Latest Security News

Huawei in hot water, more on Apple's rocky first-quarter | TECH(feed)

Computer World Security - Thu, 01/31/2019 - 04:00
Today's episode features more on Apple’s first-quarter report, news that Google and the Internet Advertising Bureau are profiling users, collaboration software spending, and more problems for Huawei.
Categories: Latest Security News

Microsoft Patch Alert: January patches include a reprisal of KB 4023057 and a swarm of lesser bugs

Computer World Security - Wed, 01/30/2019 - 10:12

In general, the January patches look relatively benign, but for some folks in some situations they can bite. Hard.

On the surface we’ve seen the usual Patch Tuesday Cumulative Updates and secondary Cumulative Updates for all versions of Windows 10. Microsoft calls the secondary Cumulative Updates “optional” because you only get them if you click “Check for updates.”

[ Related: How to clean up your Windows 10 act ]

Windows 7 and 8.1 got their usual Monthly Rollups, but there’s a problem. Specifically, this month’s Win7 Monthly Rollup has a couple of bugs that are only fixed if you install the preview of February’s Monthly Rollup. Which makes no sense at all, but that’s Microsoft. There’s another Win7 Monthly Rollup bug that’s fixed by installing a different “silver bullet” patch.

To read this article in full, please click here

Categories: Latest Security News

Microsoft Patch Alert: January patches include a reprisal of KB 4023057 and a swarm of lesser bugs

Computer World Security - Wed, 01/30/2019 - 10:12

In general, the January patches look relatively benign, but for some folks in some situations they can bite. Hard.

On the surface we’ve seen the usual Patch Tuesday Cumulative Updates and secondary Cumulative Updates for all versions of Windows 10. Microsoft calls the secondary Cumulative Updates “optional” because you only get them if you click “Check for updates.”

[ Related: How to clean up your Windows 10 act ]

Windows 7 and 8.1 got their usual Monthly Rollups, but there’s a problem. Specifically, this month’s Win7 Monthly Rollup has a couple of bugs that are only fixed if you install the preview of February’s Monthly Rollup. Which makes no sense at all, but that’s Microsoft. There’s another Win7 Monthly Rollup bug that’s fixed by installing a different “silver bullet” patch.

To read this article in full, please click here

Categories: Latest Security News

It's a hack!

Computer World Security - Wed, 01/30/2019 - 04:00

It's a few years after Y2K, and this pilot fish has overall responsibility for all things related to his company's website.

"Like most corporations, our company had a policy that computers and laptops were to be used only for company business, along with policies governing the appropriate use of the internet in the work environment," fish says.

"After arriving at work one morning, I opened my email to find a frantic message from our CEO to me and our internet security manager, stating that our website had been hacked."

The big boss knows this is the case because there are spammy images and text on the home page, among other issues. Not surprisingly, the CEO is adamant that this must be resolved ASAP.

To read this article in full, please click here

Categories: Latest Security News

Blockchain: The complete guide

Computer World Security - Tue, 01/29/2019 - 17:13

Blockchain, which began to emerge as a real-world tech option in 2016 and 2017, is poised to change IT in much the same way open-source software did a quarter century ago. And in the same way Linux took more than a decade to become a cornerstone in modern application development, Blockchain will likely take years to become a lower cost, more efficient way to share information and data between open and private business networks.

Based on a distributed, peer-to-peer (P2P) topology, blockchain or distributed ledger technology (DLT) allows data to be stored globally on thousands of servers – while letting anyone on the network see everyone else's entries in real-time. That makes it difficult for one user to gain control of, or game, the network.

To read this article in full, please click here

Categories: Latest Security News

Get 140+ Hours Of CompTIA Certification Training For $59 (90% Off)

Computer World Security - Tue, 01/29/2019 - 11:35

Knowing how to design, build out, grow, and manage Internet Technology (IT) firms, departments, and facilities provides what you need to take charge in today's most challenging and lucrative IT environments. And lifetime access to the Complete CompTIA Certification Training Bundle is exactly what you need to get the required training and ensuing certifications.

To read this article in full, please click here

Categories: Latest Security News

Apple’s Group FaceTime: A place for spies?

Computer World Security - Tue, 01/29/2019 - 06:30

Apple has disabled Group FaceTime following discovery of a flaw that could potentially let people hear audio from other people’s devices without permission. What’s going on and what can you do about it?

The Group FaceTime bug, in brief

9to5Mac report based on a video published to Twitter by @BmManski that revealed this flaw lets a user listen to audio captured using another person’s device before they accept or reject the call requesting a FaceTime chat. The problem affects only iOS devices running iOS 12.1 or later (pending an update).

