Supply Chain Security

Supply Chain Security news, information, and how-to advice

Indianapolis 148492252

outsource in house ts

Top five reasons companies are avoiding managed services

For many small and midsize companies, having someone else remotely monitor and manage their computer network is a no-brainer. But according to a new study from CompTIA, companies that don't use managed service providers are more...

cloud tools

US proposes tighter export rules for computer security tools

The U.S. Commerce Department has proposed tighter export rules for computer security tools, a potentially controversial revision to an international agreement aimed at controlling weapons technology.

tesla supercharger station tesla model s resized

Tesla attack started with a single phone call

Last weekend, Tesla Motors had their website, and Twitter accounts hijacked by individuals looking to play a joke. They used their access to deface the company's website and spam a computer repair shop in Illinois, posting their...

zombie dude

Zombie apps haunt BYOD workplaces

According to a new study of around 3 million apps on employee smartphones, 5.2 percent of iOS apps and 3.9 percent of Android apps are actually dead, removed from their respective app stores and no longer supported.

rsa moscone south

166816 (Z66816): A post-RSA Conference recap

Default credentials: Ignored by those who should be paying attention, and collected by everyone else, they're the reason most breaches don't need to be too technical.

dell e2414hr 24 inch monitor 500x700

Dell support tool put PCs at risk of malware infection

Attackers could have remotely installed malware on systems running a flawed Dell support tool used to detect customers' products. A security researcher discovered the flaw in November and reported it to the PC manufacturer, which...

handshake

Are your business partners secure?

Are your business partners secure? Without giving too much thought to the question, you nod for a moment saying to your self “sure, they are” by, then the confusion starts to wind its way into your brain. Are you safe in the...

samsung galaxy tab s

BlackBerry teams with Samsung and IBM to offer governments a secure tablet

BlackBerry is returning to the tablet market -- this time with the help of Samsung Electronics, IBM and Secusmart, the German encryption specialist BlackBerry bought last year.

google map location pin

Geofencing could add security layer for mobile devices

Geofencing technology -- tracking the location of a mobile device -- could offer an extra layer of security for enterprises trying to manage both company-owned and employee-owned devices. However, the technology can also raise worries...

apple pay

Crooks targeting call centers to further Apple Pay fraud

According to mobile payments expert, Cherian Abraham, fraud on Apple's mobile payment platform – Apple Pay – is rampant. However, Apple's hardware and software security measures remain intact; the issue at the heart of most fraud...

Lenovo Y40 Gaming PC

FAQ: How to find and remove Superfish from your Lenovo laptop

Lenovo has shipped consumer PCs with software designed to offer a visual shopping experience, but in reality it's adware that breaks HTTPS online – leaving customers vulnerable to attack and information theft. Here’s how to determine...

jaguar land rover

Senators to push privacy, security legislation for IoT

Some Democratic senators want new laws that mandate security and privacy measures on the Internet of Things, as concern grows over personal data collected by connected devices.

Twenty-eight percent of security spending wasted on shelfware

The average organization spent $115 per user on security-related software last year, but $33 of it, or 28 percent, was underutilized or not used at all, according to a new report from Osterman Research

chemical plant

Startup finds malware intrusions by keeping an eye on processor radio frequencies

PFP Cybersecurity, a startup with roots in academia and the military, seeks out malware by analyzing the performance of hardware - not software and not the behavior of devices on the network.

target on shirt

Why cybersecurity will suffer the same fate in 2015 as it did in 2014

CISOs continue to beg for financial table scraps and the scraps they do get are used to double down on existing technology. The same technology that is failing them now but with a new twist or new buzzwords describing really what they...

01 gargoyle

A look back at 2014's data protection nightmare

There were nearly one billion records compromised in 2014, due in part to poor supply chain protection, malicious insider access, and lackluster access management policies. Today, Salted Hash looks back at the facts and figures of a...

breach bucket
In Depth

Nearly a billion records were compromised in 2014

In first nine months of 2014, after 1,922 confirmed incidents, criminals managed to compromise 904 million records. Many of the incidents reported in 2014 were record setting, including twenty of them that resulted in the compromise...

retail theft

Cost of retail crime skyrockets nearly 30 percent

Higher proportions of employee theft and shoplifting as a share of all retail losses, combined with higher spending on loss prevention, resulted in a 27 percent increase of the cost of retail crime in the United States, according to...

Load More