Month: June 2017

ComputerWorldIndependent

2 handy yet hidden Chromebook security features

Credit to Author: JR Raphael| Date: Tue, 20 Jun 2017 09:04:00 -0700

Google’s Chrome OS is far more powerful and versatile than most folks realize — and one of the platform’s greatest strengths over traditional desktop OSes is its deceptively simple approach to security.

Chromebooks, you see, make security almost entirely automatic and thought-free from a user’s perspective. The devices receive regular behind-the-scenes updates with no action required on your behalf; they utilize sandboxing to keep every page and application in its own isolated environment; and their software relies on a special hardware-connected setup that ensures every computer is always running tamper-free and official Google software every time it powers up.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

The Microsoft security hole at the heart of Russian election hacking

Credit to Author: Preston Gralla| Date: Tue, 20 Jun 2017 08:29:00 -0700

Russian hacking of the 2016 election went deeper than breaking into the Democratic National Committee and the Clinton campaign — the Russians also hacked their way into getting information about election-related hardware and software shortly before voting began.

The Intercept published a top-secret National Security Agency document that shows exactly how the Russians did their dirty work in targeting election hardware and software. At the heart of the hack is a giant Microsoft security hole that has been around since before 2000 and still hasn’t been closed. And likely never will.

To read this article in full or to leave a comment, please click here

Read More
FortinetSecurity

Strengthening the Security Fabric of Blockchain

Credit to Author: Hemant Jain| Date: Tue, 20 Jun 2017 12:56:00 +0000

Blockchain is a shared and continuously reconciled database used to maintain a list of digital records, called blocks. It is quickly becoming an important tool not just for financial information, but also for managing and recording virtually all types of data, such as medical and other records, identity management, and transaction processing. Because a blockchain database is distributed and interconnected, it provides several essential services. The first is transparency. Because data is embedded within the network as a whole, it is by definition…

Read More
ScadaICSSchneider

The Many Benefits of a Strong Energy Management Partnership – Shedd Aquarium

Credit to Author: Haresh Jhaveri| Date: Tue, 20 Jun 2017 11:08:36 +0000

What happens when you retrofit a historic nearly 90-year-old building that is the home to over 32,000 aquatic animals and nearly 2 million annual visitors with state-of-the art systems? Not… Read more »

The post The Many Benefits of a Strong Energy Management Partnership – Shedd Aquarium appeared first on Schneider Electric Blog.

Read More
SecuritySophos

GDPR – Burden or opportunity? Cost or value? [PODCAST]

Credit to Author: Paul Ducklin| Date: Tue, 20 Jun 2017 11:17:38 +0000

#ICYMI: catch up on yesterday’s Sophos Security SOS webinar on Europe’s new GDPR laws and what they mean to you, whether you’re inside the EU or outside it.<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=40148&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/H968X2PXxL0″ height=”1″ width=”1″ alt=””/>

Read More