Now that the EU General Data Protection Regulation (GDPR) is upon us…what happens now? In this industry perspective, Steve Schlarman of RSA writes that GDPR compliance isn’t a one time affair – the requirements of the law are likely to be woven into the fabric of how businesses operate inside and outside the EU.
Podcast: Play in new window | DownloadSubscribe: Android | RSSIn this episode of The Security Ledger Podcast (#98): can sound waves be used to crash a hard drive? We’ll talk to one member of an international team of researchers who showed that, yes they can. And Fractional CISO Rob Black joins us to talk about Internet of Things security standards. With so many to choose from, will we ever see “one standard to rule them all”?
Teams from The University of Michigan and and Zhejian University in China have shown how acoustic attacks from off the shelf speakers can be used to crash magnetic hard disk drives, the latest example of physics-based attacks on common hardware.
The nation-backed hacker group behind the TRITON/TRISIS malware attack is increasing its nefarious activity, putting critical infrastructure systems in danger of future cyber attacks, according to Dragos Security.
Newly discovered malicious software dubbed VPNFilter has infected hundreds of thousands of routers and network attached storage (NAS) devices globally and could be used to steal sensitive data or wipe out (“brick”) the devices, the company said.