Friday, February 19, 2016

White House says FBI isn't asking Apple for an iPhone back door

5 facts about Apple and the terrorist's iPhone

Email not displaying correctly? View it in your browser.

Computerworld Security

Feb 19, 2016
Featured Image

White House says FBI isn't asking Apple for an iPhone back door

The White House said it is not the aim of the government to compromise the security of Apple's iPhone, as it only wants the company to help in the case of one phone that was used by a terrorist in the San Bernardino, California, attack on Dec. 2. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

5 facts about Apple and the terrorist's iPhone
Experts contend Apple has the technical chops to comply with court order
Apple is right, the FBI demand makes us all less secure
This Hollywood hospital didn't backup its data? "Ransomware" payday for evil hackers
Security standards -- sorting through the alphabet soup
Twitter password recovery bug exposes 10,000 users' personal information
The best antivirus apps for Windows PCs and Androids

White Paper: Paladion Networks

Early Threat Detection Using Telemetry Data

With the cyber attack landscape changing daily, network infrastructure needs to respond at a similar rate. Read More

Thumbnail Image

5 facts about Apple and the terrorist's iPhone

The truth behind the hype and misunderstandings surrounding the case. Read More

Thumbnail Image

Experts contend Apple has the technical chops to comply with court order

On the latest models of the iPhone, however, Secure Enclave (SE) -- a co-processor fabricated as part of the A7 -- makes it difficult if not impossible to help law enforcement. Apple does not know or have a record of the key embedded in the SE. Read More

Thumbnail Image

Apple is right, the FBI demand makes us all less secure

Like it or not, you're going to have to take sides in the brewing fight between the FBI and Apple over iPhone encryption. Read More

Thumbnail Image

This Hollywood hospital didn't backup its data? "Ransomware" payday for evil hackers

Hollywood Presbyterian Medical Center was forced to pay a ransom if it wanted its critical data back from hackers who encrypted its computers. The hospital's CEO announced he'd spent around $17,000 in Bitcoin -- after a week of failure to restore important health data, email, and other critical stuff, presumably... Read More

Thumbnail Image

Security standards -- sorting through the alphabet soup

Information security is a complex discipline in itself, complicated by the alphabet soup of standards and regulations which exist. The myriad of standards just adds to the intimidation no doubt felt by folks on the business side who are forced to put together an information security program that protects the business and the customer, and prevents a knock on the door by dark suits representing some regulatory body. This article will attempt to demystify this complexity of standards. Read More

Thumbnail Image

Twitter password recovery bug exposes 10,000 users' personal information

Twitter has notified 10,000 users that their email address and phone number might have been exposed due to a bug in the website's password recovery feature. Read More

Thumbnail Image

The best antivirus apps for Windows PCs and Androids

AV-Test, a well-respected independent IT-security institute, announced the best antivirus award winners. Read More

Video/Webcast: Paladion Networks

NESA Compliance Management Solution

In today's ever-changing threat landscape, compliance is an essential part of an organization's' security processes. The "UAEIA Standard" outlined by the National Electronic Security Authority is designed to secure information infrastructures. Read More

Transformation That's All About the Customer

Check out our February Digital Magazine, with a cover story on how organizations are focusing their re-engineering efforts on customer demands. Also inside: How humanitarian groups are using big data to improve response efforts, and the pros and cons of an open-source career. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Subscribe to CSO's Security Awareness Weekly

Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Security as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive