Wednesday, March 1, 2017

Smart teddy bears involved in a contentious data breach

By virtualizing the Android OS, Cog Systems says it adds more security to smartphones

Email not displaying correctly? View it in your browser.

Computerworld Security

Mar 01, 2017
Featured Image

Smart teddy bears involved in a contentious data breach

If you own a stuffed animal from CloudPets, then you may have been hacked. The company's toys -- which can receive and send voice messages from children and parents -- have been involved in a serious data breach involving more than 800,000 user accounts. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

By virtualizing the Android OS, Cog Systems says it adds more security to smartphones
SK Telecom pushes for interoperable quantum crypto systems
This tiny chip could revolutionize smartphone and IOT security
Google shifts on email encryption tool, leaving its fate unclear
RSA Conference is a timesaver

White Paper: Dyn Inc

Extending Global Load Balancing to the Cloud with Secondary DNS

The bar for exceptional digital experiences has been raised-and for those businesses that rely on the internet to drive revenue, turning to a cloud-based infrastructure and CDNs are necessary to achieve the global footprint needed to meet new customer demands. Read this white paper to learn how to get started and explore the benefits of combining existing global load balancing (GLB) services with a cloud-based secondary DNS solution. Read More

Thumbnail Image

By virtualizing the Android OS, Cog Systems says it adds more security to smartphones

It sounds like a smartphone user's worst fear: Software that starts up before the phone's operating system, intercepting and encrypting every byte sent to or from the flash memory or the network interface. This is not some new kind of ransomware, though, this is the D4 Secure Platform from Cog Systems. Read More

Thumbnail Image

SK Telecom pushes for interoperable quantum crypto systems

SK Telecom and Nokia have developed a prototype quantum cryptography system that combines the South Korean company's quantum key server with an encryption device from Nokia. Read More

Thumbnail Image

This tiny chip could revolutionize smartphone and IOT security

Engineers at South Korea's SK Telecom have developed a tiny chip that could help secure communications on a myriad of portable electronics and IOT devices. Read More

Thumbnail Image

Google shifts on email encryption tool, leaving its fate unclear

Google is asking developers to take over its effort to make end-to-end email encryption more user friendly, raising questions over whether it will ever become an official feature in the company's products. Read More

Thumbnail Image

RSA Conference is a timesaver

For our manager, the annual security gathering is a great way to get quality time with vendors. Read More

Research/Infographic: ITS Partners

10 Examples of Employee Behaviors in the Cloud That Can Increase Risk

Every CISO knows that cloud apps are being used by employees. Some are approved apps but most are not. What every CISO doesn't know is the full extent of the actions employees are taking in those cloud apps and how those actions introduce risk. We've summarized the top risky actions employees are taking in an infographic you should print and post on your door. Read More

Does Your Data Discriminate? Read Computerworld's newest digital magazine

Learn how to prevent data biases in the January/February 2017 issue of Computerworld's monthly Digital Magazine. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Subscribe to CSO's Security Awareness Weekly

Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Security as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive