Remove 2001 Remove Government Remove Security
article thumbnail

Estonia sues Gemalto for 152M euros over flaws in citizen ID cards issued by the company

Security Affairs

Estonian sues Gemalto for 152 million euros following the security flaws in the citizen ID cards issued by the company that caused their recall in 2017. Estonian authorities sue the security firm Gemalto for 152 million euros following the security flaws in the citizen ID cards issued by the company that caused their recall in 2017.

article thumbnail

Lockbit ransomware gang claims to have breached the Italian Revenue Agency

Security Affairs

The ransomware gang Lockbit claims to have hacked the Italian Revenue Agency (Agenzia delle Entrate) and added the government agency to the list of victims reported on its dark web leak site. It has its own statute and specific regulations governing administration and accounting. 300 of 1999. The new version 3.0 Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Vladimir Putin ‘s computers still run Windows XP, Media reports

Security Affairs

The news is curious and it probably has little real if not the fact that Vladimir Putin is not a super cyber security expert, although he knows its importance very well. Nowadays it is a suicide to use a computer running Windows XP because the OS doesn’t receive security updates and it is quite easy to find working exploits online.

article thumbnail

UN approves Russia-Cina sponsored resolution on new cybercrime convention

Security Affairs

Many governments worldwide persecute their internal oppositions charging them with criminal activities and use strict online surveillance to track them. The surveillance software developed by NSO Group was used by government organizations worldwide to spy on human rights groups , activists, journalists, lawyers, and dissidents.

article thumbnail

GUEST ESSAY: ‘Tis the season — to take proactive measures to improve data governance

The Last Watchdog

Every large brand is acutely aware that securing its data is of foremost importance in today’s world, and that by protecting data you are protecting the brand’s equity. While breaches may be inevitable, data leaks are avoidable and steps can be taken to prepare and strengthen a brand’s crucial security efforts. Preventing breaches.

article thumbnail

The strengths and weaknesses of different VPN protocols

Security Affairs

Pulling back the curtain, a VPN runs on various VPN protocols that govern the way a VPN client communicates with a VPN server. The protocol, though not perfect, allowed people to work from home through a secure internet connection. Does not support Perfect Forward Secrecy One of the least secure protocols Firewalls can block PPTP.

article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

But this also opens up a sprawling array of fresh security gaps that threat actors are proactively probing and exploiting. There’s a glut of innovative security solutions, to be sure, and no shortage of security frameworks designed to help companies mitigate cyber risks. However, this is overkill for many, if not most, SMBs.

Security 201