Remove 2014 Remove Information Security Remove Manufacturing Remove Meeting
article thumbnail

NSA publishes guidance on UEFI Secure Boot customization

Security Affairs

Over the years, experts observed several attacks employing rootkits that were specifically developed to target the firmware to achieve persistence and bypassing security solutions. The Secure Boot mechanism allows the execution of only software that is trusted by the Original Equipment Manufacturer (OEM). . Pierluigi Paganini.

Security 129
article thumbnail

France will not ban Huawei from its upcoming 5G networks

Security Affairs

However, Macron said that France will favor European providers of 5G technology due to security concerns. The Macron’s announcement comes after the meeting, held in Paris last week, with visiting Chinese Foreign Minister Wang Yi. In July, the French information security agency ANSSI announced that Huawei Technologies Ltd.

IT 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Australian beverages firm Lion hit for the second time in a few days by a cyber attack

Security Affairs

At the time of the first attack, the security breach caused the disruption of manufacturing processes and customer service. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->. ” The Sydney Morning Herald reported.

article thumbnail

Russian military plans to replace Windows with Astra Linux

Security Affairs

Astra Linux is a Debian-based distro developed in Russia by the Scientific/Manufacturing Enterprise Rusbitech RusBITech about ten years ago. “Astra Linux is a RussianLinux -based computer operating system developed to meet the needs of the Russian army, other armed forces and intelligence agencies. Pierluigi Paganini.

Military 111
article thumbnail

2019 end-of-year review part 1: January to June

IT Governance

IT Governance is closing out the year by rounding up 2019’s biggest information security stories. There are plenty of cases where the extent of a breach isn’t known until the information resurfaces years later (as you might recall from Yahoo’s security meltdown ).

article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

What if you are a woman in information security? I’m Robert Vamosi, and in the episode I’m talking about diversity, equality, and inclusion in information security with one of the industries' most successful examples. Around 2014 Chenxi authored a blog , which was very important for the industry in my opinion.

Cloud 40
article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

Microsoft, for example, stopped patching Windows XP for security vulnerabilities in 2014. I’m Robert Vamosi and this episode about best practices in information security, and how critical life services, in particular, remain at risk today -- in the middle of a global pandemic. First, this is a supply chain issue.

IT 52