Remove tag national-security
article thumbnail

SBOMs: Securing the Software Supply Chain

eSecurity Planet

This article looks at software bills of materials, file data, existing standards, benefits, use cases, and what SBOMs mean for cybersecurity. The SBOM framework is about the units of software identified by developers and suppliers known as components and associated data known as attributes. What’s in a SBOM File?

Security 135
article thumbnail

Researchers analyzed the PREDATOR spyware and its loader Alien

Security Affairs

Security researchers at Cisco Talos and the Citizen Lab have shared technical details about a commercial Android spyware named Predator that is sold by the surveillance firm Intellexa (formerly known as Cytrox). Both components work together to bypass traditional security features on the Android operating system.

IT 98
article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

Smart Meters provide the data to support a cleaner future, showing how much energy is being used and how much this will cost you. Vamosi: But as someone who wrote a book questioning the security of our mass produced IoT devices, I wonder why no one bothered to test and certify these devices before they were installed?