Security

SecurityTrendMicro

The trend toward cryptojacking: What it is and how businesses can prevent it

Credit to Author: Trend Micro| Date: Tue, 24 Jul 2018 15:30:45 +0000

Digital attacks have evolved quite a bit in recent years. First, businesses and researchers observed a rash of ransomware, wherein encryption was exploited to lock users out of their data and files in an attempt to collect financial ransom. Now, the next big wave in cybercriminal strategy has come, involving increasingly popular cryptocurrencies and the…

The post The trend toward cryptojacking: What it is and how businesses can prevent it appeared first on .

Read More
SecurityTrendMicro

How mobile threats impact today’s BYOD landscape

Credit to Author: Trend Micro| Date: Mon, 23 Jul 2018 18:56:36 +0000

Bring-your-own-device (BYOD) has been a revolutionary concept for years now, even before it was recognized by enterprise policy. However, now that business executives and IT leaders have realized the benefits this type of strategy for their organizations, BYOD is becoming an increasingly powerful way to support efficient access and productivity. At the same time, however,…

The post How mobile threats impact today’s BYOD landscape appeared first on .

Read More
ComputerWorldIndependent

The MacBook Pro’s T2 chip boosts enterprise security

Credit to Author: Jonny Evans| Date: Mon, 23 Jul 2018 06:51:00 -0700

You may have missed an all-new enterprise-focused feature woven inside of Apple’s all-new MacBook Pro – its new T2 chip which fundamentally enhances the security of these computers.

What is the T2 chip?

The successor to the T1, Apple’s T2 chip enables secure boot and encrypted storage on the machine. It first appeared on the iMac Pro.

What does the T2 chip do?

The most widely-reported task handled by the T2 chip is the provision of “Hey Siri” support for the first time on a Mac.

To read this article in full, please click here

Read More
ComputerWorldIndependent

July Windows .Net patches appear, disappear, reappear, disappear again

Credit to Author: Woody Leonhard| Date: Mon, 23 Jul 2018 05:15:00 -0700

Microsoft’s July 2018 series of patching missteps, with .Net security patches in particular, have left many admins in the lurch. Less than two weeks after they were first unleashed, poorly documented versions of the patches now appear to be available, but are not being actively pushed. There’s no indication from Microsoft if and/or when they’ll be fixed.

These patches, originally released on Patch Tuesday, July 10, are baring their FAANGs:

  • KB 4340556 — Security and Quality Rollup updates for .Net Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1 and 4.7.2 for Windows 7 SP1 and Server 2008 R2 SP1
  • KB 4340557 — Security and Quality Rollup updates for .Net Framework 3.5 SP1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows Server 2012
  • KB 4340558 — Security and Quality Rollup updates for .Net Framework 3.5 SP1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 8.1, RT 8.1, and Server 2012 R2
  • KB 4340559 — Security and Quality Rollup updates for .Net Framework 2.0 SP2, 3.0 SP2, 4.5.2, and 4.6 for Windows Server 2008

The patches had been out for less than a day when we started seeing error reports on AskWoody. As I noted on July 12:

To read this article in full, please click here

Read More
ComputerWorldIndependent

Nice to know our financial world is in safe hands

Credit to Author: Sharky| Date: Mon, 23 Jul 2018 03:00:00 -0700

This company is the target of a spear-phishing attack, but it doesn’t actually get very far, according to an IT pilot fish working there.

“It was the typical ‘CEO is out of the office and needs a wire transfer done right away’ message,” fish says.

“Our people are pretty good at spotting phishing attempts, and our administrative assistant was immediately suspicious because we do wire transfers approximately never. She strung the guy along over multiple emails and got all the transfer information — amount, routing number, account number and so on.

To read this article in full, please click here

Read More