Security

ComputerWorldIndependent

Reminder: Secret Service is monitoring social media; 2 women in hot water over posts

You don’t see news about the U.S. Secret Service every day, but here are a couple examples which should serve as reminders that law enforcement is monitoring social media.

While this is not a suggestion to chill down your First Amendment rights, although those rights might be getting chilled ever more even as you read this, you must be wise about what you say online. It’s not private. If you start making what could be conceived as threats against President Trump, or even one of his top advisors such as Kellyanne Conway, then you might as well expect to be hearing from the Secret Service.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Court denies U.S. government appeal in Microsoft overseas email case

A U.S. appeals court will not reconsider its groundbreaking decision denying Department of Justice efforts to force Microsoft to turn over customer emails stored outside the country.

The U.S. Court of Appeals for the Second Circuit, in a 4-4 decision Tuesday, declined to rehear its July decision that denied the DOJ access to the email of a drug trafficking suspect stored on a Microsoft server in Ireland. Microsoft has been fighting DOJ requests for the email since 2013.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Pompeo sworn in as CIA chief amid opposition from surveillance critics

Mike Pompeo was sworn in late Monday as the new director of the Central Intelligence Agency amid protests from surveillance critics who worry about his conflicting views on a number of key issues.

The oath of office was administered by Vice President Mike Pence after the Senate voted in favor of his confirmation in a 66-32 vote.

Critics of Pompeo, a Republican representative from Kansas, are concerned that he may weigh in with the government on a rollback of many privacy reforms, including restrictions on the collection of bulk telephone metadata from Americans by the National Security Agency under the USA Freedom Act. There are also concerns that the new director may try to introduce curbs on the use of encryption and bring in measures to monitor the social media accounts.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

IDG Contributor Network: Microsoft to release Windows Defender Security Center in April

Microsoft has announced that as part of the Creator’s Update coming in April, it will introduce a new security service called Windows Defender Security Center, which is designed to act as a dashboard for all of your security features, including third-party security. The Security Center is already available to Windows Insiders using preview builds of Windows 10.

Though Windows Defender has never been a top-flight performer in detecting malware compared to vendors like Trend Micro and Kaspersky (see the latest AV Comparatives in PDF format), Microsoft has stuck with it, and it does make for a decent second line of defense. With the Security Center, Microsoft is expanding beyond mere malware detection into overall system security.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Yahoo pushes back timing of Verizon deal after breaches

Verizon’s planned acquisition of Yahoo will take longer than expected and won’t close until this year’s second quarter, the internet company said on Monday.

The $4.8 billion deal was originally slated to close in the first quarter, but that was before Yahoo reported two massive data breaches that analysts say may scrap the entire deal.

Although Yahoo continues to work to close the acquisition, there’s still work required to meet closing the deal’s closing conditions, the company said in an earnings statement, without elaborating.

Verizon has suggested that the data breaches, and the resulting blow to Yahoo’s reputation, might cause it to halt or renegotiate the deal.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Apple quashes bugs in iOS, macOS and Safari

Apple on Monday updated macOS Sierra to 10.12.3, patching 11 security vulnerabilities and addressing a graphics hardware problem in the latest 15-in. MacBook Pro laptop.

At the same time, Apple released iOS 10.2.1, an update that fixed 18 security flaws, the bulk of them in WebKit, the foundation of the baked-in Safari browser.

According to Apple’s typically terse update documentation, macOS 10.12.3 “improves automatic graphics switching on MacBook Pro (15-in., October 2016).” Another fix addressed “graphics issues” on both the 15-in. and the smaller 13-in. sibling when encoding in Adobe Premiere Pro; that bug attracted attention after a video showing a notebook wildly cycling through colors went viral.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

WikiLeaks urges hackers to leak Trump's tax returns

After President Trump backpedaled on multiple election promises to release his tax returns, WikiLeaks urged people to get hold of them and anonymously send them to WikiLeaks, so the tax returns could be leaked online.

The call to leak Trump’s tax returns came after Kellyanne Conway, a senior advisor to the president, told ABC’s This Week that Donald Trump has no intentions of releasing his tax returns. “The White House response is that he’s not going to release his tax returns,” she said. “We litigated this all through the election.”

Despite a poll which showed Americans do want to see Trump’s returns, Conway suggested, “People didn’t care; they voted for him, and let me make this very clear: most Americans are — are very focused on what their tax returns will look like while President Trump is in office, not what his look like.”

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

The essential guide to anti-malware tools

It’s a sad fact of life in IT nowadays that some form of preparation for dealing with malware is part and parcel of what systems and network administrators must do. This goes above and beyond normal due diligence in warding off malware. It includes a proper appreciation of the work and risks involved in handling malware infections, and acquiring a toolkit of repair and cleanup tools to complement protective measures involved in exercising due diligence. It should also include at least two forms of insurance – one literal, the other metaphorical – that can help avert or cover an organization against costs and liabilities that malware could otherwise force the organization to incur.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read More