Remove 2013 Remove Architecture Remove Surveillance
article thumbnail

Cisco to pay $8.6 million fine for selling flawed surveillance technology to the US Gov

Security Affairs

Back in 2008, a whistle-blower identifies a vulnerability in Cisco video surveillance software, but the tech giant continued to sell the software to US agencies until July 2013. Cisco finally addressed the flaws in 2013 and stopped selling Cisco Video Surveillance Manager (VSM) in 2014. Cisco is going to pay $8.6

article thumbnail

The War in Technology: A Digital Iron Curtain Goes Up

SecureWorld News

And it might have been prepared for this moment, years ago, as a surveillance tool. It's easy to put surveillance on telecoms if you have a foothold," Kubecka said. In 2013, the Russian security agency, FSB, demanded that I provide them the private data of the Ukrainian users of VK who were protesting against a pro-Russian President.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

APT trends report Q1 2022

SecureList

While we were unable to obtain the same results by analyzing the CERT-UA samples, we subsequently identified a different WhiteBlackCrypt sample matching the WhisperKill architecture and sharing similar code. Janicab was first introduced in 2013 as malware able to run on macOS and Windows operating systems.

Malware 137
article thumbnail

FinSpy: unseen findings

SecureList

FinSpy, also known as FinFisher or Wingbird , is an infamous surveillance toolset. The 32-bit Trojan Loader, which is launched regardless of the victim machine architecture, checks if it is running on a 64-bit system. This script determines the victim machine architecture. The Trojan Loader. eq 0 ];then rm -rf "$0" fi exit 0.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Those have much less security much many fewer capabilities and architectural stability built into them, but again it's, it's the lowest common denominator it's like web 1.0

IoT 52
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Those have much less security much many fewer capabilities and architectural stability built into them, but again it's, it's the lowest common denominator it's like web 1.0

IoT 52