Electronic Engagement

 
Rare attack on cellular protocol exploits an encryption-implementation flaw at base stations to record voice calls. [...]
Source: Kapersky Threatpost - Privacy
The growing work-from-home movement amid the coronavirus and its likely continuing challenges has created the need for additional broadband capacity [...]
Source: Technews
Researchers disclosed flaws in Amazon Alexa that could allow attackers to access personal data and install skills on Echo devices. [...]
Source: Kapersky Threatpost - Privacy
Regardless of the exact wording of The CMS Interoperability and Patient Access final rule, it’s clear that healthcare executives will be spending considerable [...]
Source: Security Magazine
Germany announced it had launched a federal agency to combat cyberattacks and strengthen its digital security.  [...]
Source: Security Magazine
U.S. Customs and Border Protection (CBP) announced the appointment of Gregory Alvarez as Director of San Juan Field Operations, which [...]
Source: Security Magazine
SANS Institute, a provider of cybersecurity training and certification services, lost approximately 28,000 items of personally identifiable information (PII) in [...]
Source: Security Magazine
New research finds nearly half of organizations regularly and knowingly ship vulnerable code despite using application security tools. Among the top [...]
Source: Security Magazine
As the fiscal year roars to an end, the GSA Advantage stands out as a vehicle for fast and efficient [...]
Source: Washington Technology
CenturyLink has promoted one of its executives to the role of regional vice president for the company’s federal government business. [...]
Source: Washington Technology
The deadline for contractors to stop using Huawei and other communications equipment from China is Aug. 12 but there is [...]
Source: Washington Technology
Vectrus is busy working on the massive LOGCAP V contract, but the COVID pandemic has caused delays that will push [...]
Source: Washington Technology
ECS brings aboard a nearly two-decade corporate finance and federal market veteran to be its next chief financial officer. [...]
Source: Washington Technology
App concealed the practice of gathering device unique identifiers using an added layer of encryption. [...]
Source: Kapersky Threatpost - Privacy
Earthquake alerts are being incorporated into Android, Google's mobile operating system. The feature will be included in a refresh of [...]
Source: Technews
Apple's "Walled Garden" was built to protect consumers from malicious applications, but it can also protect the company from competition, [...]
Source: Technews
Google Home devices reportedly recorded noises even without the "Hey Google" prompt due to the inadvertent rollout of a home [...]
Source: Kapersky Threatpost - Privacy
Last week we ran a survey asking people which of the CEOs that were questioned by Congress last month is [...]
Source: Technews
Legacy applications don't support modern authentication -- and cybercriminals know this. [...]
Source: Kapersky Threatpost - Privacy
Attackers can listen in on internet traffic for high-value targets a continent away, like shipping fleets and oil installations, using [...]
Source: Kapersky Threatpost - Cryptography

 

 Leave a Reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

(required)

(required)