Month: February 2019

MicrosoftSecurity

Step 5. Set up mobile device management: top 10 actions to secure your environment

Credit to Author: Debbie Seres| Date: Thu, 14 Feb 2019 17:00:35 +0000

The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In Step 5. Set up mobile device management, youll learn how to plan your Microsoft Intune deployment and set up Mobile Device Management (MDM) as part of your Unified Endpoint Management (UEM) strategy.

The post Step 5. Set up mobile device management: top 10 actions to secure your environment appeared first on Microsoft Secure.

Read More
SecurityTrendMicro

Part 2: Mobile Banking and Buying: Best Practices

Credit to Author: Trend Micro| Date: Thu, 14 Feb 2019 14:40:19 +0000

In the first part of this two-part blog, we outlined the kinds of banking and buying you can do on your mobile device, but also the things to watch out for. You might have noticed that our cautionary notes center around four threat vectors you need to track to stay safe: device, app, network, and…

The post Part 2: Mobile Banking and Buying: Best Practices appeared first on .

Read More
ComputerWorldIndependent

All about Android upgrades (and why they're late) | TECH(talk)

Credit to Author: Ken Mingis| Date: Thu, 14 Feb 2019 03:00:00 -0800

It’s not exactly news that Android upgrades almost always take a lo-o-o-o-o-ng time to roll out to most users. As in months. Often, many months. Sometimes more than a year.

Sometimes never.

(There is an exception: Google delivers new versions of Android to its Pixel line right away, and did just that with the release of Android 9.0 (Pie) last fall.)

It’s now been six months since Pie arrived, which means it’s time for Computerworld blogger JR Raphael’s comprehensive look at how device-makers are doing when it comes to upgrades. 

To read this article in full, please click here

Read More
IndependentKrebs

Bomb Threat Hoaxer Exposed by Hacked Gaming Site

Credit to Author: BrianKrebs| Date: Thu, 14 Feb 2019 05:37:06 +0000

Federal authorities this week arrested a North Carolina man who allegedly ran with a group of online hooligans that attacked Web sites (including this one), took requests on Twitter to call in bomb threats to thousands of schools, and tried to frame various online gaming sites as the culprits. In an ironic twist, the accused — who had fairly well separated his real life identity from his online personas — appears to have been caught after a gaming Web site he frequented got hacked.

Read More