Independent

ComputerWorldIndependent

Getting buy-in to combat risk

Credit to Author: Mathias Thurman| Date: Mon, 13 Feb 2017 03:45:00 -0800

When I start at a new company, I make a point of meeting with key personnel from the departments that have the greatest potential for security risk, including operations, engineering, customer service, IT, finance, facilities and human resources. It’s a good way to unearth risks that might not be obvious to me and to get all of those people thinking in terms of security.

Read More
ComputerWorldIndependent

Intel, McAfee dispute heads for settlement talks

Credit to Author: John Ribeiro| Date: Mon, 13 Feb 2017 03:22:00 -0800

A dispute between Intel and security expert John McAfee over the use of his name for another company is headed for settlement talks, according to court records.

The move comes shortly after the federal court refused John McAfee and MGT Capital Investments, the company to be renamed, a preliminary injunction on Intel’s transfer of marks and related assets containing the word McAfee, as part of a proposed spin-out by the chipmaker of its security business as a separate company that would be called McAfee.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Why Twitter's new anti-harassment tools will fail

Credit to Author: Mike Elgan| Date: Sat, 11 Feb 2017 04:01:00 -0800

Twitter is trying to curb harassment. Again.

Twitter VP of Engineering Ed Ho this week announced three changes that Twitter believes will end its reputation as a haven for trolls, haters, spammers, misogynists, racists and idiots.

Two years ago, Twitter’s then-CEO Dick Costolo was quoted in a leaked memo saying that “We suck at dealing with abuse and trolls on the platform and we’ve sucked at it for years.”

Read More
ComputerWorldIndependent

Privacy groups say FBI hacking operation went too far

Credit to Author: Michael Kan| Date: Fri, 10 Feb 2017 14:48:00 -0800

Privacy advocates are claiming in court that an FBI hacking operation to take down a child pornography site was unconstitutional and violated international law.

That’s because the operation involved the FBI hacking 8,700 computers in 120 countries, based on a single warrant, they said.

“How will other countries react to the FBI hacking in their jurisdictions without prior consent?” wrote Scarlet Kim, a legal officer with U.K.-based Privacy International.

On Friday, that group, along with the Electronic Frontier Foundation (EFF) and the American Civil Liberties Union of Massachusetts, filed briefs in a lawsuit involving the FBI’s hacking operation against Playpen. The child pornography site was accessible through Tor, a browser designed for anonymous web surfing. But in 2014, the FBI managed to take it over.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

25% off Kuna Smart Home Security Outdoor Light & Camera – Deal Alert

Credit to Author: DealPost Team| Date: Fri, 10 Feb 2017 13:04:00 -0800

Kuna is a smart home security camera in a stylish outdoor light that detects and allows you to interact with people outside your door. The security device includes HD live and recorded video, two-way intercom, alarm, smart motion detection alerts to your phone, and more. Easy 15 minute installation with no batteries to replace so you have continuous protection around the clock. Be protected at all times – Access HD live video with its 720P wide angle camera, communicate via its two way intercom from your mobile device, or activate its 100 dB alarm siren. Smart light control lets you turn on or off your lights remotely, or program a schedule for when you’re away. Access live video or review & download events for 2 hours free or up to 30-days on an optional subscription plan, starting as low as $4.99 per month. This Kuna security light averages 4 out of 5 stars from over 600 people (read reviews), and its typical list price of $199 has been reduced 25% to $149. See the discounted Kuna Smart Home Security Light and Camera on Amazon.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Microsoft unveils a bonanza of security capabilities

Credit to Author: Blair Hanley Frank| Date: Fri, 10 Feb 2017 10:47:00 -0800

Companies concerned about cybersecurity have a fleet of new Microsoft tools coming their way. The company announced a host of new security capabilities Friday morning as part of the run-up to the massive RSA security conference next week in San Francisco.

On the Windows front, the company announced that it’s adding the ability to use on-premises Active Directory with Windows Hello, its system for allowing biometric-based logins with Windows 10. Microsoft also launched new tools to help organizations get more use out of mobile device management products by giving them tools to migrate group policy settings to cloud-managed devices.

What’s more, Microsoft has launched a new tool that’s designed to help customers configure Surface hardware, doing things like disabling the tablets’ cameras. 

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Recent WordPress vulnerability used to deface 1.5 million pages

Up to 20 attackers or groups of attackers are defacing WordPress websites that haven’t yet applied a recent patch for a critical vulnerability.

The vulnerability, located in the platform’s REST API, allows unauthenticated attackers to modify the content of any post or page within a WordPress site. The flaw was fixed in WordPress 4.7.2, released on Jan. 26, but the WordPress team did not publicly disclose the vulnerability’s existence until a week later, to allow enough time for a large number of users to deploy the update.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Apple's iCloud saved deleted browser records

Apple’s iCloud appears to have been holding on to users’ deleted internet browsing histories, including records over a year old.

Moscow-based forensics firm Elcomsoft noticed it was able to pull supposedly deleted Safari browser histories from iCloud accounts, such as the date and time the site was visited and when the record was deleted.

“In fact, we were able to access records dated more than one year back,” wrote Elcomsoft’s CEO Vladimir Katalov in a Thursday blog post.

Users can set iCloud to store their browsing history so that it’s available from all connected devices. The researchers found that when a user deletes that history, iCloud doesn’t actually erase it but keeps it in a format invisible to the user.

To read this article in full or to leave a comment, please click here

Read More