If you own a stuffed animal from CloudPets, then you may have been hacked. The company's toys -- which can receive and send voice messages from children and parents -- have been involved in a serious data breach involving more than 800,000 user accounts. Read More ▶ | | | White Paper: Dyn Inc The bar for exceptional digital experiences has been raised-and for those businesses that rely on the internet to drive revenue, turning to a cloud-based infrastructure and CDNs are necessary to achieve the global footprint needed to meet new customer demands. Read this white paper to learn how to get started and explore the benefits of combining existing global load balancing (GLB) services with a cloud-based secondary DNS solution. Read More ▶ | It sounds like a smartphone user's worst fear: Software that starts up before the phone's operating system, intercepting and encrypting every byte sent to or from the flash memory or the network interface. This is not some new kind of ransomware, though, this is the D4 Secure Platform from Cog Systems. Read More ▶ | | SK Telecom and Nokia have developed a prototype quantum cryptography system that combines the South Korean company's quantum key server with an encryption device from Nokia. Read More ▶ | | | Engineers at South Korea's SK Telecom have developed a tiny chip that could help secure communications on a myriad of portable electronics and IOT devices. Read More ▶ | | Google is asking developers to take over its effort to make end-to-end email encryption more user friendly, raising questions over whether it will ever become an official feature in the company's products. Read More ▶ | | For our manager, the annual security gathering is a great way to get quality time with vendors. Read More ▶ | | Research/Infographic: ITS Partners Every CISO knows that cloud apps are being used by employees. Some are approved apps but most are not. What every CISO doesn't know is the full extent of the actions employees are taking in those cloud apps and how those actions introduce risk. We've summarized the top risky actions employees are taking in an infographic you should print and post on your door. Read More ▶ | Learn how to prevent data biases in the January/February 2017 issue of Computerworld's monthly Digital Magazine. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here ▶ | Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now ▶ | Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now ▶ | Search multiple listings now and get new job alerts as they are posted. Check them out now ▶ | | | |
0 comments:
Post a Comment