This Week in Security News: Cloud Risks and Container Vulnerability

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 15 Feb 2019 15:00:02 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about this year’s current uses and emerging risks of the cloud. Also, find out what new vulnerability was found in containers. Read on:  Attacking Containers and…

The post This Week in Security News: Cloud Risks and Container Vulnerability appeared first on .

Read more

CIOs, you’re doing blockchain wrong

Credit to Author: Lucas Mearian| Date: Fri, 15 Feb 2019 03:00:00 -0800

IT leaders who’ve taken the plunge into blockchain are mainly deploying it in proofs-of-concept tests to address the same problems a conventional database could handle, according to research firm Gartner.

To read this article in full, please click here

(Insider Story)

Read more

GandCrab Riding Emotet’s Bus!

Credit to Author: Bajrang Mane| Date: Fri, 15 Feb 2019 10:03:57 +0000

Emotet Known for constantly changing its payload and infection vectors like spam mail, Malicious Doc and even Malicious JS files. It compromised a very high number of websites on the internet. Emotet malware campaign has existed since 2014. It comes frequently in intervals with different techniques and variants to deliver malware…

Read more

Mozilla to harden Firefox defenses with site isolation, a la Chrome

Credit to Author: Gregg Keizer| Date: Thu, 14 Feb 2019 11:13:00 -0800

Mozilla plans to boost Firefox’s defensive skills by mimicking the “Site Isolation” technology introduced to Google’s Chrome last year.

Dubbed “Project Fission,” the effort will more granularly separate sites and their individual components than is currently the case in Firefox. The goal: Isolate malicious sites and attack code so individual sites cannot wreak havoc in the browser at large, or pillage the browser, the device or the device’s memory of critical information, such as authentication credentials and encryption keys.

“We aim to build a browser which isn’t just secure against known security vulnerabilities, but also has layers of built-in defense against potential future vulnerabilities,” Nika Layzel, the project tech lead of the Fission team, wrote in a post last week to a Firefox development mailing list. “To accomplish this, we need to revamp the architecture of Firefox and support full Site Isolation.” Layzel also published the note as the first newsletter from the Fission engineering group.

To read this article in full, please click here

Read more

How to use your Mac safely in public places

Credit to Author: Jonny Evans| Date: Thu, 14 Feb 2019 10:59:00 -0800

Coffee shops across the planet are populated by earnest Apple Mac-wielding remote and/or freelance workers – but are they taking steps to protect themselves in a public place? Follow this checklist to make sure you are protected.

12 ways to use your Mac safely in public places

1. Worry about Wi-Fi

Public Wi-Fi networks are dangerous places, not least because you don’t really know how the network is set up or who else is sitting on the same network with you.

Criminals are known to set up legitimate-seeming hotspots on which their software lurks, attempting to take data (including your bank and intranet passcodes) in transit. Please beware:

To read this article in full, please click here

Read more

Don’t Blame Employees who fall for a BEC scam!

Credit to Author: Chris Taylor| Date: Thu, 14 Feb 2019 17:00:55 +0000

The BBC reports that a media company based in Scotland is now suing a former employee who fell for a Business Email Compromise (BEC) scam. In the scam, the employee received emails which appeared to be from the managing director and requested wire transfers. The employee worked with her line manager on the first payment…

The post Don’t Blame Employees who fall for a BEC scam! appeared first on .

Read more

Telco Central Offices are Being Transformed into the Edge to Power the Next Generation of Telco

Credit to Author: Steven Carlini| Date: Thu, 14 Feb 2019 16:00:00 +0000

Next week I am attending Mobile World Congress in Barcelona to talk with customers about the next generation of telco – telco edge. Believe it or not, back in the… Read more »

The post Telco Central Offices are Being Transformed into the Edge to Power the Next Generation of Telco appeared first on Schneider Electric Blog.

Read more

Innovative services contributing to a circular business

Credit to Author: Roger Casellas| Date: Thu, 14 Feb 2019 11:27:00 +0000

We cannot keep doing things the same way: we must move from linear to a circular economic model. Or what is the same, stop with the “take, make, consume and… Read more »

The post Innovative services contributing to a circular business appeared first on Schneider Electric Blog.

Read more

Everything you need to know about hmi software

Credit to Author: Atin Chhabra| Date: Thu, 14 Feb 2019 06:11:56 +0000

Human-machine interface (HMI) software acts as a bridge between machine operators and the system to manage and control operations. Some of the versions of HMI software helps in translating data… Read more »

The post Everything you need to know about hmi software appeared first on Schneider Electric Blog.

Read more