Security

ComputerWorldIndependent

What Face ID means for iOS and device access

Credit to Author: Ryan Faas| Date: Fri, 29 Sep 2017 03:11:00 -0700

The most obvious difference between the upcoming iPhone X and every iOS device that preceded it is the loss of the iconic Home button. For years, it has served as the fingerprint sensor for Apple’s Touch ID technology, offering easy and secure unlocking of the device as well as authentication for transactions.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read More
ComputerWorldIndependent

Tech Talk: The Equifax data breach, a new Apple Watch and A.I. for all

Credit to Author: Ken Mingis| Date: Wed, 27 Sep 2017 14:08:00 -0700

First there was news that Equifax, the credit rating agency, had been hacked. Then came stories about questionable stock sales by execs before the breach became public. Then…anger and confusion from some of the 143 million people affected.

And finally, this week, came the retirement of the company’s CEO.

It’s enough to (almost) make our panel of tech experts – Network World‘s Brandon Butler, CSO‘s Fahmida Rashid, Macworld‘s Michael Simon and Computerworld Executive Editor Ken Mingis – throw up their collective arms as everyone tries to figure out how to stop it from happening again.

To read this article in full or to leave a comment, please click here

Read More
SecurityTrendMicro

Helping Mobile Operators Keep Customers Safe with Virtualized Network Security

Credit to Author: Trend Micro| Date: Wed, 27 Sep 2017 13:00:26 +0000

Recently, a frightening trend has emerged where cyber criminals poach the capabilities of legitimate message apps in order to carry out their malicious activities.At Trend Micro we’re always looking for innovative new ways to support our customers and help overcome their cybersecurity challenges. Mobile network operators (MNOs) are increasingly adopting virtualization and software acceleration technologies to become more agile in how they deploy and operate network services: for example, to help deal with large, unpredictable network volumes during…

Read More