Google Is Helping Design an Open Source, Ultra-Secure Chip

Credit to Author: Lily Hay Newman| Date: Tue, 05 Nov 2019 14:00:00 +0000
OpenTitan is a so-called secure enclave based on open source that could shake up hardware security.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Lily Hay Newman| Date: Tue, 05 Nov 2019 14:00:00 +0000
OpenTitan is a so-called secure enclave based on open source that could shake up hardware security.
Read More
Credit to Author: Andy Greenberg| Date: Tue, 05 Nov 2019 13:00:00 +0000
For three years, WIRED has tracked the elite and shadowy Russian vanguard of cyberwar.
Read MoreCredit to Author: Trend Micro| Date: Tue, 05 Nov 2019 15:45:47 +0000
We recently became aware of a security incident that resulted in the unauthorized disclosure of some personal data of an isolated number of customers of our consumer product. We immediately started investigating the situation and found that this was the result of a malicious insider threat. The suspect was a Trend Micro employee who improperly accessed the data with a clear criminal intent. We immediately began taking the actions necessary to…
The post Trend Micro Discloses Insider Threat Impacting some of its Consumer Customers appeared first on .
Read More
Credit to Author: Andy Greenberg| Date: Mon, 04 Nov 2019 18:00:00 +0000
By pointing lasers tuned to a precise frequency at a smart assistant, researchers could force it to unlock cars, open garage doors, and more.
Read More
Credit to Author: Lucas Mearian| Date: Mon, 04 Nov 2019 03:00:00 -0800
While one in three large enterprises has a chief mobility officer (CMO), according to one survey, that role is now largely duplicative and unnecessary – and creating it can hit a company’s bottom line.
Management consultancy Janco Associates, which lists job descriptions and conducts bi-annual salary surveys, last week updated its description of a Chief Mobility Officer (CMO) to include privacy compliance policies in light of the California Consumer Privacy Act (CaCPA), which goes into effect in January.
“As the use of personal mobile devices, social networking, and compliance requirements expand, organizations are faced with a dilemma. How can they balance privacy compliance mandates like CaCPA with business continuity, security, and operational needs in an ever more complex operating environment?” said Victor Janulaitis, CEO of Janco Associates.

Credit to Author: Lily Hay Newman| Date: Sun, 03 Nov 2019 12:00:00 +0000
More companies than ever are offering low-cost security services for election bureaus and campaigns. It’s still not clear how much they’ll actually help.
Read More
Credit to Author: Andy Greenberg| Date: Sun, 03 Nov 2019 00:14:55 +0000
After months of warnings, the first successful attack using Microsoft’s BlueKeep vulnerability has arrived—but isn’t nearly as bad as it could have been.
Read More
Credit to Author: Andy Greenberg, Lily Hay Newman| Date: Sat, 02 Nov 2019 13:00:00 +0000
NSO Group exploits, *Counter-Strike* money laundering, and a Pentagon scam are among the week’s top security news.
Read More