Month: September 2018

ComputerWorldIndependent

Time to turn off Windows Automatic Update and brace for impact

Credit to Author: Woody Leonhard| Date: Mon, 10 Sep 2018 06:19:00 -0700

August 2018 was a relatively innocuous patching month, although the final resolution to the August problems didn’t appear until late Friday night just as the month was coming to a close — on a three-day weekend in the US.

We’ve seen the same pattern repeat itself almost every month since the beginning of the year: The first round of Microsoft security patches (notably including Win10 patches) introduce bugs, while subsequent rounds of patches each month squash most of them. If we’re lucky.

To read this article in full, please click here

Read More
ComputerWorldIndependent

Mac and iOS apps stealing user data — an enterprise take

Credit to Author: Jonny Evans| Date: Mon, 10 Sep 2018 04:53:00 -0700

Reports claiming numerous apps distributed through Apple’s App Store are secretly exfiltrating user data should be an alarm call to enterprise CIOs. It signals a new battlefront in the eternal enterprise security wars.

The enterprise risk of personal data

On the surface, the data being extracted is kind of … personal, such as location and browser histories. Information like that provides additional insight into what individual users are up to. Why should that concern an enterprise?

That’s a rhetorical question, of course. Most enterprise security professionals recognize that any form of data exfiltration poses an overall challenge.

To read this article in full, please click here

Read More
ComputerWorldIndependent

Mac and iOS apps stealing user data, an enterprise take

Credit to Author: Jonny Evans| Date: Mon, 10 Sep 2018 04:53:00 -0700

Reports claiming numerous apps distributed through Apple’s App Store are secretly exfiltrating user data should be an alarm call to enterprise CIOs. It signals a new battlefront in the eternal enterprise security wars.

The enterprise risk of personal data

On the surface, the data being extracted is kind of… personal: Location, browser histories, information like this provides additional insight into what individual users are up to. Why should that concern an enterprise?

That’s a rhetorical question, of course. Most enterprise security professionals recognize that any form of data exfiltration poses an overall challenge.

To read this article in full, please click here

Read More