Supply Chain Management (SCM)

Supply Chain Management (SCM) news, analysis, research, how-to, opinion, and video.

security threat ninja hacker hacked
internet of things smart house

fbi seal

FBI issues supplier scam warning to businesses

The FBI's Internet Complaint Center (IC3) issued a warning last week about a type of scam that has exposed businesses to a total of $1.2 billion in losses, once the numbers from October 2013 until August 2015 are added up.

false identity

Ubiquiti Networks victim of $39 million social engineering attack

Ubiquiti Networks Inc in its SEC filings reveal they were the victim of a social engineering attack resulting in the loss of $39 million

ICANN website security breached

On foot of a security breach to its website, ICANN has requested that users reset their passwords

rfid cards

Accuvant researchers to release open source RFID access tool

Security researchers have long known about the vulnerabilities of the RFID readers that many buildings use instead of door locks, but facilities managers have been slow to upgrade to more secure systems.

Agencies need to pay more attention to supply chain security

Government agencies seeking the lowest bidders typically overlook cybersecurity when awarding contracts, and data breaches are the result.

Indianapolis 148492252

CircleCityCon: Protecting the supply chain

On Saturday, during an early morning session at CircleCityCon in Indianapolis, Akamai's Dave Lewis addressed the topic of supply chain security with the conference's early risers.

outsource in house ts

Top five reasons companies are avoiding managed services

For many small and midsize companies, having someone else remotely monitor and manage their computer network is a no-brainer. But according to a new study from CompTIA, companies that don't use managed service providers are more...

cloud tools

US proposes tighter export rules for computer security tools

The U.S. Commerce Department has proposed tighter export rules for computer security tools, a potentially controversial revision to an international agreement aimed at controlling weapons technology.

tesla supercharger station tesla model s resized

Tesla attack started with a single phone call

Last weekend, Tesla Motors had their website, and Twitter accounts hijacked by individuals looking to play a joke. They used their access to deface the company's website and spam a computer repair shop in Illinois, posting their...

zombie dude

Zombie apps haunt BYOD workplaces

According to a new study of around 3 million apps on employee smartphones, 5.2 percent of iOS apps and 3.9 percent of Android apps are actually dead, removed from their respective app stores and no longer supported.

rsa moscone south

166816 (Z66816): A post-RSA Conference recap

Default credentials: Ignored by those who should be paying attention, and collected by everyone else, they're the reason most breaches don't need to be too technical.

dell e2414hr 24 inch monitor 500x700

Dell support tool put PCs at risk of malware infection

Attackers could have remotely installed malware on systems running a flawed Dell support tool used to detect customers' products. A security researcher discovered the flaw in November and reported it to the PC manufacturer, which...


Are your business partners secure?

Are your business partners secure? Without giving too much thought to the question, you nod for a moment saying to your self “sure, they are” by, then the confusion starts to wind its way into your brain. Are you safe in the...

samsung galaxy tab s

BlackBerry teams with Samsung and IBM to offer governments a secure tablet

BlackBerry is returning to the tablet market -- this time with the help of Samsung Electronics, IBM and Secusmart, the German encryption specialist BlackBerry bought last year.

google map location pin

Geofencing could add security layer for mobile devices

Geofencing technology -- tracking the location of a mobile device -- could offer an extra layer of security for enterprises trying to manage both company-owned and employee-owned devices. However, the technology can also raise worries...

apple pay

Crooks targeting call centers to further Apple Pay fraud

According to mobile payments expert, Cherian Abraham, fraud on Apple's mobile payment platform – Apple Pay – is rampant. However, Apple's hardware and software security measures remain intact; the issue at the heart of most fraud...

Lenovo Y40 Gaming PC

FAQ: How to find and remove Superfish from your Lenovo laptop

Lenovo has shipped consumer PCs with software designed to offer a visual shopping experience, but in reality it's adware that breaks HTTPS online – leaving customers vulnerable to attack and information theft. Here’s how to determine...

jaguar land rover

Senators to push privacy, security legislation for IoT

Some Democratic senators want new laws that mandate security and privacy measures on the Internet of Things, as concern grows over personal data collected by connected devices.

Load More