GPS spoofing, jamming and real-world threats | Tech Talk Ep 1, Pt 3

The panelists talk about GPS spoofing, and rumors about hacking as a factor in recent ship collisions. Plus, they sort out the difference between GPS spoofing and GPS jamming.
RSS Reader for Computer Security Articles

The panelists talk about GPS spoofing, and rumors about hacking as a factor in recent ship collisions. Plus, they sort out the difference between GPS spoofing and GPS jamming.

Ahead of the latest Apple smartwatch rollout, the panelists debate whether vendors made a mistake introducing smartwatches to consumers first, rather than pursuing the enterprise market.

Credit to Author: Andy Greenberg| Date: Wed, 06 Sep 2017 10:00:00 +0000
Hackers who hit American utilities this summer had the power to cause blackouts, Symantec says. And yes, most signs point to Russia.
Read More
The panelists talk about their pricing predictions for the newest iPhone. Will this be the Apple device that gives consumers sticker shock?

Credit to Author: Evan Schuman| Date: Tue, 05 Sep 2017 14:13:00 -0700
IT is seeing a very dangerous collision of two trends: BYOD and mobile apps. IT’s job is, among other things, to protect corporate data, a portion of the company’s intellectual property. And yet easily downloaded consumer apps are threatening that data security by sharing their sensitive data with mobile apps that have almost infinite capabilities.
Consider this reference from a scary story courtesy of The Intercept: “When launched for the first time, [popular app Sarahah] immediately harvests and uploads all phone numbers and email addresses in your address book. Although Sarahah does in some cases ask for permission to access contacts, it does not disclose that it uploads such data, nor does it seem to make any functional use of the information.”
To read this article in full or to leave a comment, please click here
Credit to Author: Michael Miley| Date: Wed, 06 Sep 2017 13:00:13 +0000
If there’s one thing we know about cybercrimnals it’s that where there’s people and money, they will surely follow. With an estimated 1.4 billion Android devices in use today, it’s not hard to see why they might have your smartphone in their sights. Attacks on Android devices made up 81 percent of mobile attacks last…

Credit to Author: Andy Greenberg| Date: Wed, 06 Sep 2017 10:00:00 +0000
Hackers who hit American utilities this summer had the power to cause blackouts, Symantec says. And yes, most signs point to Russia.
Read MoreCredit to Author: Sharky| Date: Wed, 06 Sep 2017 03:00:00 -0700
Word comes down from on high that this company will be installing video surveillance systems in dozens of its remote warehouses, reports an IT manager pilot fish on the inside.
“The director of operations decided we needed video surveillance in order to monitor the warehouses in real time,” fish says. “The ability to review video at our corporate office was key to the project.
“Then he signed a contract to start installing these systems with a national vendor without first consulting with IT.”
That results in a series of unexpected phone calls to fish from installers, who need him to drop everything and help them by configuring firewalls, providing them with static IP addresses and then trying to test their systems.
To read this article in full or to leave a comment, please click here