Newsfeed Archive
Uncategorized
(Source: www.computing.co.uk) Although security problems affecting Windows 10 only seem to be growing, the study revealed that removing admin rights could mitigate 80 per cent of them. Overall, there was a
Read More
News & Highlights
(Source: CSO Online) Additionally, an IDS can detect traffic that’s problematic to specific software; so it would alert IT if it detects a known attack against the Firefox browsers in
Read More
News & Highlights
(Source: Ars Technica) Although ARM hardware includes hardware virtualization capabilities, and although Microsoft is starting to use virtualization to provide certain security features, apparently, the company has not ported its Hyper-V software to
Read More
News & Highlights
(Source: CNET) Anti-malware software firm Malwarebytes and IT security company ESET both warned of sneaky uses of JavaScript files that use the CPU of visitors to mine cryptocurrencies without their knowledge (or explicit
Read More
News & Highlights
(Source: The Data Center Journal) Given the volume and variety of threats in today’s network, IT security teams are often hard-pressed to determine priorities. Rather than chasing every … There are
Read More
News & Highlights
(Source: Infosecurity Magazine) Ransomware is a growing industry. According to Cybersecurity Ventures, it was predicted to cost companies around $5 billion in 2017. In comparison, IDC estimates the worldwide
Read More
News & Highlights
(Source: i-HLS – Israel Homeland Security) The vast array of connected industrial devices, such as embedded sensors, smart lighting, and monitoring systems, requires high levels of security. … MIT researchers
Read More
News & Highlights
(Source: ISBuzz News) Flaws are defects in the architecture or design of a software system and may require extensive reconstruction to mitigate the risk. This also highlights the importance of secure architecture and
Read More
News & Highlights
(Source: ISBuzz News) Modern operating systems (OSs) and hypervisors depend on structured, layered permission models to deliver security isolation and separation. Because this exploitable design implementation is in hardware — below
Read More
News & Highlights
(Source: Biometric Update) Fujitsu today announced new biometric authentication software for PCs, the Fujitsu Security Solution AuthConductor Client. The product is now available now in the Oceania region and the company plans to
Read More