article thumbnail

Estonia sues Gemalto for 152M euros over flaws in citizen ID cards issued by the company

Security Affairs

The decision comes after IT security researchers recently discovered a vulnerability in the chips used in the cards manufactured by the Gemalto-owned company Trub AG that open the doors to malware-based attacks. The Estonian electronic ID cards have been manufactured by the Swiss company Trub AG and its successor Gemalto AG since 2001.

article thumbnail

Episode 229: BugCrowd’s Casey Ellis On What’s Hot In Bug Hunting

The Security Ledger

Programs like iDefense Labs Vulnerability Contributor Program (VCP) (launched in 2002) and TippingPoint’s Zero Day Initiative (2005) were accused -at the time- of incentivizing the work of criminals and bad actors. . In recent years, even “old economy” industrial and manufacturing firms like Ford, GM and John Deere got into the act.

IoT 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Webinar on the SAFETY Act and Cybersecurity: Protecting Your Reputation and Reducing Liability Risk

Hunton Privacy

In 2002, Congress enacted the Supporting Anti-Terrorism by Fostering Effective Technologies Act (“the SAFETY Act”) to limit the liabilities that energy, financial, manufacturing and other critical infrastructure companies face in the event of a serious cyber or physical security attack.

article thumbnail

States Attempt to Address Privacy Risks Associated with Digital Copiers and Electronic Waste

Hunton Privacy

The program must include convenient methods for consumers to return electronic waste to the manufacturer and instructions on how consumers can destroy data on the devices before recycling or disposing of them. These bills reflect an enhanced focus on the privacy risks associated with digital office equipment.

Privacy 40
article thumbnail

FTC Investigating Privacy Risks to Data Stored on Digital Copiers

Hunton Privacy

Congressman Markey had urged the FTC to investigate this issue after a CBS News exposé showed that almost every digital copier produced since 2002 stores on its hard drive images of documents that are “scanned, copied or emailed by the machine” – including documents with sensitive personal information.

Privacy 40
article thumbnail

Public cloud vs. private cloud vs. hybrid cloud: What’s the difference?

IBM Big Data Hub

Internet companies like Amazon led the charge with the introduction of Amazon Web Services (AWS) in 2002, which offered businesses cloud-based storage and computing services, and the launch of Elastic Compute Cloud (EC2) in 2006, which allowed users to rent virtual computers to run their own applications.

Cloud 98
article thumbnail

Sandboxing: Advanced Malware Analysis in 2021

eSecurity Planet

A number of computer manufacturers and cloud service providers have deployed sandboxes for regular use by clients. Sandboxes most often come in the form of a software application, though, hardware alternatives do exist. Methods for implementation include third-party software, virtual machines, embedded software, or browser plug-ins.