Remove 2008 Remove Government Remove Video
article thumbnail

AI and the Indian Election

Schneier on Security

In January, Muthuvel Karunanidhi, former chief minister of the southern state of Tamil Nadu for two decades, appeared via video at his party’s youth wing conference. The video grafted Modi’s digital likeness onto the lead singer and cloned his voice with reworked lyrics critiquing his close ties to Indian business tycoons.

article thumbnail

Stark Industries Solutions: An Iron Hammer in the Cloud

Krebs on Security

Two weeks before Russia invaded Ukraine in February 2022, a large, mysterious new Internet hosting firm called Stark Industries Solutions materialized and quickly became the epicenter of massive distributed denial-of-service (DDoS) attacks on government and commercial targets in Ukraine and Europe. ” DomainTools.com finds Ivan V.

Cloud 282
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cisco to pay $8.6 million fine for selling flawed surveillance technology to the US Gov

Security Affairs

million to settle a legal dispute for selling vulnerable software to the US government. Back in 2008, a whistle-blower identifies a vulnerability in Cisco video surveillance software, but the tech giant continued to sell the software to US agencies until July 2013. Cisco is going to pay $8.6 ” reported The New York Times.

Sales 104
article thumbnail

Ross Anderson

Schneier on Security

Of course it was before 2008, when we created the Security and Human Behavior workshop. Also note his fifteen-lecture video series on that same page. He didn’t suffer fools in either government or the corporate world. Ross Anderson unexpectedly passed away Thursday night in, I believe, his home in Cambridge.

Paper 128
article thumbnail

Documentation Theory for Information Governance

ARMA International

iv] Further, “the practices of government [and other public and private institutions] become formal or official to the extent that they are documented.” [v] This article aims to consider what a documentary focus can offer to the practices and understandings of information governance.

article thumbnail

Episode 233: Unpacking Log4Shell’s Un-coordinated Disclosure Chaos

The Security Ledger

Back in 2008, the late, great security researcher Dan Kaminsky discovered a serious security flaw in a ubiquitous Internet technology: the domain name system, or DNS. Also: if you enjoy this podcast, consider signing up to receive it in your email.

article thumbnail

Time for Australian government to wake up to mobile?

ChiefTech

Less than a quarter of the Australian Government's regular websites can be considered smartphone or mobile-friendly, according to a survey conducted by iTnews. A survey by the ITNews concludes that government Websites fail mobile access tests. Now, there are some very good examples of government in Australia using mobile.