Security

ComputerWorldIndependent

Blockchain: The complete guide

Credit to Author: Lucas Mearian| Date: Tue, 29 Jan 2019 16:13:00 -0800

Blockchain, which began to emerge as a real-world tech option in 2016 and 2017, is poised to change IT in much the same way open-source software did a quarter century ago. And in the same way Linux took more than a decade to become a cornerstone in modern application development, Blockchain will likely take years to become a lower cost, more efficient way to share information and data between open and private business networks.

Based on a distributed, peer-to-peer (P2P) topology, blockchain or distributed ledger technology (DLT) allows data to be stored globally on thousands of servers – while letting anyone on the network see everyone else’s entries in real-time. That makes it difficult for one user to gain control of, or game, the network.

To read this article in full, please click here

Read More
ComputerWorldIndependent

Get 140+ Hours Of CompTIA Certification Training For $59 (90% Off)

Credit to Author: DealPost Team| Date: Tue, 29 Jan 2019 10:35:00 -0800

Read More
SecurityTrendMicro

Informing Your Security Posture: How Cybercriminals Blend into the Background

Credit to Author: Trend Micro| Date: Tue, 29 Jan 2019 14:00:23 +0000

Maintaining protection over an enterprise’s critical data, systems and assets is a continual uphill battle. Not only are chances good that the business’s digital footprint is growing through new applications, but hackers are also constantly bolstering their capabilities to silently breach platforms and maintain a presence under the radar of the IT team. In the…

The post Informing Your Security Posture: How Cybercriminals Blend into the Background appeared first on .

Read More
ComputerWorldIndependent

Apple’s Group FaceTime: A place for spies?

Credit to Author: Jonny Evans| Date: Tue, 29 Jan 2019 05:30:00 -0800

Apple has disabled Group FaceTime following discovery of a flaw that could potentially let people hear audio from other people’s devices without permission. What’s going on and what can you do about it?

The bug, in brief

9to5Mareport based on a video published to Twitter by @BmManski revealed that this flaw lets a user listen to audio captured using another person’s device before they accept or reject the call requesting a FaceTime chat. The problem only affects iOS devices running iOS 12.1 or later (pending an update).

To read this article in full, please click here

Read More
QuickHealSecurity

Anatova, A modular ransomware

Credit to Author: Shriram Munde| Date: Tue, 29 Jan 2019 06:09:49 +0000

While everyone was engaged in new year celebrations, malware authors were busy creating new ransomware for 2019. Quick Heal Security Labs has discovered the first ransomware of 2019 — Anatova ransomware. During our analysis, we found that Anatova is not just ransomware but a modular one. By modular ransomware we…

Read More