Are you thinking of getting an IT information security-related certification? Perhaps you want to go for Security+, Certified Ethical Hacker (CEH), or, assuming you have the required experience, the CISSP? These certifications not only look good on your resume but, the best part to me, is that you learn some great material along the way. These certifications are valuable and will, no doubt, benefit
17 hours ago How to fix disappearing iPhone passwordsZDNet View Synopsis+1
Once you've changed your Apple/iCloud password you may find it keeps disappearing from your iPhone, iPad, or iPod Touch. Here's how to bring it back for good.
iOS 10.3 lands, complete with heavily encrypted Apple File System
Apple today released iOS 10.3, watchOS 3.2 and tvOS 10.2 (14W265), the first two of all of which bring some pleasing extra functionality to iThings, But the main attraction in the new release is Apple File System, because it adds comprehensive encryption to the iPhone and Apple Watch.
Apple fixes flaw attackers used to trick uninformed users into paying a fine.
Another LastPass vulnerability has been discovered by Google Project Zero hacker Tavis Ormandy. LastPass calls the vulnerability 'unique and highly sophisticated'.
8 hours ago Google Researcher Finds New Flaw in LastPassSecurityWeek View Synopsis+1
Google Project Zero researcher Tavis Ormandy has identified yet another serious vulnerability in the LastPass browser extension. The developers of the password manager are aware of the flaw and are working on a patch.
A House vote on federal rules regarding broadband privacy could put your web browsing history at stake, allowing ISPs to sell your information to advertisers.
As part of a series exploring cybersecurity and its impact on consumers, marketers, and marketing. I talked with Holly Rollo, the CMO of RSA, a Dell Technologies business. The following focuses on marketing's role in cybersecurity.
An analysis of British Home Secretary Amber Rudd's call for law enforcement to gain access to encrypted communications services, such as WhatsApp, leads the latest edition of the ISMG Security Report. Also, a preview of ISMG's Fraud and Breach Prevention Summit in San Francisco.
The scareware campaign duped victims into paying a ransom.
Thin clients don't get a whole lot of attention in the world of iPhones and PC detachables, but the latest improvements in VDI and thin clients like the Dell Wyse 3040 could make a big difference in that.
39 minutes ago Zoho launches AI to assist sales desk productivityIT Toolbox Blogs View Synopsis+1
CRM provider Zoho is joining other major firms providing AI-enabled efficiencies, rolling out a digital assistant called Zia as one of a number of improvements it has unveiled to boost the productivity of sales people.
Zia detects anomalies and suggests workflows and macros, and advises salespeople about the best time to contact a prospect.
39 minutes ago 8 Things to Expect from a Cloud Application SuiteIT Toolbox Blogs View Synopsis+1
I?ve upgrade my 2012 post about Cloud Application Suites to reflect how the cloud application space has matured.
39 minutes ago The complexities of those dreaded security questionnairesIT Toolbox Blogs View Synopsis+1
If you work in IT you've, no doubt, come across one of those dreaded security questionnaires. You know, those documents and spreadsheets containing hundreds of security-related questions forced upon you by prospective customers and business partners. Some are custom while others come from a standards body or are otherwise derived from one of the various security standards or regulations. Everyone's
Malicious loaders delivered by self-extracting Dropbox files - enabling payloads to bypass detection.
Apple Patches Desktop, Mobile, Wearable Platforms to Fix More than 200 Security Vulnerabilities
Nearly 1.4 billion records were compromised in 2016 as a result of roughly 1,800 data breaches, according to Gemalto's latest Breach Level Index report.
SimpliSafe, founded by Laurans Chad, was one of the first companies to introduce a DIY home security product back in 2006, years before the smart home category really took off. Since then its solutions were installed in more than 300,000 American homes. Chad and I met for a talk about home security:
2 hours ago RIP: Antivirus veteran Raimund Genes, 54The Register View Synopsis+1
Trend Micro CTO suffered fatal heart attack
Colleagues and friends are mourning the sudden death of distinguished antivirus industry veteran Raimund Genes last Friday.
MIT says that unless cybersecurity becomes a priority and more than just lip service, US core services will be at risk.
Answer: It DependsNot too fast, not too slow. Notwithstanding regulations and contractual obligations, that's legal and security experts' consensus on how quickly organizations that suspect they've been breached should notify individuals whose information may have been exposed.
Flaw posed remote code execution risk
Apple has resolved a certification validation vulnerability affecting both macOS and iOS users.
Kaspersky Lab's recently launched ICS-CERT department has published a report detailing the industrial sector threat landscape based on data collected by the company in the second half of 2016.
A new solution from IBM Trusteer automates website classification and can help label phishing websites 250% faster than traditional methods.
Android devices account for a vast majority of mobile malware infections. Could you be at risk?
Slew of Security Updates Also Includes Block for Rogue 911 CallsA scareware campaign has been locking iOS devices with faux ransomware, demanding a payoff via virtual iTunes gift cards, security researchers warn. A fix for the exploited iOS flaw is included in a massive batch of product patches and updates released by Apple.
New York State has issued guidelines that could help get us closer to a reasonable standard, but we must do even more to stay one step ahead.
Live from the X-Force Command Center IBM's VP of Threat Intelligence Caleb Barlow explains how AI can fight off hackers, and details why and how your company should run data breach response drills.
That's 86% up on 2015... and it's mostly identity theft
Almost 1.4 billion data records were compromised worldwide during 2016, a whopping increase of 86 per cent compared to the year before.