article thumbnail

Agencies Warn of Pro-Russia Hackers Targeting OT Control Systems

SecureWorld News

and allied cybersecurity agencies are sounding the alarm over an ongoing campaign by pro-Russia hacktivist groups to target and compromise operational technology (OT) systems across critical infrastructure sectors in North America and Europe. Practice and maintain the ability to operate systems manually [CPG 5.A]. Multiple U.S.

System 79
article thumbnail

University of Michigan Cyber Incident Causes Internet Outage

SecureWorld News

The University of Michigan experienced an internet outage on August 27th that affected students, faculty, and staff across all three campuses just as the fall semester was kicking off. The outage affected access to a variety of university systems, including email, Canvas, and Wolverine Access. and lasted for several hours.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

India’s Supreme Court hears challenge to biometric authentication system

Network World

Two lawsuits being heard this week before India’s Supreme Court question a requirement imposed by the government that individuals should quote a biometrics-based authentication number when filing their tax returns. To read this article in full or to leave a comment, please click here

article thumbnail

The Self-Sovereign Internet

Phil Windley

I spoke on DIDComm and the Self-Sovereign Internet. The foundation of the self-sovereign internet is built on autonomic identifiers. I'm going to speak about Peer DIDs here, but KERI and other systems provide autonomic identifiers that serve just as well. Alice) who, by virtue of knowing the authentication factors (e.g.

article thumbnail

Why Do Spammers Love The Internet Of Things?

CTOvision

The Internet of Things is the marketing term for those devices. Most aren’t the laptops, tablets, and phones we think of as using the internet: they’re appliances like routers, fridges, cameras, and a million others, each of which is equipped with storage space, an operating system, and a connection to the internet.

Internet 150
article thumbnail

Hacker Group Claims Extraordinary Access to User Authentication Firm Okta

Gizmodo

Hacker group LAPSUS$ posted images on its Telegram channel overnight claiming it achieved administrator access to Okta, a user authentication and data management company. And if that’s true, it’s potentially bad for a number of large firms that use Okta services. Read more.

article thumbnail

DIDComm and the Self-Sovereign Internet

Phil Windley

Because of its general nature and inherent support for self-sovereign relationships, DIDComm provides a basis for a self-sovereign internet much more private, enabling, and flexible than the one we've built using Web 2.0 Agents are rule-executing software systems that exchange DIDComm messages. technologies.