Remove Computer and Electronics Remove Security Remove Video
article thumbnail

Details of a Computer Banking Scam

Schneier on Security

This is a longish video that describes a profitable computer banking scam that’s run out of call centers in places like India. The scammers convince the victims to give them remote access to their computers, and then that they’ve mistyped a dollar amount and have received a large refund that they didn’t deserve.

article thumbnail

Security Vulnerability in ESS ExpressVote Touchscreen Voting Computer

Schneier on Security

Of course the ESS ExpressVote voting computer will have lots of security vulnerabilities. It's a computer, and computers have lots of vulnerabilities. This particular vulnerability is particularly interesting because it's the result of a security mistake in the design process. Yes, they're computers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Digital vs Electronic Records: Understanding the Distinction

Armstrong Archives

The terms “digital” and “electronic” are often used interchangeably these days, including when it comes to talking about records management. Digital Vs. Electronic Records – FAQs and Differences To understand the differences between digital and electronic records, let’s define each of them and look at the uses of each.

article thumbnail

Robot Dog Internet Jammer

Schneier on Security

The Border Security Expo is open only to law enforcement and defense contractors. The Border Security Expo is open only to law enforcement and defense contractors. ” Slashdot thread. . ” Slashdot thread.

article thumbnail

Acer suffered the second security breach in a few months

Security Affairs

Taiwanese electronics technology giant Acer discloses a security breach suffered by its after-sales service systems in India after an isolated attack. Bad news for the Taiwanese electronics technology giant Acer, it disclosed a second security breach this year. SecurityAffairs – hacking, cyber security).

article thumbnail

More Attacks against Computer Automatic Update Systems

Schneier on Security

Also, our experts identified three additional victims: another video gaming company, a conglomerate holding company and a pharmaceutical company, all in South Korea. Me on supply chain security. For now we cannot share additional details about those victims, because we are in the process of notifying them about the attack.

article thumbnail

Ex CIA employee Joshua Adam Schulte sentenced to 40 years in prison

Security Affairs

Olsen, the Assistant Attorney General for National Security; and James Smith, the Assistant Director in Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced today that JOSHUA ADAM SCHULTE was sentenced to 40 years in prison by U.S. District Judge Jesse M.