To read this article in full, please click here

Categories: Latest Security News

Apple’s Group FaceTime: A place for spies?

Computer World Security - Tue, 01/29/2019 - 06:30

Apple has disabled Group FaceTime following discovery of a flaw that could potentially let people hear audio from other people’s devices without permission. What’s going on and what can you do about it?

The Group FaceTime bug, in brief

9to5Mac report based on a video published to Twitter by @BmManski that revealed this flaw lets a user listen to audio captured using another person’s device before they accept or reject the call requesting a FaceTime chat. The problem affects only iOS devices running iOS 12.1 or later (pending an update).

To read this article in full, please click here

Categories: Latest Security News

The race to lock down industrial control systems | Salted Hash Ep 44

Computer World Security - Tue, 01/29/2019 - 04:00
Guest host Juliet Beauchamp and CSO senior writer J.M. Porup talk about the challenges around securing the systems and networks used to control industrial plants and infrastructures.
Categories: Latest Security News

Sharding: What it is and why many blockchain protocols rely on it

Computer World Security - Mon, 01/28/2019 - 04:00

As blockchains are being rolled out in an increasing number of pilot programs for everything from cross-border financial transactions to supply chain management, one persistent issue remains: a lack of scalability.

As more computers join the peer-to-peer network, the efficiency of the whole system typically degrades.

[ Further reading: What is FinTech (and how has it evolved)? ]

Scalability has already been identified as an issue with cryptocurrencies such as bitcoin and Ethereum's Ether. If a distributed ledger is to achieve adoption by financial technology (FinTech) companies and compete with payment networks hundreds of times faster, it must find a way to boost scalability and throughput and address latency problems.

To read this article in full, please click here

Categories: Latest Security News

Get 3 Years of NordVPN Service for Just $2.99 Per Month - Deal Alert

Computer World Security - Fri, 01/18/2019 - 08:47

NordVPN promises a private and fast path through the public internet, with no logs, unmetered access for 6 simultaneous devices and access to 5,232 servers worldwide. They are currently running a promotion, but you'll have to use this link to find it. Its typical price has been discounted for 3 years of service -- a good deal at just $2.99 per month.  See the $2.99/month NordVPN deal here.

To read this article in full, please click here

Categories: Latest Security News

'We need new privacy laws' urges Apple CEO, Tim Cook

Computer World Security - Thu, 01/17/2019 - 05:25

In a sidelong slap at the business model of Facebook, Google and others, Apple CEO Tim Cook has published an article in which he urges the U.S. government to put surveillance capitalists/data brokers under transparent legal oversight.

Stand up for your rights

“In 2019, it's time to stand up for the right to privacy - yours, mine, all of ours.” Cook writes in an article for Time Magazine.

To read this article in full, please click here

Categories: Latest Security News

Start-up Devvio claims its blockchain can handle 8M transactions a second

Computer World Security - Thu, 01/17/2019 - 04:00

A start-up firm claims its highly efficient distributed ledger protocol can address all the major problems facing blockchain networks, including being able to scale for global financial business by executing up to eight million transactions per second (TPS).

The new blockchain protocol, called Devv, was unveiled and demonstrated at CES in Las Vegas last week.

If the claims prove true, Devv would be able to compete with traditional financial networks in terms of scalability, be far less expensive to use and would address fraud, theft and privacy issues. Like many blockchain protocols, Devv is not just a peer-to-peer (P2P) database technology but also a digital currency or cryptocurrency called Devcash.

To read this article in full, please click here

Categories: Latest Security News

Exploring the economic realities of cybersecurity insurance | Salted Hash Ep 43

Computer World Security - Thu, 01/10/2019 - 22:00
Guest host Juliet Beauchamp talks with senior writer J.M. Porup about the newly created cybersecurity insurance industry, and how a policy could fit into an organization's overall security strategy to help minimize risk.
Categories: Latest Security News

How to create and open compressed files on iPhone, iPad

Computer World Security - Thu, 01/10/2019 - 08:27

Many enterprises rely on zip files to exchange data, particularly confidential data. And compression helps keep information safe, even against inquisitive ads trackers lurking inside “free” email or online storage services. How do you handle these things on iPad or iPhone?

