Security

ComputerWorldIndependent

Apple wants to stop you using dangerous USB-C devices

Credit to Author: Jonny Evans| Date: Fri, 04 Jan 2019 07:16:00 -0800

Apple wants to make it harder for its customers to use cheap USB-C cables – and it’s for your own good.

These are the risks of USB-C cables

Cables are complicated and that’s why friends don’t let friends connect cut-price or otherwise unverified USB-C cables to their systems –and soon, you won’t be able to.

Apple has warned its users to avoid using low-quality equipment for years. It was only in 2016 that it was revealed that hundreds of chargers at that time sold on Amazon and advertised as being made by Apple were in fact dangerous fakes.

To read this article in full, please click here

Read More
SecurityTrendMicro

This Week in Security News: Spyware and Data Breaches

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 04 Jan 2019 15:13:45 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about a spyware that disguised itself as an Android application to gather information from users. Also, find out the biggest global data breaches of 2018 and…

The post This Week in Security News: Spyware and Data Breaches appeared first on .

Read More
SecurityTrendMicro

Server Security for the Modern IT Ecosystem

Credit to Author: Trend Micro| Date: Thu, 03 Jan 2019 15:30:46 +0000

A Changing Landscape In recent years we’ve seen a fundamental shift in the IT landscape, accelerated towards cloud and containerized infrastructures. According to Forbes, by 2020 it is predicted that 83 percent of enterprise workloads will be in the cloud. Moving beyond the cloud, software development teams are driving further change with the adoption of…

The post Server Security for the Modern IT Ecosystem appeared first on .

Read More
ComputerWorldIndependent

New year, same old users

Credit to Author: Sharky| Date: Thu, 03 Jan 2019 03:00:00 -0800

IT support pilot fish takes a call to help a user change a password on a webpage form — and it reminds fish of just how much help-desk techs love password resets.

“I spent 25 minutes talking to him,” fish groans. “There were only two buttons to press, Submit and Reset.

“You’d think that after pressing Reset three times and having it erase the passwords he typed in, he would try Submit — right?

“But no — our customer tried a fourth and then a fifth time, until he got the idea to hit the other button.

“This person was by all accounts a functional, employed adult…”

Sharky needs a new year’s worth of stories of users, management and IT gone off the rails. So send me your true tales of IT life at sharky@computerworld.com. You can also comment on today’s tale at Sharky’s Google+ community, and read thousands of great old tales in the Sharkives.

To read this article in full, please click here

Read More
ComputerWorldIndependent

If the CTO says it's OK, what could go wrong?

Credit to Author: Sharky| Date: Wed, 02 Jan 2019 03:00:00 -0800

Medical rehab facility is facing a compliance deadline for HIPAA privacy regulations, and that could be a problem, says a cybersecurity pilot fish working there.

“The HIPAA regulations are strewn with potential issues,” fish says. “When some aspect isn’t followed and a patient’s data privacy is compromised, the fines can be substantial.”

And that’s the headache fish faces because of his facility’s use of Gmail. As the site’s cybersecurity engineer, fish knows that ordinary Gmail isn’t HIPAA compliant.

Fortunately, there’s a fix — one that involves additional paperwork and agreements, along with some added security verification. But that’s still easier and less complex than moving everyone off Gmail.

To read this article in full, please click here

Read More