SecuringAV: The iPhone Spyware Vulnerability

What YOU Can Do To Prevent Hackers From Hijacking Your Smart Device’s Microphone   For each column in this series, rAVe writer Paul Konikowski takes a deeper dive into a recent security event or data breach, shedding light on supply chain vulnerabilities, infrastructure and cyber-physical security. OMG, did you watch the Apple “Unleashed” stream? No, not the […]

SecuringAV: The iPhone Spyware Vulnerability

SecuringAV: The Remote Desktop Attack on a Florida Water Treatment Plant

For each column in this series, rAVe writer Paul Konikowski takes a deeper dive into a recent security event or data breach, shedding light on supply chain vulnerabilities, infrastructure and cyber-physical security. In my last “SecuringAV” column about the Nashville Christmas morning bombing, I did my best to define what “infrastructure project” meant using the […]

SecuringAV: The Remote Desktop Attack on a Florida Water Treatment Plant