CIOs, you’re doing blockchain wrong

Credit to Author: Lucas Mearian| Date: Fri, 15 Feb 2019 03:00:00 -0800

IT leaders who’ve taken the plunge into blockchain are mainly deploying it in proofs-of-concept tests to address the same problems a conventional database could handle, according to research firm Gartner.

To read this article in full, please click here

(Insider Story)

Read more

Mozilla to harden Firefox defenses with site isolation, a la Chrome

Credit to Author: Gregg Keizer| Date: Thu, 14 Feb 2019 11:13:00 -0800

Mozilla plans to boost Firefox’s defensive skills by mimicking the “Site Isolation” technology introduced to Google’s Chrome last year.

Dubbed “Project Fission,” the effort will more granularly separate sites and their individual components than is currently the case in Firefox. The goal: Isolate malicious sites and attack code so individual sites cannot wreak havoc in the browser at large, or pillage the browser, the device or the device’s memory of critical information, such as authentication credentials and encryption keys.

“We aim to build a browser which isn’t just secure against known security vulnerabilities, but also has layers of built-in defense against potential future vulnerabilities,” Nika Layzel, the project tech lead of the Fission team, wrote in a post last week to a Firefox development mailing list. “To accomplish this, we need to revamp the architecture of Firefox and support full Site Isolation.” Layzel also published the note as the first newsletter from the Fission engineering group.

To read this article in full, please click here

Read more

How to use your Mac safely in public places

Credit to Author: Jonny Evans| Date: Thu, 14 Feb 2019 10:59:00 -0800

Coffee shops across the planet are populated by earnest Apple Mac-wielding remote and/or freelance workers – but are they taking steps to protect themselves in a public place? Follow this checklist to make sure you are protected.

12 ways to use your Mac safely in public places

1. Worry about Wi-Fi

Public Wi-Fi networks are dangerous places, not least because you don’t really know how the network is set up or who else is sitting on the same network with you.

Criminals are known to set up legitimate-seeming hotspots on which their software lurks, attempting to take data (including your bank and intranet passcodes) in transit. Please beware:

To read this article in full, please click here

Read more

All about Android upgrades (and why they're late) | TECH(talk)

Credit to Author: Ken Mingis| Date: Thu, 14 Feb 2019 03:00:00 -0800

It’s not exactly news that Android upgrades almost always take a lo-o-o-o-o-ng time to roll out to most users. As in months. Often, many months. Sometimes more than a year.

Sometimes never.

(There is an exception: Google delivers new versions of Android to its Pixel line right away, and did just that with the release of Android 9.0 (Pie) last fall.)

It’s now been six months since Pie arrived, which means it’s time for Computerworld blogger JR Raphael’s comprehensive look at how device-makers are doing when it comes to upgrades. 

To read this article in full, please click here

Read more

With latest mobile security hole, could we at least focus on the right things?

Credit to Author: Evan Schuman| Date: Wed, 13 Feb 2019 03:00:00 -0800

A bunch of apps from some major players — including Expedia, Hollister, Air Canada, Abercrombie & Fitch, Hotels.com and Singapore Airlines — recently came to grief because of a security/privacy hole in a third-party analytics app they all used, according to a report from TechCrunch. The incident exposed extremely sensitive customer information including payment card and password data shared in clear text. That sort of thing shouldn’t be happening — and yet everyone seems focused on the wrong lesson.

The analytics app, called Glassbox, captures all information from a user’s interaction with the app, including keystrokes entered and spots on the touchscreen the user touched or clicked. It also may include some screen captures. In every case, the apps give insufficient privacy disclosures to app users, or none at all. And, as already mentioned, it shares sensitive data in clear text.

To read this article in full, please click here

Read more

It's time to block Windows Automatic Updating

Credit to Author: Woody Leonhard| Date: Mon, 11 Feb 2019 05:15:00 -0800

Those of you who feel it’s important to install Windows and Office patches the moment they come out – I salute you. The Windows world needs more cannon fodder. When the bugs come out, as they inevitably will, I hope you’ll drop by AskWoody.com and tell us all about them.

For those who feel that, given Microsoft’s track record of pernicious patches, a bit of reticence is in order, I have some good news. Microsoft’s Security Response Center says that only a tiny percentage of patched security holes get exploited within 30 days of the patch becoming available.

To read this article in full, please click here

Read more

(Insider Story)

Read more

How to stay as private as possible on Apple's iPad and iPhone

Credit to Author: Jonny Evans| Date: Fri, 08 Feb 2019 09:39:00 -0800

Apple believes in your right to privacy. Here is some advice on how to use the tools it has given you to protect your privacy on an iOS device.

Use a better passcode

You probably already use a 4-digit passcode, but you can improve that with a 6-digit or alphanumeric code.

You change this in Settings>Touch ID/Face ID & Passcode, select Change Passcode and then tap the small Passcode Options dialog. Alphanumeric codes are harder to decipher, just make sure you remember the code.

To read this article in full, please click here

Read more

Microsoft: Watch out for zero days; deferred patches, not so much

Credit to Author: Woody Leonhard| Date: Fri, 08 Feb 2019 08:32:00 -0800

Matt Miller’s presentation at Blue Hat yesterday included some startling statistics, based on data gathered by Microsoft’s Security Response Center. The numbers starkly confirm what we’ve been saying for years: The chances of getting hit with malware by delaying Windows and Office patches for up to 30 days is tiny compared to all the other ways of getting clobbered.

To read this article in full, please click here

Read more

Get TotalAV Essential AntiVirus for $19.99 (80% off)

Credit to Author: DealPost Team| Date: Thu, 07 Feb 2019 11:11:00 -0800

The term “computer virus” calls to mind imagery of pathogenic creepy-crawlies bringing down a device’s operating system, their flagella wriggling as they multiply into hordes that infiltrate its chips and wires. And while it’s true that our computers can be infected with literal biological bacteria like staphylococci, per Science Illustrated, the threat of malicious codes and programs intent on corrupting data and files looms far larger: According to a recent study from the University of Maryland’s Clark School of Engineering, attacks on computers with internet access is virtually ceaseless, with an incident occurring every 39 seconds on average, affecting a third of Americans every year.

To read this article in full, please click here

Read more

Why Apple is disabling Safari’s Do Not Track feature

Credit to Author: Jonny Evans| Date: Thu, 07 Feb 2019 03:34:00 -0800

Apple takes privacy very seriously. It takes its leadership in that care seriously, and getting rid of the voluntary ‘Do Not Track’ setting in its Safari browser is the right decision.

Why disabling Safari’s Do Not Track feature is the right thing to do

Apple introduced support for Do Not Track (DNT) in iOS 7, but removed the feature in Safari 12.1.

The problem with DNT is that the signal it sends to websites, analytics firms, plug-in makers and ad networks is a voluntary request, and can be ignored.

To read this article in full, please click here

Read more