Security

SecurityTrendMicro

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of June 11, 2018

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 15 Jun 2018 12:39:57 +0000

As a native Texan, I’ve seen more than my fair share of bugs – actual physical bugs that love the hot, humid Texas climate and my curly hair for some reason. The Zero Day Initiative (ZDI) sees many bugs (of the software variety), including those that affect SCADA control systems. Fritz Sands recently walked through…

The post TippingPoint Threat Intelligence and Zero-Day Coverage – Week of June 11, 2018 appeared first on .

Read More
ComputerWorldIndependent

Apple wins praise for adding 'USB Restricted Mode' to secure iPhones

Credit to Author: Lucas Mearian| Date: Thu, 14 Jun 2018 12:43:00 -0700

Apple confirmed today it will close a security hole that has allowed law enforcement officials, working with forensic companies, to break into iPhones to retrieve data related to criminal investigations.

In the upcoming release of iOS 12, Apple will change default settings on iPhones to shutter access to the USB port when the phone has not been unlocked for one hour. In its beta release of iOS 11.3, Apple introduced the feature – known as USB Restricted Mode – but cut it from iOS 11.3 before that version was released publicly.

To read this article in full, please click here

Read More
SecurityTrendMicro

Don’t be a Coinmining Zombie – Part 2: How Do You Protect Yourself from being Cryptojacked?

Credit to Author: Trend Micro| Date: Thu, 14 Jun 2018 13:04:32 +0000

Safe behaviors to protect yourself from cryptojacking follow the familiar rules you should adhere to every day to protect yourself against viruses, worms, bots, and malware, including ransomware, which are typically pushed to you through phishing techniques and social engineering:     Strengthen your network device’s credentials (e.g., your router), to make it less open…

The post Don’t be a Coinmining Zombie – Part 2: How Do You Protect Yourself from being Cryptojacked? appeared first on .

Read More
ComputerWorldIndependent

Which Android phones get regular security updates? Here's a hint

Credit to Author: JR Raphael| Date: Thu, 14 Jun 2018 08:48:00 -0700

Read More
ComputerWorldIndependent

Is your company part of the GDPR 'mobile loophole'?

Credit to Author: Jack Gold| Date: Thu, 14 Jun 2018 08:13:00 -0700

Mobile tech, and especially mobile brought into companies through BYOD, has unique challenges for companies that need to comply with General Data Protection Regulations (GDPR) — and that’s virtually all companies, not just the ones in Europe. The regulations compel companies to manage personal data and protect privacy, and they provide individuals to have a say in what and how data about them is used.

GDPR has several disclosure and control requirements, such as providing notice of any personally identifiable data collection, notifying of any data breaches, obtaining consent of any person for whom data is being collected, recording what and how data is being used, and providing a right for people whose data is being collected to see, modify, and/or delete any information about them from corporate systems.

To read this article in full, please click here

Read More