Security

SecurityTrendMicro

What Enterprise Leaders Should know about Persistent Threats in 2019

Credit to Author: Trend Micro| Date: Thu, 31 Jan 2019 15:00:29 +0000

Staving off critical threats in the current cybersecurity landscape is a tall order for any size organization. As hackers continually shift and improve upon their attack and breach strategies, IT and security stakeholders must do their best to keep up and remain informed of these trends. This is one of the best and most successful…

The post What Enterprise Leaders Should know about Persistent Threats in 2019 appeared first on .

Read More
ComputerWorldIndependent

Microsoft Patch Alert: January patches include a reprisal of KB 4023057 and a swarm of lesser bugs

Credit to Author: Woody Leonhard| Date: Wed, 30 Jan 2019 09:12:00 -0800

In general, the January patches look relatively benign, but for some folks in some situations they can bite. Hard.

On the surface we’ve seen the usual Patch Tuesday Cumulative Updates and secondary Cumulative Updates for all versions of Windows 10. Microsoft calls the secondary Cumulative Updates “optional” because you only get them if you click “Check for updates.”

Windows 7 and 8.1 got their usual Monthly Rollups, but there’s a problem. Specifically, this month’s Win7 Monthly Rollup has a couple of bugs that are only fixed if you install the preview of February’s Monthly Rollup. Which makes no sense at all, but that’s Microsoft. There’s another Win7 Monthly Rollup bug that’s fixed by installing a different “silver bullet” patch.

To read this article in full, please click here

Read More
SecurityTrendMicro

How Machine Learning can Expose and Illustrate Network Threats

Credit to Author: Trend Micro| Date: Wed, 30 Jan 2019 14:34:21 +0000

Although machine learning algorithms have been around for years, additional use cases are being discovered and applied all the time, particularly when it comes to network and data security. As years have passed, the skills and sophisticated approaches being utilized by hackers have risen in severity and frequency, and white hats as well as enterprise…

The post How Machine Learning can Expose and Illustrate Network Threats appeared first on .

Read More
ComputerWorldIndependent

It's a hack!

Credit to Author: Sharky| Date: Wed, 30 Jan 2019 03:00:00 -0800

It’s a few years after Y2K, and this pilot fish has overall responsibility for all things related to his company’s website.

“Like most corporations, our company had a policy that computers and laptops were to be used only for company business, along with policies governing the appropriate use of the internet in the work environment,” fish says.

“After arriving at work one morning, I opened my email to find a frantic message from our CEO to me and our internet security manager, stating that our website had been hacked.”

The big boss knows this is the case because there are spammy images and text on the home page, among other issues. Not surprisingly, the CEO is adamant that this must be resolved ASAP.

To read this article in full, please click here

Read More