Software Bill of Materials (SBOMs) are catching on as companies seek better visibility in software supply chains and need accurate information for vulnerability disclosure requirements. But maintaining an accurate SBOM isn’t a quick and easy task. Here’s what to keep in mind when building an SBOM.
Researchers discovered that scammers used Popular TikTok profiles to push scam apps to underage children on Apple and Google Play stores earning over $500,000.
Love is in the Cloud as millions of people are looking to meet their match online. However, Cupid isn't the only one taking aim at people seeking love on dating apps during this time of year. Catfishers and scammers are on the prowl, taking advantage of those looking for love.
T-Mobile disclosed a second data breach in 2020 in which hackers illegally accessed call-related and customer proprietary network information for about 200,000 subscribers.
LabCorp experienced a second data leak in a year with more damaging information exposed this round that includes medical records and social security numbers.
Second special directive from the TSA is requiring pipeline operators to implement specific mitigation measures and create contingency and recovery plans, though most of the details are being kept from the public.
The company arranged a payment of $200,000 through a third party, but customer data from the T-Mobile hack was subsequently seen for sale on dark net forums.
The importance of creating an interconnected security infrastructure for IoT is crucial. In a world where everything is communicating with everything else it is not just business critical but vital that everything from smart city networks down to individual smart devices is secure.
There's a need to secure offline, rather than online, microfinancing solutions. The future rests in the power of embeddable microchips and the power of process isolation by inserting a Linux-powered computer into the architecture of an non-secure IoT device to create a hardware Root of Trust.