CIOs, you’re doing blockchain wrong

Credit to Author: Lucas Mearian| Date: Fri, 15 Feb 2019 03:00:00 -0800

IT leaders who’ve taken the plunge into blockchain are mainly deploying it in proofs-of-concept tests to address the same problems a conventional database could handle, according to research firm Gartner.

To read this article in full, please click here

(Insider Story)

Read more

Mozilla to harden Firefox defenses with site isolation, a la Chrome

Credit to Author: Gregg Keizer| Date: Thu, 14 Feb 2019 11:13:00 -0800

Mozilla plans to boost Firefox’s defensive skills by mimicking the “Site Isolation” technology introduced to Google’s Chrome last year.

Dubbed “Project Fission,” the effort will more granularly separate sites and their individual components than is currently the case in Firefox. The goal: Isolate malicious sites and attack code so individual sites cannot wreak havoc in the browser at large, or pillage the browser, the device or the device’s memory of critical information, such as authentication credentials and encryption keys.

“We aim to build a browser which isn’t just secure against known security vulnerabilities, but also has layers of built-in defense against potential future vulnerabilities,” Nika Layzel, the project tech lead of the Fission team, wrote in a post last week to a Firefox development mailing list. “To accomplish this, we need to revamp the architecture of Firefox and support full Site Isolation.” Layzel also published the note as the first newsletter from the Fission engineering group.

To read this article in full, please click here

Read more

How to use your Mac safely in public places

Credit to Author: Jonny Evans| Date: Thu, 14 Feb 2019 10:59:00 -0800

Coffee shops across the planet are populated by earnest Apple Mac-wielding remote and/or freelance workers – but are they taking steps to protect themselves in a public place? Follow this checklist to make sure you are protected.

12 ways to use your Mac safely in public places

1. Worry about Wi-Fi

Public Wi-Fi networks are dangerous places, not least because you don’t really know how the network is set up or who else is sitting on the same network with you.

Criminals are known to set up legitimate-seeming hotspots on which their software lurks, attempting to take data (including your bank and intranet passcodes) in transit. Please beware:

To read this article in full, please click here

Read more

All about Android upgrades (and why they're late) | TECH(talk)

Credit to Author: Ken Mingis| Date: Thu, 14 Feb 2019 03:00:00 -0800

It’s not exactly news that Android upgrades almost always take a lo-o-o-o-o-ng time to roll out to most users. As in months. Often, many months. Sometimes more than a year.

Sometimes never.

(There is an exception: Google delivers new versions of Android to its Pixel line right away, and did just that with the release of Android 9.0 (Pie) last fall.)

It’s now been six months since Pie arrived, which means it’s time for Computerworld blogger JR Raphael’s comprehensive look at how device-makers are doing when it comes to upgrades. 

To read this article in full, please click here

Read more

Bomb Threat Hoaxer Exposed by Hacked Gaming Site

Credit to Author: BrianKrebs| Date: Thu, 14 Feb 2019 05:37:06 +0000

Federal authorities this week arrested a North Carolina man who allegedly ran with a group of online hooligans that attacked Web sites (including this one), took requests on Twitter to call in bomb threats to thousands of schools, and tried to frame various online gaming sites as the culprits. In an ironic twist, the accused — who had fairly well separated his real life identity from his online personas — appears to have been caught after a gaming Web site he frequented got hacked.

Read more

With latest mobile security hole, could we at least focus on the right things?

Credit to Author: Evan Schuman| Date: Wed, 13 Feb 2019 03:00:00 -0800

A bunch of apps from some major players — including Expedia, Hollister, Air Canada, Abercrombie & Fitch, Hotels.com and Singapore Airlines — recently came to grief because of a security/privacy hole in a third-party analytics app they all used, according to a report from TechCrunch. The incident exposed extremely sensitive customer information including payment card and password data shared in clear text. That sort of thing shouldn’t be happening — and yet everyone seems focused on the wrong lesson.

The analytics app, called Glassbox, captures all information from a user’s interaction with the app, including keystrokes entered and spots on the touchscreen the user touched or clicked. It also may include some screen captures. In every case, the apps give insufficient privacy disclosures to app users, or none at all. And, as already mentioned, it shares sensitive data in clear text.

To read this article in full, please click here

Read more

Patch Tuesday, February 2019 Edition

Credit to Author: BrianKrebs| Date: Wed, 13 Feb 2019 03:31:36 +0000

Microsoft on Tuesday issued a bevy of patches to correct at least 70 distinct security vulnerabilities in Windows and software designed to interact with various flavors of the operating system. This month’s patch batch tackles some notable threats to enterprises — including multiple flaws that were publicly disclosed prior to Patch Tuesday. It also bundles fixes to quash threats relevant to end users, including critical updates for Adobe Flash Player and Microsoft Office, as well as a zero-day bug in Internet Explorer.

Read more

Email Provider VFEmail Suffers ‘Catastrophic’ Hack

Credit to Author: BrianKrebs| Date: Tue, 12 Feb 2019 13:33:31 +0000

Email provider VFEmail has suffered what the company is calling “catastrophic destruction” at the hands of an as-yet unknown intruder who trashed all of the company’s primary and backup data in the United States. The firm’s founder says he now fears some 18 years’ worth of customer email may be gone forever.

Read more

It's time to block Windows Automatic Updating

Credit to Author: Woody Leonhard| Date: Mon, 11 Feb 2019 05:15:00 -0800

Those of you who feel it’s important to install Windows and Office patches the moment they come out – I salute you. The Windows world needs more cannon fodder. When the bugs come out, as they inevitably will, I hope you’ll drop by AskWoody.com and tell us all about them.

For those who feel that, given Microsoft’s track record of pernicious patches, a bit of reticence is in order, I have some good news. Microsoft’s Security Response Center says that only a tiny percentage of patched security holes get exploited within 30 days of the patch becoming available.

To read this article in full, please click here

Read more

(Insider Story)

Read more

How to stay as private as possible on Apple's iPad and iPhone

Credit to Author: Jonny Evans| Date: Fri, 08 Feb 2019 09:39:00 -0800

Apple believes in your right to privacy. Here is some advice on how to use the tools it has given you to protect your privacy on an iOS device.

Use a better passcode

You probably already use a 4-digit passcode, but you can improve that with a 6-digit or alphanumeric code.

You change this in Settings>Touch ID/Face ID & Passcode, select Change Passcode and then tap the small Passcode Options dialog. Alphanumeric codes are harder to decipher, just make sure you remember the code.

To read this article in full, please click here

Read more