Monday, January 23, 2017

Trump’s phone replaced with more secure device

Microsoft's standing to sue over secret U.S. data requests in doubt

Email not displaying correctly? View it in your browser.

Computerworld Security

Jan 23, 2017
Featured Image

Trump's phone replaced with more secure device

President-elect Donald Trump has turned over the Android phone he used for tweeting and will use a more secure phone with encryption capabilities that was approved by the Secret Service, according to news reports. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Microsoft's standing to sue over secret U.S. data requests in doubt
Google pushed developers to fix security flaws in 275K Android apps
Encrypted email service ProtonMail is now accessible over Tor
Spanish police nab suspect behind Neverquest banking malware
Trump nominee suggests IRS cybersecurity and staffing boosts
Lavabit developer has a new encrypted, end-to-end email protocol
Wikileaks' Assange wants to discuss extradition with the feds

White Paper: Symantec

Defense in Depth Is Necessary to Win the Battle for the Endpoint

In the world of endpoint security and antivirus, there is a need to shift away from using signatures as the primary method for malware prevention. No less than 37 new endpoint security products have emerged in the past five years, each claimed to address the changing landscape. But how do you know who to use, when to use them and if it will be enough to protect your enterprise? Read More

Thumbnail Image

Microsoft's standing to sue over secret U.S. data requests in doubt

Microsoft's lawsuit objecting to the indiscriminate use by U.S. law enforcement of orders that demand user data without the opportunity to inform the customer may run into questions about the software giant's standing to raise the issue on behalf of its customers. Read More

Thumbnail Image

Google pushed developers to fix security flaws in 275K Android apps

Over the past two years, Google has convinced developers to patch security issues in over 275,000 Android apps hosted on its official app store. Read More

Thumbnail Image

Encrypted email service ProtonMail is now accessible over Tor

The creators of encrypted email service ProtonMail have set up a server that's only accessible over the Tor anonymity network as a way to fight possible censorship attempts in some countries. Read More

Thumbnail Image

Spanish police nab suspect behind Neverquest banking malware

Spanish police have arrested a suspected Russian hacker of developing the Neverquest banking Trojan, a malware targeting financial institutions across the world. Read More

Thumbnail Image

Trump nominee suggests IRS cybersecurity and staffing boosts

Steven Mnuchin, a former CIO and executive vice president for Goldman Sachs, told senators on Thursday that he is "very concerned about the lack of first-rate technology at the IRS" as well as staff cuts in recent years. Read More

Thumbnail Image

Lavabit developer has a new encrypted, end-to-end email protocol

The developer behind Lavabit, an email service that noted leaker Edward Snowden used, is releasing source code for an open-source, end-to-end encrypted email standard that promises surveillance-proof messaging. Read More

Thumbnail Image

Wikileaks' Assange wants to discuss extradition with the feds

WikiLeaks founder Julian Assange said he stands by an earlier pledge to face trial in the U.S., but he is first urging federal investigators to name the exact charges against him. Read More

White Paper: Symantec

Endpoint Security - Market Quadrant 2016

Although they are only part of an effective strategy, enterprises need to ensure they have the right endpoint security solution in place to keep both valued data and users secure. Read this edition of Radicati Market Quadrants as it covers endpoint security and explores top vendors, vendors disrupting the market as well as emerging players organizations should look out for. Read More

Ready for action: 6 big ideas in digital transformation

This 49-page report features advice from IT executives at the U.S. Postal Service, Hunter Douglas, Blue Cross Blue Shield, Nationwide Insurance and more for using digital technologies to become more agile, more flexible and more profitable. Purchase the report here

December Digital Magazine: 2017 Tech Forecast

Check out the December Digital Magazine, featuring our Tech Forecast 2017 special report, which outlines the top priorities in hiring, spending and projects for IT leaders. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Subscribe to CSO's Security Awareness Weekly

Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Security as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive