Security

ComputerWorldIndependent

Android P in depth: An up-close look at what's new with security

Credit to Author: JR Raphael| Date: Thu, 08 Mar 2018 08:58:00 -0800

Google is slowly pulling back the curtains on its next-gen Android P release. Yesterday, we got our first glimpse at a work-in-progress, developer-focused preview of the software — and today, we’re getting a closer look at what exactly is new when it comes to Android P and the ever-evolving subject of Android security.

I had the chance to chat with Xiaowen Xin, Google’s Android platform security product manager, about some of the significant changes on the way with Android P. Here’s the inside scoop on what you can expect:

To read this article in full, please click here

Read More
SecurityTrendMicro

2017’s Biggest Threats and What CISOs Can do to Mitigate Risks in 2018

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Thu, 08 Mar 2018 14:00:51 +0000

Enterprise Risk Management (ERM) is getting harder every day. According to the World Economic Forum‘s 2018 Global Risks Perception Survey, cyber attacks and data theft are 3 and 4 respectively of the top 5 likely risks organizations will face this year. This is not surprising, in 2017 CISOs the world over faced crippling ransomware attacks,…

Read More
ComputerWorldIndependent

Study: FinTech, other industries should open blockchain sandboxes and work with regulators

Credit to Author: Lucas Mearian| Date: Wed, 07 Mar 2018 14:11:00 -0800

For regulators to understand blockchain’s cybersecurity benefits and risks, they must first have a deeper understanding of the technology – and businesses hold the key to that, according to new research.

Governments around the world are beginning to increase regulatory oversight of cryptocurrencies, such as bitcoin, which are underpinned by blockchain’s distributed ledger technology. In turn, businesses that use private or “permissioned” blockchain networks are likely to also see more oversight, according to experts.

To read this article in full, please click here

Read More
SecurityTrendMicro

Trend Micro at HiMSS: Protecting Healthcare Organizations with Optimized, Connected Security

Credit to Author: Trend Micro| Date: Wed, 07 Mar 2018 15:00:16 +0000

Submitted by Elie Nasrallah
, Director – Cyber Security Strategy
 The healthcare industry remains one of the most frequently targeted sectors in the United States. It accounted for nearly a quarter (23%) of all breaches reported in 2017, second only to the business category, in another record year for data theft. That’s why Trend Micro has been a…

Read More
ComputerWorldIndependent

Criminals pay just $15 for Apple iCloud account IDs, report claims

Credit to Author: Jonny Evans| Date: Wed, 07 Mar 2018 03:59:00 -0800

One of the biggest reasons Apple users need to beware of phishing attacks is that compromised iCloud accounts are among the most valuable of those traded on the dark web at $15 per account.

All your data are belongs to us

Think about the value of your Apple ID data: Not only is your account the golden portal into all your personal data, but it unlocks all manner of other valuable items: credit card details, online purchasing, passwords for your websites and more.

That’s why every Apple ID user really should think about the value of the data they are trying to protect and create tough alphanumeric passcodes, even if they do need to spend significant time memorising those codes.

To read this article in full, please click here

Read More