Month: January 2018

ComputerWorldIndependent

Microsoft sets novel antivirus prerequisite before offering Windows emergency updates

Credit to Author: Gregg Keizer| Date: Wed, 10 Jan 2018 05:03:00 -0800

Microsoft last week took the unprecedented step of requiring customers to have up-to-date antivirus software on their personal computers before it would hand over a critical security update.

“This was unique,” said Chris Goettl, product manager with client security and management vendor Ivanti. “But there was a danger here.”

Goettl was talking about the emergency updates Microsoft issued last week to bolster Windows’ defenses against potential attacks leveraging the vulnerabilities labeled Meltdown and Spectre by researchers. Operating system and browser makers have shipped updates designed to harden systems against the vulnerabilities, which stemmed from design flaws in modern processors from companies such as Intel, AMD and ARM.

To read this article in full, please click here

Read More
QuickHealSecurity

Here’s how you can stay safe from the Android Banking Trojan that targets banking apps

Credit to Author: Rajib Singha| Date: Wed, 10 Jan 2018 13:37:12 +0000

If our readers can recollect, Quick Heal Security Labs had released an important advisory about an Android banking Trojan that is known to target about 232 banking apps. As a continuation of the post, here we will help you understand how you can protect yourself from this malware by following…

Read More
ComputerWorldIndependent

How blockchain makes self-sovereign identities possible

Credit to Author: Phillip Windley| Date: Wed, 10 Jan 2018 03:12:00 -0800

One of the curious constructions of the Internet is the term identity provider. You don’t need anyone to provide you with an identity, of course. You have an innate one by virtue of being human. Rather, so-called identity providers, or IDPs, provide you with an identifier, a means of recording attributes important to that provider, and some method of proving it’s you – usually a password.

This is not surprising since online identity has traditionally been viewed through the lens of an organization and its needs, not the individual and his or her needs. Identity systems are created to administer identifiers and attributes within a specific domain. The result: people end up with hundreds of online personas at hundreds of organizations. Each of these administrative identity systems is proprietary and owned by the organization that provides it; you really don’t have an online identity that’s independent of these many systems. Got a new address, or an updated credit card number? You’ll have to deal with each of these systems one at a time in whatever manner they require.

To read this article in full, please click here

Read More
ComputerWorldIndependent

How to protect Windows 10 PCs from ransomware

Credit to Author: Preston Gralla| Date: Wed, 10 Jan 2018 03:00:00 -0800

CryptoLocker. WannaCry. Petya. Bad Rabbit. The ransomware threat isn’t going away anytime soon; the news brings constant reports of new waves of this pernicious type of malware washing across the world. It’s popular in large part because of the immediate financial payoff for attackers: It works by encrypting the files on your hard disk, then demands that you pay a ransom, frequently in Bitcoins, to decrypt them.

To read this article in full, please click here

(Insider Story)

Read More
IndependentKrebs

Website Glitch Let Me Overstock My Coinbase

Credit to Author: BrianKrebs| Date: Tue, 09 Jan 2018 18:48:04 +0000

Overstock.com (NASDAQ:OSTK) just fixed a serious glitch in the Coinbase bitcoin payment section of its site that allowed customers to buy any item at a tiny fraction of the listed price. Potentially more punishing, the flaw let anyone paying with bitcoin reap many times the authorized bitcoin refund amount on any canceled orders.

Read More
SecuritySophos

How one letter can lead you to a scam: James Lyne talks typosquatting with NBC News

Credit to Author: matthewphillion| Date: Tue, 09 Jan 2018 18:32:34 +0000

James Lyne talks to NBC Nightly News about the simple, but effective scam, and how you can protect yourself<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=45041&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/veJXf1ZvclY” height=”1″ width=”1″ alt=””/>

Read More
ScadaICSSchneider

How Direct Power Access Results in More Control and Lower Colocation TCO

Credit to Author: Guest Blogger| Date: Tue, 09 Jan 2018 16:00:51 +0000

As the colocation industry becomes commoditized, a premium offering with a high-level of touch gives larger companies — sometimes limited by more traditional models — back some of the data… Read more »

The post How Direct Power Access Results in More Control and Lower Colocation TCO appeared first on Schneider Electric Blog.

Read More