article thumbnail

Ask Fitis, the Bear: Real Crooks Sign Their Malware

Krebs on Security

ru in 2008. su from 2008. su from 2008. Fitis’s real-life identity was exposed in 2010 after two of the biggest sponsors of pharmaceutical spam went to war with each other, and large volumes of internal documents, emails and chat records seized from both spam empires were leaked to this author. account on Carder[.]su

article thumbnail

French Data Protection Authority Issues 2008 Annual Activity Report

Hunton Privacy

The CNIL is increasingly engaged in assisting companies to ensure individuals’ privacy rights as part of diverse technology projects like Streetview, Bluetooth advertising and implementation of an electronic pharmaceutical database.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

STEPS FORWARD: Math geniuses strive to make a pivotal advance — by obfuscating software code

The Last Watchdog

It wasn’t until 2008, after decades of theorizing, that an IBM researcher name Craig Gentry came up with a viable mathematical solution to do this. Homomorphic encryption is the next step beyond encrypting data kept in storage (data at rest) as well as encrypting data as it is being transported from one server to another (data in transit.)

article thumbnail

THE TRANSFORMATION OF THE RUSSIAN MARKET

Info Source

That is why areas such as food, agriculture, health and pharmaceuticals are excluded from the restrictive measures imposed. For example, pharmaceutical companies such as Roche and Novartis have no intention of leaving Russia since medicines are exempt from sanctions on humanitarian grounds.

article thumbnail

This is the old ChiefTech blog.: Janssen-Cilag Wiki Case Study

ChiefTech

Tuesday, 21 August 2007 Janssen-Cilag Wiki Case Study Here is a great Aussie wiki case study shared by Nathan Wallace from Janssen-Cilag , a pharmaceutical subsidiary of Johnson & Johnson. Please seek advice for specific circumstances. Further Reading Articles and Papers Book Reviews and More Intranet 2.0

article thumbnail

GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce

The Last Watchdog

It was undisputedly the fastest spreading, most destructive worm that crippled hospitals, multinational companies and pharmaceutical giants globally by irreversibly encrypting systems’ master boot records. Conficker , or Downadup, is a fast-propagating malware discovered in November 2008. NotPetya shook the entire world in June 2017.

article thumbnail

Court Rules “No Harm, No Foul” in Allowing Clawback After Protective Order Deadline: eDiscovery Case Law

eDiscovery Daily

In this products liability case against pharmaceutical manufacturers, the plaintiffs’ used an internal BMS email and PowerPoint during the January 31, 2018, deposition of BMS’ executive director for Abilify marketing from February 2007-December 2008. Case Background.