Security

Security news, trends, analysis and practical advice

iPhone security / unlocking, hacking or breaking into iPhone

android security updates

Which Android phones get regular security updates? Here's a hint

A rare clue about the big picture of security update performance across the Android ecosystem.

GDPR, legal, European Union

Is your company part of the GDPR 'mobile loophole'?

Europe is leading the way in privacy protection with General Data Protection Regulations (GDPR). But most companies are not focused on what it means for their mobile workers.

android vs iOS security boxing gloves battle

Apple bans cryptocurrency mining apps on iOS to protect mobile users

Apple has created new rules for app developers that ban the creation of cryptocurrency mining services on mobile devices.

template c100.00 08 17 21.still001
video

How the Spanish cybercriminal underground operates | Salted Hash Ep 30

Host Steve Ragan reports from the RSA 2018 conference, talking with Liv Rowley, an intelligence analyst at Flashpoint, about Spanish cybercrime, an underground community that poses persistent security risks.

laptop displaying binary code with bandages on its screen

Make sure Windows auto update is temporarily turned off, and watch out for SMBv1 fixes

On Patch Tuesday, as usual, you’d be well advised to avoid the first round of traditionally buggy patches. A possible “fix” for the well-documented SMBv1 vulnerability may make this month particularly exciting.

Apple Health Records

Apple's Health Record API released to third-party developers; is it safe?

At its Worldwide Developer's event this week, Apple said the API for its Health Records platform has been released to developers and researchers so they can create apps for the medical information sharing platform. Once data is ported...

template c100.00 00 52 07.still001
video

Learn what the 'zero trust' security model really means | Salted Hash Ep 29

Host Steve Ragan reports from RSA 2018 conference, talking with Wendy Nather, director, advisory CISOs at Duo Security, about how organizations can build a zero trust model, including consistently authenticating users.

patch on top of Windows logo

May Windows and Office patches are now relatively stable, but Win7 NIC problems persist

If you’ve been holding off on installing the May Windows and Office patches, now’s a good time to release the kraken and get them installed. Just be aware that there are still acknowledged, unresolved problems with Win7 updates...

FinTech - financial technology - blockchain network - distributed ledger wireframe

What is blockchain? The most disruptive tech in decades

The distributed ledger technology, better known as blockchain, has the potential to eliminate huge amounts of record-keeping, save money and disrupt IT in ways not seen since the internet arrived.

wwdc16 cook keynote

What is Apple hiding with iOS 11.4?

Have you installed iOS 11.4? Once you’d looked at AirPlay 2 and Messages in iCloud, did you happen to take a look at the contents of the security updates?

mobile phone messaging collaboration

How to use Apple’s Messages in iCloud for iOS, Mac

Messages in iCloud is secure enough for most of us, but it opens a new attack vector for enterprise users.

hand at keyboard with Windows logo

Microsoft Patch Alert: Major bugs introduced in May fixed, plenty of problems remain

The good news? Those embarrassing SSD bugs in Windows 10 version 1803 seem to be fixed. The bad news? Just about everything else.

apple pay terminal

WWDC: Apple’s NFC plan is a big developer opportunity

Apple will open up fresh opportunities for developers as it extends Near Field Communications (NFC) support in iOS to more uses.

template c100.00 02 54 15.still001
video

TSB phishing attacks | Salted Hash Ep 33

TSB customers in the U.K. were already frustrated by the bank's technical problems, but now the situation has gotten worse as criminals take advantage of the chaos. Host Steve Ragan looks at recent TSB phishing attacks and the kit...

Amazon Echo

Amazon's Echo privacy flub has big implications for IT

Amazon has confirmed that one of its Echo devices recorded a family's conversation and then messaged it to a random person on the family's contact list. The implications are terrifying.

bsod blue screen of death

Avast blames Microsoft for Win10 1803 upgrade blue screens, nonsensical options

Avast says it has fixed the problem that triggered Win10 April 2018 Update installation blue screens and dysfunctional 'boot to another operating system' options.

secure encrypted internet web browser address bar

How your web browser tells you when it's safe

As Google moves to change how its Chrome browser flags insecure websites, rival browsers may be forced to follow suit. Here's how other browsers currently handle website security and what changes they have coming.

template c100.00 01 18 00.still001
video

How deception technologies use camouflage to attract attackers | Salted Hash Ep 26

Host Steve Ragan reports from the show floor at RSA 2018, where talks with Chris Roberts, chief security architect at Acalvio Technologies, about the benefits and misconceptions of deception technologies.

Load More