Security

ComputerWorldIndependent

Android security: Analysis, advice, and next-level knowledge

Credit to Author: JR Raphael| Date: Thu, 26 Jul 2018 03:00:00 -0700

It’s tough to talk about Android security without venturing into sensational terrain.

A large part of that is due to the simple fact that the forces driving most Android security coverage are companies that make their money by selling Android security software — and thus companies with strong interests in pushing the narrative that every Android phone is on the perpetual brink of grave, unfathomable danger. Plus, let’s face it: A headline about 70 gazillion Android phones being vulnerable to the MegaMonsterSkullCrusher Virus is far more enticing than one explaining the nuanced realities of Android security.

In actuality, though, Android security is a complex beast — one with multiple layers in place to protect you and one that almost never warrants an alarmist attitude. I’ve been covering Android security closely since the platform’s earliest days, and I’ve busted more myths and called out more shameless publicity stunts than I can even count at this point.

To read this article in full, please click here

Read More
SecurityTrendMicro

Preparing for Shadow OT: A Hospital Case Study

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Wed, 25 Jul 2018 17:09:51 +0000

The convergence of IT and OT is happening more rapidly than IT expects. Once upon a time, IT was so expensive that enterprises built entire departments to prioritize spending and efficiently manage those costly investments. Now, IT is so inexpensive that any individual who wants IT can buy it (or rent it). This is “Shadow…

The post Preparing for Shadow OT: A Hospital Case Study appeared first on .

Read More
SecurityTrendMicro

What financial service providers should know about blockchain: Opportunities and threats

Credit to Author: Trend Micro| Date: Wed, 25 Jul 2018 15:30:51 +0000

It seems that every few years, an advanced and innovative new technology emerges and becomes the next big thing for organizations across different industries. Take the cloud and big data, for example – during their buzzword stage, these concepts were being attached to just about everything in the tech space. Currently, it appears that blockchain…

The post What financial service providers should know about blockchain: Opportunities and threats appeared first on .

Read More
QuickHealSecurity

The evolution of a 4-year-old-threat Emotet: From an infamous Trojan to a complex threat distributer

Credit to Author: Aniruddha Dolas| Date: Wed, 25 Jul 2018 13:40:33 +0000

Emotet malware campaign has been existing for a long time. It comes frequently in intervals with different techniques and variants to deliver malware on a victim. Attackers are smart and they use complex techniques to avoid detection. At the start of 2017, we had seen the emotet campaign spreading through…

Read More