG Electronics published by Maze ransomware operators. SecurityAffairs – LG Electronics, Maze ransomware).

article thumbnail

Hackers breach gaming giant Electronic Arts, steal game source code

Bleeping Computer

Hackers have breached the network of gaming giant Electronic Arts (EA) and claim to have stolen roughly 750 GB of data, including game source code and debug tools. [.].

article thumbnail

How to Dispose Outdated Electronics to Protect Your Identity

Identity IQ

How to Dispose Outdated Electronics to Protect Your Identity. The improper disposal of smartphones and computers is one of the most common ways for a nefarious character to access sensitive information that can lead to identity theft.

article thumbnail

Microsoft Defender falsely detects Win32/Hive.ZY in Google Chrome, Electron apps

Bleeping Computer

A bad Microsoft Defender signature update mistakenly detects Google Chrome, Microsoft Edge, Discord, and other Electron apps as 'Win32/Hive.ZY' ZY' each time the apps are opened in Windows. [.]. Microsoft Security

article thumbnail

Electronics retail giant MediaMarkt hit by ransomware attack

Bleeping Computer

Electronics retail giant MediaMarkt has suffered a ransomware attack causing IT systems to shut down and store operations to be disrupted in Netherlands and Germany. [.].

article thumbnail

RCE flaw in Electronic Arts Origin client exposes gamers to hack

Security Affairs

Electronic Arts (EA) has fixed a security issue in the Windows version of its gaming client Origin that allowed hackers to remotely execute code on an affected computer. Electronic Arts (EA) has addressed a vulnerability in the Windows version of its gaming client Origin that allowed hackers to remotely execute code on an affected computer. Electronic Arts already released a security patch for the remote code execution vulnerability.

article thumbnail

Computer giant Acer hit by $50 million ransomware attack

Bleeping Computer

The REvil ransomware operation claims to have stolen unencrypted data after hacking electronics and computer giant Acer. [.]. Security

article thumbnail

Softbank plans to charge electronic gadgets using 5G antennas

Bleeping Computer

Japanese tech giant SoftBank is planning to trial wireless charging of smartwatches and earbuds using power transmitted through 5G antennas. [.]. Technology

article thumbnail

More Attacks against Computer Automatic Update Systems

Schneier on Security

As in the ASUS case, the samples were using digitally signed binaries from three other Asian vendors: Electronics Extreme, authors of the zombie survival game called Infestation: Survivor Stories , Innovative Extremist, a company that provides Web and IT infrastructure services but also used to work in game development, Zepetto, the South Korean company that developed the video game Point Blank.

article thumbnail

Asteelflash electronics maker hit by REvil ransomware attack

Bleeping Computer

Asteelflash, a leading French electronics manufacturing services company, has suffered a cyberattack by the REvil ransomware gang who is demanding a $24 million ransom. [.].

article thumbnail

Syrian Electronic Army Members Indicted for Conspiracy

Dark Reading

Two men have been charged for their involvement in a plot to commit computer hacking as members of the Syrian Electronic Army

Hacking 49
article thumbnail

Meet the Computer Scientist Who Helped Push for Paper Ballots

Dark Reading

Security Pro File: Award-winning computer scientist and electronic voting expert Barbara Simons chats up her pioneering days in computer programming, paper-ballot backups, Internet voting, math, and sushi

article thumbnail

Security Vulnerability in ESS ExpressVote Touchscreen Voting Computer

Schneier on Security

Of course the ESS ExpressVote voting computer will have lots of security vulnerabilities. It's a computer, and computers have lots of vulnerabilities. I am continuously amazed by how bad electronic voting machines are. Yes, they're computers. But they also seem to be designed by people who don't understand computer (or any) security

article thumbnail

New Rules Announced for Border Inspection of Electronic Devices

Threatpost

Cloud Security Cryptography Government Mobile Security Privacy ACLU cameras computers digital privacy digital search Electronic Frontier Foundation Encryption passcodes phones reasonable suspicion tablets U.S. The U.S. Customs and Border Patrol announced new restrictions on when agents can copy data from digital devices at border crossing points.

