Remove 2013 Remove Risk Remove Technology
article thumbnail

FBI Raids Chinese Point-of-Sale Giant PAX Technology

Krebs on Security

federal investigators today raided the Florida offices of PAX Technology , a Chinese provider of point-of-sale devices used by millions of businesses and retailers globally. FBI agents entering PAX Technology offices in Jacksonville today. Headquartered in Shenzhen, China, PAX Technology Inc. organizations. Source: WOKV.com.

article thumbnail

Policy vs Technology

Schneier on Security

He didn't become a senator until 2013.) I teach cybersecurity policy and technology at the Harvard Kennedy School of Government. My most recent two books, Data and Goliath -- about surveillance -- and Click Here to Kill Everybody -- about IoT security -- are really about the policy implications of technology. They still are.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 Personal Finance Lessons for Technology Professionals

Troy Hunt

So here it is - 10 Personal Financial Lessons for Technology Professionals. For example, the ICT industry (Information, Communication, Technology) was the 5th highest paying with an average salary of $104,874 (dollars are Aussie, take off about 30% for USD). Intro: This Industry Rocks! Banking is below that. Medical even lower.

article thumbnail

Two NSA Algorithms Rejected by the ISO

Schneier on Security

These algorithms were both designed by the NSA and made public in 2013. The risk of using NSA-designed ciphers, of course, is that they include NSA-designed backdoors. It's like examining alien technology. They are optimized for small and low-cost processors like IoT devices. Personally, I doubt that they're backdoored.

IoT 196
article thumbnail

Credit Reporting Companies Put Customer Data at Risk

Adam Levin

An undergraduate student at Rochester Institute of Technology named Bill Demirkapi discovered the most recent security failure. Experian, 2013 – 2015: Hackers stole a trove of information from T-Mobile customers whose data had passed through Experian to check credit there and open a new account.

Risk 218
article thumbnail

U.S. Govt. Apps Bundled Russian Code With Ties to Mobile Malware Developer

Krebs on Security

But that story omitted an important historical detail about Pushwoosh: In 2013, one of its developers admitted to authoring the Pincer Trojan , malware designed to surreptitiously intercept and forward text messages from Android mobile devices. Pushwoosh says it is a U.S. ” GOV 311. ” FOREIGN ADTECH THREAT? ”

Mobile 283
article thumbnail

MY TAKE: Cyber attacks on industrial controls, operational technology have only just begun

The Last Watchdog

And the risks are multiplying as more digital devices become connected in insufficiently secured environments. Monitoring and management of many existing industrial control systems’ (ICS) embedded devices, like pumps, valves and turbines, are ancient in technological terms. Dismantling the silos.