Moj pametni telefon – moj omiljeni dvosjekli mač
Da moram birati, radije bih izgubila novčanik nego mobilni telefon. Bez ikakve dileme. Naravno, u novčaniku bi se mogla nalaziti novčanica od 100 kn i mnogo kartica, no njih se može zamijeniti – dok su slike, kontakti i bilješke u telefonu nezamjenjivi! Tvrtka Bank of America objavila je 2014. godine izvješće pod nazivom „Trends in […] more…
Zemlja izgubljenih mobilnih telefona
Jeste li ikad doživjeli onaj trenutak panike kad shvatite da ne možete pronaći mobilni telefon? Provjeravate džepove, automobil, jastuke na trosjedu, no nažalost nigdje nema telefona. Kad napokon shvatite da ste ga ostavili na klupi u parku, odavno ga nema. Ako vam se to dogodilo, ne brinite, niste jedini. Izgubiti mobilni telefon ili doživjeti da […] more…
Budite spremni za lažne pozive iz službe za tehničku podršku
Prije nekoliko godina radio sam nešto na računalu prije večere. Moja je žena ušla s čudnim izrazom lica i rekla osobi s druge strane telefona: „Mislim da biste možda trebali porazgovarati o tome s mojim mužem.” Kad sam se javio, osoba je rekla: „Zdravo, ovdje Rick iz Službe za podršku sustava Windows i zovem jer […] more…
¿Por qué usar una VPN?
Si quiere ser un profesional de la privacidad, aquí tiene un consejo: cuando sea momento de conectarse a Internet, ya sea en el salón de espera de un aeropuerto, un bar, un hotel o cualquier otro punto de acceso a Wi-Fi público, no inicie sesión en ninguna de sus cuentas, a menos que use una […] more…
¿Es hora de concientizar sus hijos sobre el fraude digital?
Hace mucho, vi una película en la que el héroe regresaba a casa después de una experiencia desgarradora y descubría que un impostor había tomado su lugar. El impostor había asumido el nombre, las credenciales e, incluso, la empresa del héroe. Al héroe le costó mucho comprobar su legitimidad y demostrarle al mundo que su […] more…
El acoso en las redes sociales es una amenaza real. Le contamos cómo protegerse.
Es casi una verdad indiscutible que el acceso a un manto de anonimato y un micrófono gigante saca lo peor de algunas personas. Hoy, esto es especialmente cierto con las redes sociales. El acoso online y los mensajes de odio son una tendencia en crecimiento y una preocupación de seguridad cada vez mayor para todas […] more…
El ransomware y usted
El fin de semana pasado, estaba en una pista de patinaje local donde mis hijos disfrutaban de su primera vez sobre patines. Mientras observaba a mi hijo más grande dar una vuelta por la pista, uno de los otros padres se me acercó y me preguntó: “Tú trabajas en seguridad. ¿Qué es eso del ransomware? […] more…
Together is Power: FOCUS 16 and the Future of Cybersecurity
I led last week’s FOCUS 16 conversation with a simple question – “Are we safer together, or apart?” It was a powerful way to begin my keynote, and you can safely presume the answer I gave on behalf of all of us at Intel Security: cybersecurity outcomes are best when we work together. Together is […] more…
Stop Losing Sleep over Compliance Audits
Regulations take many forms, depending upon the industry, the region, and the type of data being protected, but one thing is consistent among them: regulators frown on poor data-protection practices.Compliance can be a chore, and many organizations try to minimize the pain by taking a “one and done” approach. They go through all the necessary […] more…
Defense Evolved: From Threat Intelligence, to Investigation, to Orchestration with DXL
In my last post, I discussed the attributes of our adversaries, the drivers behind their activities, and their recent attack methodologies. I also discussed the threat defense efficacy curve, which illustrates how cyber defense capabilities decline in efficacy over time as attackers develop countermeasures to evade them. My FOCUS 16 keynote last week also explained […] more…
How to Get Smarter About Phones and Homework Time
But Moooooom, you can’t take my phone! I can’t finish my homework without it! In that desperate moment, my daughter looked more like an extra on the set of Les Miserables pleading for bread than a 16-year-old studying Algebra polynomials. No exaggeration; the panic was at DEFCON level. Remember when all you needed to get your homework […] more…
Android patches fix Drammer RAM attack, but not Dirty Cow exploit
Google released a new monthly batch of security patches for Android, fixing a dozen critical vulnerabilities that could allow attackers to compromise devices. One of the mitigated issues is a bit-flipping attack against memory chips that could lead to privilege escalation, but a more widespread rooting vulnerability in the Linux kernel remains unpatched. While Google […] more…
How is Security Integrated into DevOps – DevOpsSec, SecDevOps, or DevSecOps?
The world is awash in DevOps, but what does that really mean? Although DevOps can mean several things to different individuals and organizations, ultimately it is about the cultural and technical changes that occur to deliver cloud services in a highly competitive environment. Cultural changes come in the form of integrating teams that historically have […] more…
Fight Against Ransomware Takes to the Cloud
“How many visitors do you expect to access the No More Ransom Portal?” This was the simple question asked prior to this law enforcement (Europol’s European Cybercrime Centre, Dutch Police) and private industry (Kaspersky Lab, Intel Security) portal going live, which I didn’t have a clue how to answer. What do YOU think? How many […] more…
How Algorithms Could Help Keep People Out of Jail
Steve Leifman knew Miami-Dade’s courts had a problem. Ten years ago the longtime jurist realized that his county was putting too many people with mental health problems in jail. So he set up a psychiatric training program for 4,700 police officers and a new system to send people to counseling. The incarcerated population plummeted; the […] more…
Mirai Botnet Takes Down Internet in Liberia
Mirai, the Internet of Things (IoT) botnet that has recently fueled multiple large distributed denial of service (DDoS) attacks, is now targeting the Liberian infrastructure, taking down the Internet for the entire country, researchers warn. read more more…
2017 Antivirus News | Powered by WordPress |
Fluxipress Theme
| Show My IP Address, check blacklists
| Free Favicon, Android and Apple Icon Generator
| Bitcoin and Crypto Currency News
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More Privacy & Cookies Policy