Security

ComputerWorldIndependent

All about Android upgrades (and why they're late) | TECH(talk)

Credit to Author: Ken Mingis| Date: Thu, 14 Feb 2019 03:00:00 -0800

It’s not exactly news that Android upgrades almost always take a lo-o-o-o-o-ng time to roll out to most users. As in months. Often, many months. Sometimes more than a year.

Sometimes never.

(There is an exception: Google delivers new versions of Android to its Pixel line right away, and did just that with the release of Android 9.0 (Pie) last fall.)

It’s now been six months since Pie arrived, which means it’s time for Computerworld blogger JR Raphael’s comprehensive look at how device-makers are doing when it comes to upgrades. 

To read this article in full, please click here

Read More
SecurityTrendMicro

The Cloud in 2019: Current Uses and Emerging Risks

Credit to Author: Trend Micro| Date: Wed, 13 Feb 2019 15:48:32 +0000

In the current tech landscape, one would be hard-pressed to find an organization that operates without the help of cloud environments and capabilities. From data storage and document sharing to enabling remote access and communication, the cloud represents the most critical linchpin of today’s IT-focused business processes. What’s more, the power of the cloud is…

The post The Cloud in 2019: Current Uses and Emerging Risks appeared first on .

Read More
ComputerWorldIndependent

With latest mobile security hole, could we at least focus on the right things?

Credit to Author: Evan Schuman| Date: Wed, 13 Feb 2019 03:00:00 -0800

A bunch of apps from some major players — including Expedia, Hollister, Air Canada, Abercrombie & Fitch, Hotels.com and Singapore Airlines — recently came to grief because of a security/privacy hole in a third-party analytics app they all used, according to a report from TechCrunch. The incident exposed extremely sensitive customer information including payment card and password data shared in clear text. That sort of thing shouldn’t be happening — and yet everyone seems focused on the wrong lesson.

The analytics app, called Glassbox, captures all information from a user’s interaction with the app, including keystrokes entered and spots on the touchscreen the user touched or clicked. It also may include some screen captures. In every case, the apps give insufficient privacy disclosures to app users, or none at all. And, as already mentioned, it shares sensitive data in clear text.

To read this article in full, please click here

Read More
SecurityTrendMicro

Attacking Containers and runC

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Tue, 12 Feb 2019 19:22:35 +0000

This week a new vulnerability was published (CVE-2019-5736) that highlights everything bad and good about containers. Simply put, this vulnerability can be exploited using an infected container to attack the host. It’s a real world example of a breakout attack that has long been a major concern in virtualized and container environment. Here, the attack…

The post Attacking Containers and runC appeared first on .

Read More