Twitter Didn’t Suspend Hope Hicks

Credit to Author: Ashley Feinberg| Date: Wed, 13 Sep 2017 17:46:54 +0000
Conservatives are in arms over Twitter’s suspension of Hope Hicks’ Twitter. There’s only one problem.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Ashley Feinberg| Date: Wed, 13 Sep 2017 17:46:54 +0000
Conservatives are in arms over Twitter’s suspension of Hope Hicks’ Twitter. There’s only one problem.
Read More
Credit to Author: Greg Lambert| Date: Wed, 13 Sep 2017 11:00:00 -0700
September brings a relatively large patch profile for Microsoft with 76 reported vulnerabilities, three public disclosures (thank you, Google) and unfortunately one zero day exploit. You used to be worried about browsers and Flash, now we have a publicly exploited vulnerability for augmented reality (AR) with a fix for Microsoft’s HoloLens headset.
For this September Patch Tuesday, Microsoft is only shipping security updates with patches to the following product groups:
Browsers (IE and Edge)
To read this article in full or to leave a comment, please click here

Credit to Author: Jonny Evans| Date: Wed, 13 Sep 2017 07:36:00 -0700
The iPhone X replaces the Home button and Touch ID with gesture controls and Face ID, sophisticated facial recognition software that learns to recognize your face and lets you use your device only after it has confirmed it is you. It is a new technology — here’s what we know about it so far:
This is how Apple’s chief marketer, Phil Schiller put it: “With the iPhone X, your iPhone is locked until you look at it and it recognizes you. Nothing has ever been more simple, natural, and effortless. This is the future of how we’ll unlock our smartphones and protect our sensitive information.”
To read this article in full or to leave a comment, please click here

Credit to Author: Michael Dempsey| Date: Wed, 13 Sep 2017 13:00:00 +0000
Opinion: The government must address security threats from DIY weapons and autonomous vehicles.
Read MoreCredit to Author: Yaroslava Ryabova| Date: Wed, 13 Sep 2017 13:00:14 +0000
Android users have the largest selection of mobile apps, but that means they are also exposed to the most threats. Avoid mobile malware by following some basic security rules.
Read MoreCredit to Author: Woody Leonhard| Date: Wed, 13 Sep 2017 04:16:00 -0700
Microsoft on Tuesday released 259 individual security patches, covering 82 security holes (counting by CVE number). You may feel rushed to apply those patches, particularly when you hear about a really bad vulnerability involving Word, RTF, and the .NET Framework. The facts are a little less alarmist.
Here’s a quick overview. The SANS Internet Storm Center has its usual handy list of CVEs and whether there are any known exploits. Martin Brinkmann at Ghacks stacks them up this way:
To read this article in full or to leave a comment, please click here

Credit to Author: Jonathan Hassell| Date: Wed, 13 Sep 2017 04:01:00 -0700
Authentication: the act of proving one’s identity to the satisfaction of some central authority. To most, this process means typing in a username and a password. It’s been this way for years and years.
To read this article in full or to leave a comment, please click here
(Insider Story)
Read More
Credit to Author: Andy Greenberg| Date: Tue, 12 Sep 2017 21:08:29 +0000
The iPhone X replaces TouchID with FaceID. Here’s what kind of security trade-off you can expect.
Read More