The Internet of Everything and digital privacy: what you need to know

Credit to Author: Malwarebytes Labs| Date: Thu, 26 Apr 2018 15:36:00 +0000

Statistics indicate within the next couple of years, there will be three IoT devices for every adult and child on the planet—IoT will truly be the Internet of Everything. So, should people be concerned about privacy and data security if these gadgets are always on and ready to transmit information? Let’s take a look.

Categories:

Tags:

(Read more…)

The post The Internet of Everything and digital privacy: what you need to know appeared first on Malwarebytes Labs.

Read more

The New Mobile Threat Landscape, circa 2017 to 2018

Credit to Author: Trend Micro| Date: Thu, 26 Apr 2018 13:00:10 +0000

Is your phone infected?

Submitted by Ian Grutze If mobile threats diversified and expanded in 2016, they matured in 2017. Mobile ransomware continued to rear its head, burgeoning into the platform’s most prevalent threat. Simple screen lockers, for instance, evolved into file-encrypting malware, some of which even seemed to keep pace with their desktop counterparts in terms of malicious routines….

The post The New Mobile Threat Landscape, circa 2017 to 2018 appeared first on .

Read more

Throwback Thursday: How to improve security

Credit to Author: Sharky| Date: Thu, 26 Apr 2018 03:00:00 -0700

There’s a new security policy at this biotech company, reports a pilot fish in the know: When logging in on a PC, the username field will now be blank, and everyone will have to input the name together with the password.

“The policy is announced weeks in advance,” fish says. “In spite of this, the first day is painful. A flurry of calls comes into the IT help desk regarding people not being able to log in. One is from a junior member of the payroll department who is about to leave on a two-week vacation — in fact, her flight is later that afternoon.”

“A tech tries to help her over the phone, but apparently she couldn’t tell the difference between the username box and password box, in spite of them actually being labeled as such.”

To read this article in full, please click here

Read more

SSD Advisory – TrustPort Management Unauthenticated Remote Code Execution

Credit to Author: SSD / Noam Rathaus| Date: Wed, 25 Apr 2018 08:36:14 +0000

Vulnerability Summary Multiple vulnerabilities in TrustPort’s management product allow remote unauthenticated attackers to cause the product to execute arbitrary code. TrustPort Management “offers you an effective and practical way to install centrally, configure and update antivirus software in your network and it enables mass administration of TrustPort products. Central administration from TrustPort brings you simple … Continue reading SSD Advisory – TrustPort Management Unauthenticated Remote Code Execution

Read more

Microsoft Patch Alert: April patches infested with bugs, but most are finally contained

Credit to Author: Woody Leonhard| Date: Wed, 25 Apr 2018 12:06:00 -0700

People think I’m joking when I refer to bug fixing as Microsoft’s next billion-dollar business. I’m not. This month woefully demonstrated why patching Windows has become much bigger – and more critical – than developing new versions. Microsoft’s hell-bent move to bring out new versions of Windows twice a year “as a service” makes things worse, but quality control problems dog patches to every version of Windows. Except, arguably, Windows 8.1.

In April, we’ve seen a return to two massive cumulative updates per month for all supported versions of Windows 10. The second cumulative update, with luck, fixes the bugs in the first cumulative update. Windows 7 turned into a fiery pit when it was discovered in late March that every patch to Win7 (and Server 2008R2) pushed out this year enables the Total Meltdown bug. Fortunately, by April 23, we finally saw some stability return to the process.

To read this article in full, please click here

Read more

Why the General Data Protection Regulation (GDPR) is Necessary & Key to the Tech Future

Credit to Author: Patrick Donovan| Date: Wed, 25 Apr 2018 14:38:40 +0000

Throughout time, humanity has been striving to improve its condition and circumstances. This striving has come in fits and starts. And at times, we fail in a big way…think war… Read more »

The post Why the General Data Protection Regulation (GDPR) is Necessary & Key to the Tech Future appeared first on Schneider Electric Blog.

Read more