Cars are packed with technology, but they can still be hacked

Cars are packed with technology, but they can still be hacked

The threat to people’s lives is terrifying, so auto manufacturers need to change their old-school strategies to protect people. TechRepublic’s Karen Roby spoke with Eric Sivertson and J.P. Singh of Lattice, a human resources platform, about cyberattacks in cars. The following is an edited transcript of their conversation. Karen Roby: Car manufacturers are at a crossroads, as they’re trying to deliver the features that customers want, while keeping safety and security. Lattice recently held a…

Read More

Automate your VMware Cloud on Dell EMC with the latest vRealize Automation Cloud Update – VMware Cloud Community

Automate your VMware Cloud on Dell EMC with the latest vRealize Automation Cloud Update – VMware Cloud Community

Anchored to offering the best self-service hybrid cloud, this month, vRealize Automaton Cloud brings support for VMware Cloud on Dell/EMC along with a handful of native public cloud enhancements and more multi-cloud governance and extensibility.        Self Service VMware Cloud on Dell/EMC  Based on the best-in-class VMware SDDC and introduced with VMware Cloud on AWS, “VMware Cloud” is quickly becoming the multi-cloud infrastructure standard that can be deployed anywhere and works with any major…

Read More

Employees are valuable assets: Why you need to safeguard them

Employees are valuable assets: Why you need to safeguard them

Two experts suggest calling employees “insider threats” is counterproductive; employees are assets needing protection. Image: Luis Alvarez/DigitalVision/Getty Images If businesses continue to focus on augmenting technical cybersecurity programs, things aren’t going to improve. As to why, Bill Priestap and Holden Triplett, co-founders of Trenchcoat Advisors, and adjunct professors at Georgetown University in their Lawfare article, If We Don’t Secure People, Information Security Will Remain a Pipe Dream, suggest there’s a problem not being addressed adequately. “A…

Read More

How to better detect and prevent Business Email Compromise attacks

How to better detect and prevent Business Email Compromise attacks

These types of email attacks rely on simple language and exploit human nature to scam their victims, making detection difficult, says Cisco Talos. Image: GrafVishenka, Getty Images/iStockPhotos The Business Email Compromise (BEC) attack is a popular tactic among cybercriminals. This type of scam requires less time and effort to implement than other kinds of cyberattacks. And the payoffs can be plentiful because these fraudulent emails are typically aimed at people and departments with the power…

Read More

Gaming Industry Experiences 340% Spike in Web App Attacks

Gaming Industry Experiences 340% Spike in Web App Attacks

Web application attacks targeting the video game industry grew by a higher rate than any other sector during the COVID-19 pandemic, according to a new report by Akamai. The Gaming in a Pandemic found that attacks of this nature surged by 340% in 2020 compared to 2019, totaling more than 240 million attempts against the video game industry. The most prominent web application attack vector was SQL injection, making up 59% of all attacks against the gaming…

Read More

How to use the Android Photos Locked Folder feature

How to use the Android Photos Locked Folder feature

The Google Photos Locked Folder feature has finally arrived and Jack Wallen wants to show you how to use it. Image: Angela Lang/CNET It’s funny how Google will announce a new feature in an upcoming rollout, only to then hold that feature back, even after the rollout has happened. One such feature is the long overdue Locked Folder feature in Google Photos. This new feature was announced at Google I/O 2021 and then set for…

Read More

Sticky clouds and stateless doughnuts? cloud consumption is always up

Sticky clouds and stateless doughnuts? cloud consumption is always up

Is this cloud stuck to this mountain, or is this mountain stuck to this cloud, idk, but I did wish for a clear shot! As I was rolling around my LinkedIn Feed I happened or Marjorie’s comment of Narian’s Post. As I mentioned in an earlier article there is real scrutiny being applied to decisions of infrastructure consumption. In his post Narian walks thru an analysis of how decisions around cloud are often short term…

Read More

On the Importance of Protecting U.S. Pipeline Owners and Operators

On the Importance of Protecting U.S. Pipeline Owners and Operators

In the beginning of May, a U.S. pipeline company suffered a ransomware attack. The company decided to respond by halting operations while it investigated the incident. This delayed tens of millions of gallons of fuel from reaching their destination all along the East Coast. Less than a week later, Bloomberg reported that the company had paid millions of dollars to a ransomware group in order to regain access to their systems. U.S. government officials were…

Read More

UK Banks Drive £77 Million Reduction in European Fraud Losses

UK Banks Drive £77 Million Reduction in European Fraud Losses

UK banks led the way in Europe last year with fraud protection efforts, driving an overall drop in associated losses of £77 million (€90 million) year-on-year, according to new data from FICO. The predictive analytics firm claimed that British financial institutions cut fraud losses by an impressive £46 million (€69 million) in 2020, the equivalent of a 7% reduction on 2019 figures. They were joined by their counterparts in Denmark, who managed to drive down…

Read More
1 2,215 2,216 2,217 2,218 2,219 2,584