Security

ComputerWorldIndependent

5 handy Google Fi features you shouldn't forget

Credit to Author: JR Raphael| Date: Thu, 06 Dec 2018 09:21:00 -0800

Got Fi? Google’s unusual wireless service may have shifted its name from Project Fi to Google Fi this fall, but its core proposition remains the same: Pay only for the data you use, and avoid all the traditional carrier gotchas and nonsense.

For the right kind of person, especially among those of us on Android, Fi can be a real cost- and hassle-saver. And aside from its most prominently promoted perks — the seamless network-switching, the public Wi-Fi use, the fee-free roaming and hotspot capabilities, and so on — Fi has some pretty interesting out-of-the-way options that can really elevate your experience.

To read this article in full, please click here

Read More
ComputerWorldIndependent

Will Apple’s iPhone replace your password?

Credit to Author: Jonny Evans| Date: Thu, 06 Dec 2018 07:00:00 -0800

Imagine using Face ID on your iPhone alongside a password and Touch ID on your computer in order to access highly secure websites, such as online banks, enterprise intranets and confidential online data services.

That’s a possibility as Apple begins testing a new security standard called WebAuthn.

What is WebAuthn?

Apple has begun beta-testing support for the standard in Safari Technology Preview Release 71, thought it does warn this support is an “experimental feature”, so it may go no further than that.

To read this article in full, please click here

Read More
SecurityTrendMicro

Securing Smart Manufacturing with Connected Threat Defense

Credit to Author: Trend Micro| Date: Thu, 06 Dec 2018 14:00:37 +0000

By David Tay, the CIO of Beyonics You’d be hard pushed to find any organization today not involved in digital transformation projects. But the manufacturing sector was arguably one of the first to the game. Back in 2011, the German government first coined the term Industry 4.0 to describe the opportunities stemming from use of emerging…

The post Securing Smart Manufacturing with Connected Threat Defense appeared first on .

Read More
SecurityTrendMicro

30 Years of Trend Micro

Credit to Author: Trend Micro| Date: Wed, 05 Dec 2018 14:00:24 +0000

This year marks 30 years of Trend Micro. That’s three decades of working to make the world safe for exchanging digital information in a constantly changing technology and cyber threat environment. Our founders often reference the humble beginnings of the company – starting from a garage in California – to highlight just how far we’ve…

The post 30 Years of Trend Micro appeared first on .

Read More
ComputerWorldIndependent

Blockchain: What’s it good for? Absolutely nothing, report finds

Credit to Author: Lucas Mearian| Date: Wed, 05 Dec 2018 03:01:00 -0800

In a joint report for the Monitoring, Evaluation, Research and Learning (MERL) Technology conference this fall, researchers who studied 43 blockchain use cases came to the conclusion that all underdelivered on claims.

And, when they reached out to several blockchain providers about project results, the silence was deafening. “Not one was willing to share data,” the researchers said in their blog post.

To read this article in full, please click here

Read More