Secure Your Software Supply Chain

Secure Your Software Supply Chain

Auto parts, peanut butter, and medical supplies all have supply chains: links of goods, services, and interconnecting processes that turn small pieces into finished items and get them to their consumers. Software products are the same. A lot of components go into the creation of any software product. And at any time, the build process can, theoretically, be attacked. So there is a lot of attention today paid to software supply chain attacks, some of…

Read More

Security Resilience, Together Again at RSA

Security Resilience, Together Again at RSA

I can hardly believe that RSA Conference 2022 is here, finally. Like many of you, this will mark my first major security conference I am attending since the onset of the pandemic. Funny enough, RSA Conference was also my last conference I attended back in 2020. So, I am excited to be bookending my travel hiatus with the biggest security conference of the year and seeing many of our #CiscoPartners in person! Since this is…

Read More

Axon Ethics Board members resign after company announces plans to build taser-equipped drones

Axon Ethics Board members resign after company announces plans to build taser-equipped drones

<!– Axon Ethics Board members resign after company announces plans to build taser-equipped drones | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

Critical Vulnerability Found in Motorola’s Unisoc Chips

Critical Vulnerability Found in Motorola’s Unisoc Chips

Cyber-threat intelligence firm Checkpoint Research (CPR) spotted a critical vulnerability in the Unisoc Tiger T700 chips that power the Motorola Moto G20, E30, and E40 smartphones. The components, which replaced MediaTek’s chips in the aforementioned devices due to global shortages, have been marked as threat vectors due to a stack overflow vulnerability. More specifically, due to the flaw, the smartphones were seen omitting the check to make sure that the modem’s connection handler was reading a…

Read More

The Utility of Superlative Customer Experience

The Utility of Superlative Customer Experience

Tell me if you’ve heard this story before. While visiting my daughter in college, I spent an hour on hold with her utility company trying to help with a billing issue that she thought had already been resolved. When the call was finally answered “in the order it was received” I had to explain the problem from scratch to a representative (let’s call her Sheila) who was totally new to this case. Sheila tried to…

Read More

Tyler Young named CISO at BigID

Tyler Young named CISO at BigID

<!– Tyler Young named CISO at BigID | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Google Fi: The best phone service for international travel

Google Fi: The best phone service for international travel

MR.Cole_Photographer/ Getty Most years, I rack up about 100,000 miles of business travel on airlines. Well, not the last two. I went from tens of thousands of miles to, at most, hundreds. But, now that COVID-19 is slowly retreating, business travel is coming back, so I’m on the road again. That means I once more need to deal with the problem of international phone and data bills.  For me, the best solution to this is…

Read More

State-Backed Hacker Believed to Be Behind Follina Attacks on EU and US

State-Backed Hacker Believed to Be Behind Follina Attacks on EU and US

An unnamed state actor is reportedly behind a phishing campaign targeting European and local US government entities using the Follina Office Vulnerability. The hacking attempts were spotted by cybersecurity firm Proofpoint, which posted a series of tweets last Friday from its Threat Insight account describing the campaign’s details. “Proofpoint blocked a suspected state aligned phishing campaign targeting less than 10 Proofpoint customers (European gov & local US gov) attempting to exploit #Follina,” reads the first tweet. According to the…

Read More

Apple protected App Store users from $1.5 billion fraud last year

Apple protected App Store users from .5 billion fraud last year

Apple says that it protected many millions of users from being defrauded to the tune of nearly $1.5 billion dollars in the last year, by policing its official App Store. According to a newly published report by Apple, over 1.6 million risky and untrustworthy apps and app updates were stopped in their tracks due to the company’s fraud prevention analysis. During 2021, Apple says that over 835,000 problematic new apps, and an additional 805,000 app…

Read More
1 3,055 3,056 3,057 3,058 3,059 4,185