How to handle zip files on iPhone

While it isn’t especially obvious, iOS provides some limited features that let you archive and decompress zip files. You can even create a nice little Shortcut to do this for you:

  • Open Shortcuts, Tap Create Shortcut.
  • In the search bar, type Extract Archive: That shortcut should appear in the list below; tap it to add it to your workflow.
  • Returning to the search bar, type Save File. When it appears, tap it to add it to the workflow you are building.
  • Tap the switch button at top right of the shortcut name.
  • In the next pane, you can name the shortcut and give it an icon. The most important change you should make is to enable Show in Share Sheet (flick to green).
  • You can create a second Shortcut to make archives. Just type Make Archive to find the relevant flow and then add Save File and Show in Share Sheet as decribed above. Remember to give it a name, such as Make Archive.
  • Shortcuts can work with multiple compression formats, including .tar, .zip and .iso.
[ Further reading: The wireless road warrior’s essential guide ]

How to use the zip files shortcut:

To read this article in full, please click here

Categories: Latest Security News

How to create and open compressed files on iPhone, iPad

Computer World Security - Thu, 01/10/2019 - 08:27

Many enterprises rely on zip files to exchange data, particularly confidential data – compression helps keep information safe, even against inquisitive ads trackers lurking inside “free” email or online storage services. How do you handle these things on iPad or iPhone?

How to handle zip files on iPhone

While it isn’t especially obvious, iOS provides some limited features that let you archive and decompress zip files. You can even create a nice little Shortcut to do this for you:

  • Open Shortcuts, Tap Create Shortcut
  • In the search bar, type Extract Archive: That shortcut should appear in the list below, tap it to add it to your workflow.
  • Returning to the search bar, type Save File. When it appears tap it to add it to the workflow you are building.
  • Tap the switch button at top right of the shortcut name
  • In the next pane you can name the shortcut and give it an icon. The most important change you should make is to enable Show in Share Sheet (flick to green).
  • You can create a second Shortcut to make archives. Just tupe Make Archive to find the relevant flow and then add Save File and Show in Share Sheet as decribed above. Don’t forget to give it a name, such as Make Archive.
  • Shortcuts can work with multiple compression formats, including .tar, .zip and .iso.

How to use it:

To read this article in full, please click here

Categories: Latest Security News

Enterprise iPhones will soon be able to use security dongles

Computer World Security - Wed, 01/09/2019 - 08:25

Enterprise security professionals will be pleased to learn that it will soon be possible to enhance the already considerable device security of Apple’s iPhones with hardware-based physical authentication dongles using the Lightning port.

A highly secure proposition

Announced at CES 2019, the key fits on a keyring and comes from the authorization experts at Yubico. The hardware connects to iOS systems using the Lightning connection and is also equipped with USB-C for Macs. This is quite a big deal.

To read this article in full, please click here

Categories: Latest Security News

Details, details

Computer World Security - Wed, 01/09/2019 - 04:00

It's a few years after Y2K when the IT security team at this university gets a rude awakening, reports a pilot fish in the know.

"They discovered that persons unknown had hacked into a university server," fish says. "It was being used to launch denial-of-service attacks against a victim somewhere outside the university."

The team's first job is finding the server -- which turns out to be in the alumni office -- and taking it offline.

Then they start digging into the security logs. That's when they find out that the attackers have been making use of the server for more than a year.

And once they start checking on the IP addresses of whoever it is that has accessed the server, they discover it's not just one or two hackers. It seems people from all over the world have been using this server to launch attacks.

To read this article in full, please click here

Categories: Latest Security News

Mingis on Tech: As blockchain hype cools, a 'trough of disillusionment' for 2019?

Computer World Security - Wed, 01/09/2019 - 04:00

Ok, so maybe blockchain isn't ready yet to become the biggest new technology since the internet.

But the distributed ledger technology clearly made strides in 2018, when it was embraced by companies from Walmart to shipping bigwig Maersk to top tech venders like IBM, SAP, Oracle and Microsoft who see potential in blockchain-as-a-service. (Walmart's vice president in charge of food safety, Frank Yiannas, compared his embrace of blockchain to a "religious conversaion.")

To read this article in full, please click here

Categories: Latest Security News

Top 4 enterprise tech trends to watch in 2019

Computer World Security - Mon, 01/07/2019 - 04:00

If 2018 was the year of the data breach, the thinking among IT pros is that this will be the year companies take concrete steps to prevent future breaches.

That was the sentiment among tech professionals who took part in a recent @IDGTechTalk Twitter chat about enterprise tech trends for 2019.

In fact, a recent @IDGTechTalk poll found privacy and security to be the top enterprise tech issue for 2019 (45 percent), followed by artificial intelligence (30 percent), cloud computing (16 percent), and blockchain (9 percent).

To read this article in full, please click here

Categories: Latest Security News

Pages

Subscribe to SecurityFeeds aggregator - Latest Security News