The US Has a Bomb-Sniffing Dog Shortage

Credit to Author: Lily Hay Newman| Date: Tue, 22 Nov 2022 22:34:51 +0000
Finding high-quality detection canines is hard enough—and the pandemic only dug a deeper hole.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Lily Hay Newman| Date: Tue, 22 Nov 2022 22:34:51 +0000
Finding high-quality detection canines is hard enough—and the pandemic only dug a deeper hole.
Read More
Credit to Author: Andy Greenberg| Date: Tue, 22 Nov 2022 11:00:00 +0000
After months of meticulous planning, investigators finally move in to catch AlphaBay’s mastermind red-handed. Then the case takes a tragic turn.
Read More
Credit to Author: Justin Ling| Date: Mon, 21 Nov 2022 20:51:57 +0000
Lawmakers are growing concerned about a flood of data-hungry cars from China taking over American streets.
Read MoreCredit to Author: Katie McCafferty| Date: Tue, 22 Nov 2022 17:00:00 +0000
As vulnerabilities in network components, architecture files, and developer tools have become an increasingly popular attack vector to leverage access into secure networks and devices, Microsoft identified such a vulnerable component and found evidence of a supply chain risk that might affect millions of organizations and devices.
The post Vulnerable SDK components lead to supply chain risks in IoT and OT environments appeared first on Microsoft Security Blog.
Read More
Credit to Author: Lorenzo Franceschi-Bicchierai| Date: Mon, 21 Nov 2022 12:00:00 +0000
A 500-page document reviewed by WIRED shows that Corellium engaged with several controversial companies, including spyware maker NSO Group.
Read More
Credit to Author: Lily Hay Newman| Date: Fri, 18 Nov 2022 01:41:44 +0000
Elon Musk laid off half the staff, and mass resignations seem likely. If nobody’s there to protect the fort, what’s the worst that could happen?
Read More
Jamf officially completed its acquisition of Zecops this week. Why is this important and what might it mean to enterprise mobile security? Potentially, a lot.
To get an answer to the question, think about how security has evolved. as the proliferation of mobile devices has made traditional security protections even less effective than they used to be.

There are many reasons any business with a connected fleet of tech products needs robust security policies in place. But the need to protect the enterprise against vulnerabilities inherited with third-party software must be among the biggest motivators. While I shouldn’t need to convince Computerworld readers to keep things locked down, I want to reprise two recent reports to reinforce the warning.
Elastic Security Labs (via 9to5Mac) recently estimated that half of all macOS malware is installed as a result of poor management of the MacKeeper utility app. The report said almost 50% of Mac malware arrives through its installation.