Month: May 2018

SecurityTrendMicro

This Week in Security News: Hackers and Cyber Attackers

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 18 May 2018 13:00:40 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Chili’s parent company – Brinker International – announced that consumer credit and debit card information had been compromised at some locations. In addition, Trend Micro helped the…

The post This Week in Security News: Hackers and Cyber Attackers appeared first on .

Read More
ComputerWorldIndependent

Easy mobile security the Faraday way

Credit to Author: Mike Elgan| Date: Sat, 19 May 2018 03:00:00 -0700

Have you heard about those special bags, cases and wallets that protect your electronics from hack attacks?

It’s a signal-blocking container, basically a tinfoil hat for your gadget.

Tinfoil hats are associated with conspiracy theorists concerned about secret government mind-control programs. But when it comes to your wireless gadgets, they really are out to get you.

For example: It’s not a conspiracy theory to believe that companies you’ve never heard of are tracking your location.

In the past two weeks, we’ve learned that a company called Securus Technologies sold the real-time location data of millions of people. It got this data from another company called LocationSmart, which itself was buying the data from AT&T, Sprint, T-Mobile and Verizon.

To read this article in full, please click here

Read More
IndependentKrebs

T-Mobile Employee Made Unauthorized ‘SIM Swap’ to Steal Instagram Account

Credit to Author: BrianKrebs| Date: Fri, 18 May 2018 18:35:24 +0000

T-Mobile is investigating a retail store employee who allegedly made unauthorized changes to a subscriber’s account in an elaborate scheme to steal the customer’s three-letter Instagram username. The modifications, which could have let the rogue employee empty bank accounts associated with the targeted T-Mobile subscriber, were made even though the victim customer already had taken steps recommended by the mobile carrier to help minimize the risks of account takeover. Here’s what happened, and some tips on how you can protect yourself from a similar fate.

Read More
ScadaICSSchneider

Digital Transformation Fueling an Accelerated Shift in Technology Budgets from IT to LOB

Credit to Author: Abby Gabriel| Date: Fri, 18 May 2018 16:15:00 +0000

According to a recent IDC research report, technology spending is shifting from Information Technology (IT) organizations to the line of business (LOB). In fact, IDC is forecasting that LOB technology… Read more »

The post Digital Transformation Fueling an Accelerated Shift in Technology Budgets from IT to LOB appeared first on Schneider Electric Blog.

Read More
ScadaICSSchneider

Transforming Electrical Power Systems with Smart Electrical Components

Credit to Author: Atin Chhabra| Date: Fri, 18 May 2018 10:46:23 +0000

The distribution of electricity across a neighborhood has become an underlying need that doesn’t need to be mentioned in today’s day-and-age, and the reason for this is fairly obvious –… Read more »

The post Transforming Electrical Power Systems with Smart Electrical Components appeared first on Schneider Electric Blog.

Read More