Quantcast
Channel: CSO Online Supply Chain Management
Browsing all 58 articles
Browse latest View live

Senators to push privacy, security legislation for IoT

Some Democratic senators want new laws that mandate security and privacy measures on the Internet of Things, as concern grows over personal data collected by connected devices.Several democratic...

View Article



FAQ: How to find and remove Superfish from your Lenovo laptop

Lenovo has shipped consumer PCs with software designed to offer a visual shopping experience, but in reality it's adware that breaks HTTPS online – leaving customers vulnerable to attack and...

View Article

Crooks targeting call centers to further Apple Pay fraud

According to mobile payments expert Cherian Abraham, fraud on Apple's mobile payment platform – Apple Pay – is rampant. However, Apple's hardware and software security measures remain intact; the...

View Article

Geofencing could add security layer for mobile devices

Geofencing technology -- tracking the location of a mobile device -- could offer an extra layer of security for enterprises trying to manage both company-owned and employee-owned devices. However, the...

View Article

BlackBerry teams with Samsung and IBM to offer governments a secure tablet

BlackBerry is returning to the tablet market -- this time with the help of Samsung Electronics, IBM and Secusmart, the German encryption specialist BlackBerry bought last year.This is not the PlayBook...

View Article


Are your business partners secure?

Are your business partners secure? Without giving too much thought to the question, you nod for a moment saying to your self “sure, they are” by, then the confusion starts to wind its way into your...

View Article

Dell support tool put PCs at risk of malware infection

Attackers could have remotely installed malware on systems running a flawed Dell support tool used to detect customers' products.A security researcher discovered the flaw in November and reported it...

View Article

166816 (Z66816): A post-RSA Conference recap

After several hours in the airport, followed by several more on a plane, all while being fueled by caffeine, here's the post-RSA Conference wrap-up from Salted Hash.This year's show seemed bigger,...

View Article


Zombie apps haunt BYOD workplaces

According to a new study of around 3 million apps on employee smartphones, 5.2 percent of iOS apps and 3.9 percent of Android apps are actually dead, removed from their respective app stores and no...

View Article


Tesla attack started with a single phone call

Last weekend, Tesla Motors had their website and Twitter accounts hijacked by individuals looking to play a joke.They used their access to deface the company's website and spam a computer repair shop...

View Article

US proposes tighter export rules for computer security tools

The U.S. Commerce Department has proposed tighter export rules for computer security tools, a potentially controversial revision to an international agreement aimed at controlling weapons...

View Article

Top five reasons companies are avoiding managed services

For many small and midsize companies, having someone else remotely monitor and manage their computer network is a no-brainer. The managed service provider can improve efficiency, reliability,...

View Article

CircleCityCon: Protecting the supply chain

On Saturday, during an early morning session at CircleCityCon in Indianapolis, Akamai's Dave Lewis addressed the topic of supply chain security with the conference's early risers.Over the last year,...

View Article


Agencies need to pay more attention to supply chain security

Government agencies seeking the lowest bidders typically overlook cybersecurity when awarding contracts, and data breaches are the result, says a security rating expert.According to a review of 25...

View Article

Accuvant researchers to release open source RFID access tool

Security researchers have long known about the vulnerabilities of the RFID readers that many buildings use instead of door locks, but facilities managers have been slow to upgrade to more secure...

View Article


ICANN website security breached

The Internet Corporation for Assigned Names and Numbers (ICANN) has issued a warning to those who registered with its public website that their profile accounts were accessed by an “unauthorized...

View Article

Ubiquiti Networks victim of $39 million social engineering attack

Ubiquiti Networks Inc., the San Jose based manufactured of networking high-performance networking technology for service providers and enterprises, announced in its fourth quarter fiscal results that...

View Article


FBI issues supplier scam warning to businesses

The FBI's Internet Complaint Center (IC3) issued a warning last week about a type of scam that has exposed businesses to a total of $1.2 billion in losses, once the numbers from October 2013 until...

View Article

IDG Contributor Network: How to secure the Internet of Things and who should...

Gartner researchers predict that by 2020 we will have 25 billion connected devices. Meanwhile, PricewaterhouseCoopers’ Global State of Information Security® Survey 2015 says that more than 70 percent...

View Article

IDG Contributor Network: Spending millions on APT defense? Don’t forget about...

Advanced Persistent Threats has become a very popular term today, whereas companies are spending millions on APT defense. While APT defense is important for many large companies, it should not...

View Article
Browsing all 58 articles
Browse latest View live




Latest Images