7 musts for any successful BYOD program
Mobile devices, mobile apps and the networks they use are now essential to satisfy customers, collaborate more effectively with suppliers, and keep employees productive anytime and anywhere.
RSS Reader for Computer Security Articles
Mobile devices, mobile apps and the networks they use are now essential to satisfy customers, collaborate more effectively with suppliers, and keep employees productive anytime and anywhere.
Earlier this week, Trend Micro announced its newest capabilities of XGen™ security covering all solutions in the Trend Micro portfolio. XGen security is a unique blend of cross-generational threat defense techniques that is continually evolving and optimized for each layer of security – user environments, networks and hybrid clouds – to best protect against the…
Homeland security advisor Tom Bossert stands out in Trump’s cabinet as a cautious wonk among hotheads. The post Trump’s Cybersecurity Chief Could Be a ‘Voice of Reason’ appeared first on WIRED.
Read MoreTo better vet foreign travelers, the U.S. might demand that some visa applicants hand over the passwords to their social media accounts, a proposal that’s alarming privacy experts.
“If they don’t want to give us the information, then they don’t come,” said John Kelly, the head of the Department of Homeland Security, on Tuesday.
Kelly mentioned the proposal in a congressional hearing when he was asked what his department was doing to look at visa applicants’ social media activity.
He said it was “very hard to truly vet” the visa applicants from the seven Muslim-majority countries covered by the Trump administration’s travel ban, which is now in legal limbo. Many of the countries are failed states with little internal infrastructure, he said.
To read this article in full or to leave a comment, please click here
Some big players in security and the internet of things, including AT&T and Nokia, are joining forces to solve problems that they say make IoT vulnerable in many areas.
The IoT Cybersecurity Alliance, formed Wednesday, also includes IBM, Symantec, Palo Alto Networks, and mobile security company Trustonic. The group said it won’t set standards but will conduct research, educate consumers and businesses, and influence standards and policies.
As IoT technologies take shape, there’s a danger of new vulnerabilities being created in several areas. Consumer devices have been in the security spotlight thanks to incidents like the DDoS attacks last year that turned poorly secured set-top boxes and DVRs into botnets. But the potential weaknesses are much broader, spanning the network, cloud, and application layers, the new group said in a press release.
To read this article in full or to leave a comment, please click here
Accenture wants to help businesses use blockchain technologies more securely by locking away the encryption keys they use to sign transactions.
It’s built a system that blockchain developers can use to store credentials in specialized cryptoprocessors called hardware security modules (HSMs).
HSMs are typically used by banks to store the PINs associated with payment cards or the credentials used to make interbank payments over the SWIFT network, and are much more secure than storing the credentials, even in encrypted form, on network-connected servers from where attackers could steal them.
The PINs or credentials never leave the HSMs, and their use within them is strictly controlled.
To read this article in full or to leave a comment, please click here
![]() | |
Spigot browser hijackers of this family are easy to recognize and in our opinion hardly worth installing because they add no more functionality then a few bookmarks. We hope this post helps you to avoid them in the future. Categories: Tags: browser hijackerPieter Arntzpotentially unwanted programsPUPSpigot |