Five Questions with XentIT

Credit to Author: Justin Foster| Date: Mon, 27 Feb 2017 14:00:23 +0000

We sat down with Deborah Larkins, Lead Technologist at XentIT to understand her journey with being a part of the upcoming release of Deep Security 10. XentIT is a full service IT firm specializing in information security, governance, risk and compliance, cloud technology, and managed IT services for commercial enterprises and government agencies. Founded in…

Read more

RSA Conference is a timesaver

Credit to Author: Mathias Thurman| Date: Mon, 27 Feb 2017 04:23:00 -0800

I spent several days in San Francisco on my annual pilgrimage to the RSA security conference.

This year, I attended a few sessions related to cloud security, privacy and compliance, since my world these days is consumed with enhancing the security of our cloud platform and addressing the never-ending burden of maintaining compliance with the likes of PCI, SSAE 16, SOC 2 and HIPAA, and the recent changes related to Privacy Shield, which is the replacement for the European Union’s Safe Harbor.

To read this article in full or to leave a comment, please click here

Read more

Taiwanese Trenders Volunteer to Help Young Students Learn to Code

Credit to Author: Trend Micro| Date: Mon, 27 Feb 2017 13:00:47 +0000

In 2016, the Trend Micro Volunteers Club in Taiwan partnered with the “Program the World” project to build excitement for computer programming for students across Taiwan. “Program the World” is a nonprofit organization that provides programming courses to underprivileged children who live in remote areas of Taiwan, who are limited in access to this type…

Read more

Now THAT'S secure!

Credit to Author: Sharky| Date: Mon, 27 Feb 2017 03:00:00 -0800

When it comes to website security questions, this pilot fish has a bad attitude — and that’s “bad” spelled P-R-A-C-T-I-C-A-L.

“When they let me write my own questions, I write stuff like ‘Top line of the Spanish text on the control box of the computer speakers,'” says fish.

“It’s easy enough for me to find that answer — just look down and read it — but unless you’re in my house or know exactly what speakers I bought five years ago, you aren’t gonna get it.

“Otherwise, I usually type in nonsense, because I don’t forget my passwords.

“Then sometimes the company has a security breach, locks every affected account and says, ‘You’ll need to reset your password using your security questions.’

To read this article in full or to leave a comment, please click here

Read more

More on Bluetooth Ingenico Overlay Skimmers

Credit to Author: BrianKrebs| Date: Mon, 27 Feb 2017 01:54:58 +0000

This blog has featured several stories about “overlay” card and PIN skimmers made to be placed atop Ingenico-brand card readers at store checkout lanes. I’m revisiting the topic again because a security technician at a U.S.-based retailer recently shared a few photos of several of these devices pulled from compromised card terminals, and the images and his story offer a fair bit more detail than in previous articles on Ingenico overlay skimmers.

Read more

Samsung mulls iris scanners on smartphones to log into Windows PCs

Credit to Author: Agam Shah| Date: Sun, 26 Feb 2017 16:51:00 -0800

Soon, your Samsung phone may be able to recognize your iris and log you into your Windows PC.

Iris-scanning via phone is not yet a feature available for Samsung’s latest Galaxy Book 2-in-1s, which were announced at Mobile World Congress. But the company wants to quickly bridge the gap between its Galaxy smartphones, which run on Android, and its Windows PCs and 2-in-1s.

Software called Samsung Flow links the company’s Android smartphones to Windows PCs. Samsung and Microsoft are looking to collaborate on logins via Windows Hello — designed to use biometric authentication to log into PCs — and one big Flow feature is the ability to use Galaxy smartphones to wirelessly log in to the new Galaxy Book.

To read this article in full or to leave a comment, please click here

Read more

IDG Contributor Network: 94% of Microsoft vulnerabilities can be easily mitigated

Credit to Author: Andy Patrizio| Date: Sat, 25 Feb 2017 21:18:00 -0800

If you want to shut out the overwhelming majority of vulnerabilities in Microsoft products, turn off admin rights on the PC.

That’s the conclusion from global endpoint security firm Avecto, which has issued its annual Microsoft Vulnerabilities report. It found that there were 530 Microsoft vulnerabilities reported in 2016, and of these critical vulnerabilities, 94% were found to be mitigated by removing admin rights, up from 85% reported last year.

This is especially true with the browser, for those who still use Microsoft’s browsers. 100% of vulnerabilities impacting both Internet Explorer and Edge could be mitigated by removing admin rights, Avecto reported. One bit of progress is that 109 vulnerabilities impacting IE 6 through 11 were reported in 2016, way down from 238 in the previous year.

To read this article in full or to leave a comment, please click here

Read more

Security News This Week: The Latest Netflix Release Is a Personal Security Check-Up

Credit to Author: Lily Hay Newman| Date: Sat, 25 Feb 2017 12:00:14 +0000

Security News This Week: The Latest Netflix Release Is a Personal Security Check-Up

Each weekend we round up the news stories that we didn’t break or cover in depth but that still deserve your attention. The post Security News This Week: The Latest Netflix Release Is a Personal Security Check-Up appeared first on WIRED.

Read more