A Mugshots.com Indictment, Lost Grenades, and More Security News This Week
Credit to Author: Lily Hay Newman| Date: Sat, 19 May 2018 13:00:00 +0000
Critical Cisco bugs, lost grenades, and more of the week’s top security news.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Lily Hay Newman| Date: Sat, 19 May 2018 13:00:00 +0000
Critical Cisco bugs, lost grenades, and more of the week’s top security news.
Read MoreCredit to Author: Brian Barrett| Date: Sat, 19 May 2018 11:00:00 +0000
The failures of Securus and LocationSmart to secure location data are the failures of an entire industry.
Read MoreCredit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 18 May 2018 13:00:40 +0000
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Chili’s parent company – Brinker International – announced that consumer credit and debit card information had been compromised at some locations. In addition, Trend Micro helped the…
The post This Week in Security News: Hackers and Cyber Attackers appeared first on .
Read MoreCredit to Author: Mike Elgan| Date: Sat, 19 May 2018 03:00:00 -0700
Have you heard about those special bags, cases and wallets that protect your electronics from hack attacks?
It’s a signal-blocking container, basically a tinfoil hat for your gadget.
Tinfoil hats are associated with conspiracy theorists concerned about secret government mind-control programs. But when it comes to your wireless gadgets, they really are out to get you.
For example: It’s not a conspiracy theory to believe that companies you’ve never heard of are tracking your location.
In the past two weeks, we’ve learned that a company called Securus Technologies sold the real-time location data of millions of people. It got this data from another company called LocationSmart, which itself was buying the data from AT&T, Sprint, T-Mobile and Verizon.
Cryptocurrency such as Bitcoin has garnered most of the media coverage and hype to date, but keep your eye on blockchain – this new technology is poised to change IT in much the same way open-source software did a quarter century ago.
Credit to Author: BrianKrebs| Date: Fri, 18 May 2018 18:35:24 +0000
T-Mobile is investigating a retail store employee who allegedly made unauthorized changes to a subscriber’s account in an elaborate scheme to steal the customer’s three-letter Instagram username. The modifications, which could have let the rogue employee empty bank accounts associated with the targeted T-Mobile subscriber, were made even though the victim customer already had taken steps recommended by the mobile carrier to help minimize the risks of account takeover. Here’s what happened, and some tips on how you can protect yourself from a similar fate.
Read MoreCredit to Author: Abby Gabriel| Date: Fri, 18 May 2018 16:15:00 +0000
According to a recent IDC research report, technology spending is shifting from Information Technology (IT) organizations to the line of business (LOB). In fact, IDC is forecasting that LOB technology… Read more »
The post Digital Transformation Fueling an Accelerated Shift in Technology Budgets from IT to LOB appeared first on Schneider Electric Blog.
Read MoreCredit to Author: Atin Chhabra| Date: Fri, 18 May 2018 10:46:23 +0000
The distribution of electricity across a neighborhood has become an underlying need that doesn’t need to be mentioned in today’s day-and-age, and the reason for this is fairly obvious –… Read more »
The post Transforming Electrical Power Systems with Smart Electrical Components appeared first on Schneider Electric Blog.
Read More