article thumbnail

Missouri Governor Vows to Prosecute St. Louis Post-Dispatch for Reporting Security Vulnerability

Krebs on Security

“A hacker is someone who subverts computer security with malicious or criminal intent,” the attorney Joe Martineau said. ” Aaron Mackey is a senior staff attorney at the Electronic Frontier Foundation (EFF), a non-profit digital rights group based in San Francisco.

article thumbnail

CryptoAgility to take advantage of Quantum Computing

Thales Cloud Protection & Licensing

CryptoAgility to take advantage of Quantum Computing. What is quantum computing and what changes will it bring? You’d probably do the computation a few times, supplemented by further checking using a classical computer, to make sure you arrive at the same result).

article thumbnail

Magecart cybercrime group stole customers’ credit cards from Newegg electronics retailer

Security Affairs

Magecart hackers have stolen customers’ credit card data from the computer hardware and consumer electronics retailer Newegg. The Magecart cybercrime group is back, this time the hackers have stolen customers’ credit card data from the computer hardware and consumer electronics retailer Newegg. behind the Ticketmaster and British Airways data breaches has now victimized popular computer hardware and consumer electronics retailer Newegg.

article thumbnail

Better Cloud Services: Tech giant Google Unveils Compute Optimized Virtual Machines (VMs) Powered by AMD EPYC Processors

Hacker Combat

However, the term Instance is favored in cloud computing, although many people still use Instance and server to mean the same. Cloud service consumers shall witness the increased performance and compute power for HPC (High-performance), memory-intensive workloads.

article thumbnail

What Counts as “Good Faith Security Research?”

Krebs on Security

Department of Justice (DOJ) recently revised its policy on charging violations of the Computer Fraud and Abuse Act (CFAA), a 1986 law that remains the primary statute by which federal prosecutors pursue cybercrime cases. The U.S.

article thumbnail

Researchers found one-click exploits in Discord and Teams

Malwarebytes

A group of security researchers have discovered a series of vulnerabilities in Electron, the software underlying popular apps like Discord, Microsoft Teams, and many others, used by tens of millions of people all over the world.

article thumbnail

SEEQC’s Statement in Support of President Biden’s Executive Order and National Security Memorandum on Quantum Computing

CyberSecurity Insiders

–( BUSINESS WIRE )– SEEQC , the digital quantum computing company, today released a statement announcing its strong support for an Executive Order and National Security Memorandum signed by President Biden on May 4, 2022 that both address quantum computing. ELMSFORD, N.Y.–(

article thumbnail

BedRock Systems and U.S. Army Combat Capabilities Development Command Aviation & Missile Center to Demonstrate Trusted Computing Base Integration Framework

CyberSecurity Insiders

SAN FRANCISCO–( BUSINESS WIRE )– BedRock Systems , the leading software company delivering an unbreakable foundation for secured computing from edge to cloud, today announced the collaboration with U.S.

article thumbnail

Top 5 Cyber Attack news headlines trending on Google

CyberSecurity Insiders

As Singla was charged with 17 counts of causing damage to computer networks with full intention, he is likely to face imprisonment for 10 years and 3 million penalties. News Google Kaspersky McDonald's APT41 Cyberattack News Today Securolytics Electronic Arts

article thumbnail

REvil ransomware says they hit Acer, Acer reports "abnormal situations"

Bleeping Computer

The REvil ransomware operation claims to have stolen unencrypted data after hacking electronics and computer giant Acer. [.]. Security

article thumbnail

Smashing Security podcast #232: Zoomolympics and language matters

Graham Cluley

Video gaming giant Electronic Arts suffers a hack following slack security, the Japanese Olympics are proving unpopular with everyone apart from cybercriminals, and le coq est mort. Data loss Podcast Coq Coronavirus data breach Electronic Arts Japan Olympic Games Smashing Security video game

article thumbnail

The Race is On! Crypto Agility vs Quantum Computing. Who is ahead?

