Security News > 2020 > May

NIKE Group's data-driven approach and compliance platform help clients monitor new regulatory requirements and assist with compliance. The acquisition enhances Accenture's RegTech and compliance capabilities for clients in Italy and across Europe.

DEVCON announced Chad Fowler to take the helm as Vice President of Technology. "I've been a fan of Chad's since 2017 when he became an advisor to the company and me. I'm thrilled to get the chance to collaborate and create together!" said Josh Summitt, co-founder & CTO at DEVCON. Widely recognized as a transformative technology executive, Chad leaves Microsoft where he was the General Manager of Startups, to join the DEVCON team.

The aircraft safety system known as the Traffic Alert and Collision Avoidance System can be coerced into sending an airplane on a mid-air rollercoaster ride - much to the horror of those onboard. Spoofing the Traffic Alert and Collision Avoidance System is not new.

ImageWare Systems, a leader in identity management software, is pleased to announce the appointment of Jonathan D. Morris as Senior Vice President and Chief Financial Officer. Morris has more than 23 years of experience as a finance executive, holding key roles in financial management, mergers & acquisitions, private equity, merchant banking and investment banking.

Two years ago, for example, he and several other researchers developed a technique dubbed MOSQUITO to exfiltrate data from air-gapped systems using ultrasonic transmissions between speakers. An obvious defense against acoustic data transmission is to disable any speakers on the protected device, a practice known as audio-gapping.

Password protection, user authentication, and keeping software patched are a few ways you can keep video conferencing secure. Tom Merritt suggests five things to do to ensure safer video meetings.

Password protection, user authentication, and keeping software patched are a few ways you can keep video conferencing secure. Tom Merritt suggests five things to do to ensure safer video meetings.

Hackers targeted the publishing platform Ghost over the weekend, launching a cryptojacking attack against its servers that led to widespread outages. The attack stemmed from the exploit of critical vulnerabilities in SaltStack, used in Ghost's server management infrastructure.

TechRepublic's Karen Roby talks with Dr. Nancy Schreiber, provost and vice president for academic affairs, and Irving Bruckstein, CIO, of Salve Regina University in Rhode Island, about the process of switching to online learning during the COVID-19 pandemic and the security concerns that come with students learning from home. For synchronous learning, we transitioned our video conferencing tool, which is a very secure and highly scalable tool from Cisco, Webex, to use for synchronous learning.

Not only can malicious people make airliners climb and dive without pilot input - they can also control where and when they do so, research from Pen Test Partners has found. TCAS spoofing, the practice of fooling collision detection systems aboard airliners, can be controlled to precisely determine whether an airliner fitted with TCAS climbs or descends - and even to produce climb rates of up to 3,000ft/min.