Independent

ComputerWorldIndependent

Jamf adds network and endpoint security tools for enterprise Macs

Credit to Author: Jonny Evans| Date: Tue, 26 Apr 2022 07:46:00 -0700

Jamf has announced a series of significant updates to Jamf Protect, introducing a unique set of technologies designed to make enterprise devices more secure while also identifying and responding to incoming endpoint threats. The company also introduced, Jamf Trust, which aims to make this kind of security simple to use. (The latter is also available for Android and Windows.)

What’s new in Jamf Protect?

The big news for Mac security, Jamf Protect, now offers a comprehensive endpoint and network security solution, supplementing its existing protections with new tools for:

To read this article in full, please click here

Read More
IndependentKrebs

Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code

Credit to Author: BrianKrebs| Date: Fri, 22 Apr 2022 13:09:39 +0000

KrebsOnSecurity recently reviewed a copy of the private chat messages between members of the LAPSUS$ cybercrime group in the week leading up to the arrest of its most active members last month. The logs show LAPSUS$ breached T-Mobile multiple times in March, stealing source code for a range of company projects. T-Mobile says no customer or government information was stolen in the intrusion. LAPSUS$ is known for stealing data and then demanding a ransom not to publish or sell it. But the leaked chats indicate this mercenary activity was of little interest to the tyrannical teenage leader of LAPSUS$, whose obsession with stealing and leaking proprietary computer source code from the world’s largest tech companies ultimately led to the group’s undoing.

Read More
ComputerWorldIndependent

When it comes to data, resist your inner packrat

Credit to Author: Paul Gillin| Date: Fri, 22 Apr 2022 04:30:00 -0700

Human beings are natural pack rats, as evidenced by the 2.3 billion square feet of self-storage space that’s in use in the U.S. Fear of getting rid of stuff even has a name: disposophobia.

Keeping every pair of shoes your kids have ever worn isn’t a problem for anyone except those with whom you share living space.

But the same rules don’t apply to data.

All industries have records retention guidelines spelled out in compliance rules. They are usually strictly enforced for regulated companies, and firms that run afoul of them can be punished.

To read this article in full, please click here

Read More
ComputerWorldIndependent

In a remote-work world, a zero-trust revolution is necessary

Credit to Author: Mike Elgan| Date: Fri, 22 Apr 2022 03:00:00 -0700

Last summer, law enforcement officials contacted both Apple and Meta, demanding customer data in “emergency data requests.” The companies complied. Unfortunately, the “officials” turned out to be hackers affiliated with a cyber-gang called “Recursion Team.”

Roughly three years ago, the CEO of a UK-based energy company got a call from the CEO of the company’s German parent company instructing him to wire a quarter of a million dollars to a Hungarian “supplier.” He complied. Sadly, the German “CEO” was in fact a cybercriminal using deepfake audio technology to spoof the other man’s voice.

To read this article in full, please click here

Read More
ComputerWorldIndependent

12 Android settings that'll strengthen your security

Credit to Author: JR Raphael| Date: Fri, 22 Apr 2022 02:50:00 -0700

You might not know it from all the panic-inducing headlines out there, but Android is actually packed with practical and powerful security options. Some are activated by default and protecting you whether you realize it or not, while others are more out of the way but equally deserving of your attention.

So stop wasting your time worrying about the Android malware monster du jour and which security company is using it to scare you into an unnecessary subscription, and take a moment instead to look through these far more impactful Android settings — ranging from core system-level elements to some more advanced and easily overlooked options.

To read this article in full, please click here

Read More
ComputerWorldIndependent

California eyes law to protect workers from digital surveillance

Credit to Author: Matthew Finnegan| Date: Thu, 21 Apr 2022 09:01:00 -0700

The California State Assembly is considering new rules that would offer workers greater protection from the use of digital monitoring tools by employers.

The “Workplace Technology Accountability Act” (AB 1651), introduced by Assemblymember Ash Kalra, would create a way to protect workers against the use of technologies that can negatively affect privacy and wellbeing.

The bill would “establish much needed, yet reasonable, limitations on how employers use data-driven technology at work,” Kalra told the Assembly Labor and Employment Committee on Wednesday. “The time is now to address the increasing use of unregulated data-driven technologies in the workplace and give workers — and the state — the necessary tools to mitigate any insidious impacts caused by them.”

To read this article in full, please click here

Read More
ComputerWorldIndependent

Top 6 e-signature software tools

Credit to Author: Keith Shaw| Date: Wed, 20 Apr 2022 03:00:00 -0700

The COVID-19 pandemic did not just disrupt physical meetings and physical office spaces; workflows that relied on in-person interaction, such as signing documents and contracts, were also highly impacted. Electronic signature (e-signature) software has surged in popularity over the past two years as enterprises looked to modify their signature workflows to support a remote workforce, said Holly Muscolino, group vice president for content strategies and future of work at IDC.

With many companies returning to an in-person office environment or adopting a hybrid workforce approach, where employees work some days in the office and some at home, e-signature vendors are working to convince businesses that they are still relevant. Although the market has slowed down, Muscolino said, “it’s still showing healthy growth, because there are still companies who have not adopted this technology. There is still significant room for adoption.”

To read this article in full, please click here

Read More
IndependentKrebs

Conti’s Ransomware Toll on the Healthcare Industry

Credit to Author: BrianKrebs| Date: Mon, 18 Apr 2022 20:41:08 +0000

Conti — one of the most ruthless and successful Russian ransomware groups — publicly declared during the height of the COVID-19 pandemic that it would refrain from targeting healthcare providers. But new information confirms this pledge was always a lie, and that Conti has launched more than 200 attacks against hospitals and other healthcare facilities since first surfacing in 2018 under the name “Ryuk.”

Read More