Security

ComputerWorldIndependent

Tech to help protect Final Four crowds

Credit to Author: Matt Hamblen| Date: Fri, 31 Mar 2017 13:06:00 -0700

At this weekend’s Final Four college basketball tournament, sophisticated technology is in place to help public safety officials monitor crowds, vehicles, social networks and unauthorized drones from a command center at an undisclosed location in downtown Phoenix.

An array of thousands of cameras and other sensors are already in place across public venues and roadways in the Phoenix area. The games will take take place Saturday night and Monday night at the University of Phoenix Stadium in suburban Glendale, Ariz., nine miles from downtown.

In the stadium alone, more than 700 video cameras are likely to be used to monitor vendors and crowds. Thousands more video cameras and motions sensors are ready to watch vehicles on highways and crowds at 20 Final Four special events, at the four hotels where college teams are lodging and in parking areas.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Google's Android hacking contest fails to attract exploits

Credit to Author: Lucian Constantin| Date: Fri, 31 Mar 2017 11:32:00 -0700

Six months ago, Google offered to pay $200,000 to any researcher who could remotely hack into an Android device by knowing only the victim’s phone number and email address. No one stepped up to the challenge.

While that might sound like good news and a testament to the mobile operating system’s strong security, that’s likely not the reason why the company’s Project Zero Prize contest attracted so little interest. From the start, people pointed out that $200,000 was too low a prize for a remote exploit chain that wouldn’t rely on user interaction.

“If one could do this, the exploit could be sold to other companies or entities for a much higher price,” one user responded to the original contest announcement in September.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Top 5 VPN services for personal privacy and security

Credit to Author: Paul Mah| Date: Fri, 31 Mar 2017 09:28:00 -0700

Virtual private networks (VPNs) encrypt internet connections between two points, to secure them from casual snoopers and hackers. These VPN services are particularly useful when accessing the internet from an untrusted location, such as a hotel, café or coworking space.

A plethora of modern VPN services, with dedicated connectivity apps, have put an end to the maddening manual configuration VPNs once required. No two VPN offerings are alike, however, and it can be a challenge to find the right VPN. Here’s a look at some of the top VPNs for privacy and security.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

What to look for in a VPN to protect your privacy

Credit to Author: Darlene Storm| Date: Fri, 31 Mar 2017 07:09:00 -0700

If you haven’t already, then it is time to embrace a virtual private network.

Our lawmakers recently voted to remove regulations which would stop ISPs from selling your online life, manipulating your search results and controlling what you see online. Even if you don’t care about highly targeted advertising being thrown your way, it’s the principle of the profiling. You wouldn’t run a computer without some type of protection such as anti-malware and a firewall; sadly, the day has come when you shouldn’t connect online without using a VPN.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

IDG Contributor Network: Insiders — the invisible threat lurking in your office

Credit to Author: Robert C. Covington| Date: Fri, 31 Mar 2017 06:23:00 -0700

With all of the focus in the business world recently related to hackers, we have tended to overlook a group of potential bad actors who have already penetrated our perimeter security, and have access to our facilities — our employees and contractors. While our security teams usually monitor firewall and intrusion prevention logs, the threat from insiders is, in many cases, completely ignored. 

While some insiders are intent on stealing data or damaging systems for profit or some other motive, many more expose their employers to harm just by making mistakes. Whether intent exists or not, the damage is just as bad

To read this article in full or to leave a comment, please click here

Read More
QuickHealSecurity

Quick Heal Total Security (Windows) gives 100% zero-day protection | Latest AV-Test results

Credit to Author: Rajib Singha| Date: Thu, 30 Mar 2017 07:24:12 +0000

The AV-Test institute is an independent organization that evaluates and rates antivirus software solutions, benchmarking them against various criteria. These evaluations are run for Windows and Android operating systems. During January and February 2017, AV-Test evaluated Quick Heal Total Security for Windows. Here are the results: Category A: PROTECTION Protection…

The post Quick Heal Total Security (Windows) gives 100% zero-day protection | Latest AV-Test results appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice.

Read More