Thales Cloud Protection & Licensing

Preparing for Data Security in the Quantum Computing Era. Each passing day brings the world closer to the exciting reality of powerful quantum computing. Weather prediction, air traffic control, urban planning, defense strategies, medical research and so much more will be affected by the new era of computing power in ways we can’t even yet predict. Quantum computing is a threat to public key infrastructure and security systems that rely on it.

article thumbnail

Crimeware and financial cyberthreats in 2023

SecureList

Remote workers using corporate computers for entertainment purposes, such as online games, continue to pose financial threats organizations. A look back on the year 2022 and what to expect in 2023.

article thumbnail

Malware infiltrates Microsoft Store via clones of popular games

Bleeping Computer

A malware named Electron Bot has found its way into Microsoft's Official Store through clones of popular games such as Subway Surfer and Temple Run, leading to the infection of 5,000 computers in Sweden, Israel, Spain, and Bermuda. [.].

article thumbnail

Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code

Security Boulevard

But the leaked chats indicate this mercenary activity was of little interest to the tyrannical teenage leader of LAPSUS$, whose obsession with stealing and leaking proprietary computer source code from the world’s largest tech companies ultimately led to the group’s undoing.

article thumbnail

Hackers leak 190GB of alleged Samsung data, source code

Bleeping Computer

The Lapsus$ data extortion group leaked today a huge collection of confidential data they claim to be from Samsung Electronics, the South Korean giant consumer electronics company. [.].

83
article thumbnail

Samsung discloses data breach after July hack

Bleeping Computer

Electronics giant Samsung has confirmed a new data breach today after some of its U.S. systems were hacked to steal customer data. [.]. Security

article thumbnail

REvil ransomware gang recommends that Apple buy back its data stolen in Quanta hack

Security Affairs

REvil ransomware gang is attempting to extort Apple ahead of the Apple Spring Loaded event threatening to sell stolen blueprints belonging to the IT giant that were stolen from Quanta Computer. Quanta Computer is a Taiwan-based manufacturer of notebook computers and other electronic hardware.

article thumbnail

Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code

Krebs on Security

But the leaked chats indicate this mercenary activity was of little interest to the tyrannical teenage leader of LAPSUS$, whose obsession with stealing and leaking proprietary computer source code from the world’s largest tech companies ultimately led to the group’s undoing.

Mobile 271
article thumbnail

Keysight’s Automotive Cybersecurity Test System Selected by Eastern Michigan University’s School of Information Security & Applied Computing

CyberSecurity Insiders

NYSE: KEYS), a leading technology company that delivers advanced design and validation solutions to help accelerate innovation to connect and secure the world, and Eastern Michigan University’s (EMU) School of Information Security & Applied Computing, announced that EMU has selected Keysight’s Automotive Cybersecurity Penetration Test System to support the next generation of cybersecurity engineers and researchers studying at the EMU GameAbove College of Engineering and Technology.

article thumbnail

Cyberthreats to financial organizations in 2022

SecureList

Remote workers using corporate computers for entertainment purposes, such as online games, continue to pose financial threats to organizations. First of all, we are going to analyze the forecasts we made at the end of 2020 and see how accurate they were.

article thumbnail

Black Friday 2021: How to Have a Scam-Free Shopping Day

SecureList

Use a reliable security solution, such as Kaspersky Security Cloud , that identifies malicious attachments and blocks phishing sites — on both your computer and mobile device. Fact 1: cybercriminals love to exploit big holidays for personal gain.

article thumbnail

Taiwanese Apple and Tesla contractor hit by Conti ransomware

Bleeping Computer

Delta Electronics, a Taiwanese electronics company and a provider for Apple, Tesla, HP, and Dell, disclosed that it was the victim of a cyberattack discovered on Friday morning. [.].