GPS spoofing, jamming and real-world threats | Tech Talk Ep 1, Pt 3

The panelists talk about GPS spoofing, and rumors about hacking as a factor in recent ship collisions. Plus, they sort out the difference between GPS spoofing and GPS jamming.
RSS Reader for Computer Security Articles

The panelists talk about GPS spoofing, and rumors about hacking as a factor in recent ship collisions. Plus, they sort out the difference between GPS spoofing and GPS jamming.

Ahead of the latest Apple smartwatch rollout, the panelists debate whether vendors made a mistake introducing smartwatches to consumers first, rather than pursuing the enterprise market.

The panelists talk about their pricing predictions for the newest iPhone. Will this be the Apple device that gives consumers sticker shock?

Credit to Author: Evan Schuman| Date: Tue, 05 Sep 2017 14:13:00 -0700
IT is seeing a very dangerous collision of two trends: BYOD and mobile apps. IT’s job is, among other things, to protect corporate data, a portion of the company’s intellectual property. And yet easily downloaded consumer apps are threatening that data security by sharing their sensitive data with mobile apps that have almost infinite capabilities.
Consider this reference from a scary story courtesy of The Intercept: “When launched for the first time, [popular app Sarahah] immediately harvests and uploads all phone numbers and email addresses in your address book. Although Sarahah does in some cases ask for permission to access contacts, it does not disclose that it uploads such data, nor does it seem to make any functional use of the information.”
To read this article in full or to leave a comment, please click here
Credit to Author: Sharky| Date: Wed, 06 Sep 2017 03:00:00 -0700
Word comes down from on high that this company will be installing video surveillance systems in dozens of its remote warehouses, reports an IT manager pilot fish on the inside.
“The director of operations decided we needed video surveillance in order to monitor the warehouses in real time,” fish says. “The ability to review video at our corporate office was key to the project.
“Then he signed a contract to start installing these systems with a national vendor without first consulting with IT.”
That results in a series of unexpected phone calls to fish from installers, who need him to drop everything and help them by configuring firewalls, providing them with static IP addresses and then trying to test their systems.
To read this article in full or to leave a comment, please click here

Credit to Author: Lucas Mearian| Date: Tue, 05 Sep 2017 21:04:00 -0700
Enterprise mobility management (EMM) software vendor MobileIron today announced its Apple release, aimed at the growing need for enterprises to provide IT managers with more robust management and security features for Macs.
While Windows and even Chrome-based laptops are already included in EMM consoles, macOS hardware has traditionally been treated as an outlier in the office, according to Nick McGuire, vice president of Enterprise Research at CCS Insight.
While MobileIron’s software suite already supported macOS for basic functions, including device configuration, millennials entering the workforce favor Apple’s line of laptops – driving the need for a unified endpoint management strategy that includes security and bulk licensing, according to Ojas Rege, MobileIron’s chief strategy officer.
To read this article in full or to leave a comment, please click here

Credit to Author: Woody Leonhard| Date: Tue, 05 Sep 2017 05:37:00 -0700
August was a banner month for Windows and Office customers. If I counted correctly, we saw patches on 14 different days last month. The current list of outstanding problems with those patches weighs heavily on my mind, but with the first September non-security Office patches due today, and the September security patches due in a week, it’s time for you to get the August patches out of the way.
To read this article in full or to leave a comment, please click here

Our panel looks at whether smartwatch makers blew it by not focusing on the enterprise, why intent-based networking is the next big thing, whether GPS spoofing is real, and how high is too high when it comes to iPhone prices.