Canada Will Study How Solar Storms Threaten Our Energy Grid

Credit to Author: Kate Lunau| Date: Wed, 06 Sep 2017 12:00:00 +0000
“Our technology is getting more advanced, so we’re more susceptible to space weather.”
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Kate Lunau| Date: Wed, 06 Sep 2017 12:00:00 +0000
“Our technology is getting more advanced, so we’re more susceptible to space weather.”
Read MoreCredit to Author: Sharky| Date: Wed, 06 Sep 2017 03:00:00 -0700
Word comes down from on high that this company will be installing video surveillance systems in dozens of its remote warehouses, reports an IT manager pilot fish on the inside.
“The director of operations decided we needed video surveillance in order to monitor the warehouses in real time,” fish says. “The ability to review video at our corporate office was key to the project.
“Then he signed a contract to start installing these systems with a national vendor without first consulting with IT.”
That results in a series of unexpected phone calls to fish from installers, who need him to drop everything and help them by configuring firewalls, providing them with static IP addresses and then trying to test their systems.
To read this article in full or to leave a comment, please click here

Credit to Author: Lucas Mearian| Date: Tue, 05 Sep 2017 21:04:00 -0700
Enterprise mobility management (EMM) software vendor MobileIron today announced its Apple release, aimed at the growing need for enterprises to provide IT managers with more robust management and security features for Macs.
While Windows and even Chrome-based laptops are already included in EMM consoles, macOS hardware has traditionally been treated as an outlier in the office, according to Nick McGuire, vice president of Enterprise Research at CCS Insight.
While MobileIron’s software suite already supported macOS for basic functions, including device configuration, millennials entering the workforce favor Apple’s line of laptops – driving the need for a unified endpoint management strategy that includes security and bulk licensing, according to Ojas Rege, MobileIron’s chief strategy officer.
To read this article in full or to leave a comment, please click here

Credit to Author: Woody Leonhard| Date: Tue, 05 Sep 2017 05:37:00 -0700
August was a banner month for Windows and Office customers. If I counted correctly, we saw patches on 14 different days last month. The current list of outstanding problems with those patches weighs heavily on my mind, but with the first September non-security Office patches due today, and the September security patches due in a week, it’s time for you to get the August patches out of the way.
To read this article in full or to leave a comment, please click here

Credit to Author: dmitryc| Date: Tue, 05 Sep 2017 19:35:20 +0000
I don’t actually run this SOC (or any other) 🙂 But…but, as a certified “blue team” member, I’m pretty excited with the crop of new companies and ideas that are springing up in the area of SOC analysis, Deception technology, Lateral/external movement, etc. Some of the cool new(ish) vendors that I am falling deeply in … Continue reading I run this SOC!
Read More
Credit to Author: SSD / Maor Schwartz| Date: Tue, 05 Sep 2017 11:11:02 +0000
Vulnerabilities summary The following advisory describes five (5) vulnerabilities and default accounts / passwords found in WiseGiga NAS devices. WiseGiga is a Korean company selling NAS products. The vulnerabilities found in WiseGiga NAS are: Pre-Authentication Local File Inclusion (4 different vulnerabilities) Post-Authentication Local File Inclusion Remote Command Execution as root Remote Command Execution as root … Continue reading SSD Advisory – WiseGiga NAS Multiple Vulnerabilities
Read More
Credit to Author: Jordan Pearson| Date: Tue, 05 Sep 2017 21:16:43 +0000
Scotland joins the growing list of countries looking to test a basic income.
Read More
Our panel looks at whether smartwatch makers blew it by not focusing on the enterprise, why intent-based networking is the next big thing, whether GPS spoofing is real, and how high is too high when it comes to iPhone prices.