Microsoft Posts Checklist for a Highly Secure PC

Not all systems we think of as “secure” will be up to Microsoft’s standards, but you might be close as long as you’ve got newer hardware.

The post Microsoft Posts Checklist for a Highly Secure PC appeared first on ExtremeTech.

The original article can be found here: https://www.extremetech.com/computing/258637-microsoft-posts-checklist-highly-secure-pc?source=Computing

Powered by WPeMatico

Mozilla gave $100,000 to secure email platform harnessed by Antifa groups

Mozilla has awarded $100,000 to RiseUp, a secure communication platform widely used by anti-fascist groups.

The original article can be found here: http://www.foxnews.com/tech/2017/10/10/mozilla-gave-100000-to-secure-email-platform-harnessed-by-antifa-groups.html

Powered by WPeMatico

Microsoft Windows 10 S Isn’t as Secure as the Company Claims

Windows-10

Microsoft’s Windows 10 S may be more secure than other versions of the OS, but no operating system is perfectly locked down.

The post Microsoft Windows 10 S Isn’t as Secure as the Company Claims appeared first on ExtremeTech.

The original article can be found here: https://www.extremetech.com/computing/251467-microsofts-windows-10-s-variant-isnt-secure-company-claims?source=Computing

Powered by WPeMatico

UK battles counterfeiters, launches ‘most secure coin in the world’

The U.K.’s Royal Mint has released what it describes as the “most secure coin in the world.” The bimetallic £1 coin, which entered into circulation Tuesday, boasts a hologram-style image, micro lettering and a “hidden security feature” designed to beat counterfeiters.

The original article can be found here: http://www.foxnews.com/tech/2017/03/28/uk-battles-counterfeiters-launches-most-secure-coin-in-world.html

Powered by WPeMatico

Trump's Not the Only One With a Phone Security Problem


Is your Android phone secure? President Donald Trump’s favorite smartphone reportedly is an older Android device. Security concerns flared recently, following indications that he sent some tweets from it. Of course, the president has been given a special secure device, but it’s not clear whether he is using it. My question is, if the president is not secure using an ordinary phone for his primary wireless communications… are any of us? This is the same security dilemma President Obama faced when he took office eight years ago.

The original article can be found here: http://www.ecommercetimes.com/story/84315.html?rss=1

Powered by WPeMatico

Microsoft leaks Secure Boot credentials, shows why backdoor ‘golden keys’ can’t work

linux-boot-windows-81
Microsoft accidentally shipped a security policy that destroys its own Secure Boot system — and demonstrates in the process why security that relies on so-called “golden keys” can never work.

The original article can be found here: http://www.extremetech.com/computing/233400-microsoft-leaks-secure-boot-credentials-demonstrates-why-backdoor-golden-keys-cant-work

Powered by WPeMatico

Microsoft Research proposes a method for full control over data stored in the cloud

Microsoft Research is currently working on a project to enable secure data exchange in the cloud, which uses multiparty computation to generate results without exposing the actual data held by all parties involved. The team will release tools soon.

The original article can be found here: http://www.foxnews.com/tech/2016/08/10/microsoft-research-proposes-method-for-full-control-over-data-stored-in-cloud.html

Powered by WPeMatico

Amid FBI row, Apple hires developer behind secure messaging app Signal

Article Image Apple is hiring Frederic Jacobs — a developer responsible for the secure chat app Signal — to work on the CoreOS security team this summer, a report noted on Friday.

The original article can be found here: http://appleinsider.com.feedsportal.com/c/33975/f/616168/s/4de14415/sc/28/l/0Lappleinsider0N0Carticles0C160C0A20C260Camid0Efbi0Erow0Eapple0Ehires0Edeveloper0Ebehind0Esecure0Emessaging0Eapp0Esignal/story01.htm

Powered by WPeMatico

Telegram Shutters 78 ISIS Channels


The team behind the Telegram secure messaging app on Wednesday reported that it had shut down 78 channels, across 12 languages, used by ISIS and its supporters. However, the app’s privately used channels weren’t affected by the sweep. After the attacks on Paris last weekend, for which ISIS has claimed responsibility, the Telegram team learned via reports sent to abuse@telegram.org that the terrorist group had been communicating openly on its secure messaging platform. Telegram has emphasized that it has no intention of blocking free speech.

The original article can be found here: http://www.ecommercetimes.com/story/82777.html?rss=1

Powered by WPeMatico

Microsoft to Add Secure Islands to Its Cloud


Microsoft on Tuesday announced that it has agreed to purchase data security firm Secure Islands. It will pay between $78 million and $150 million, according to reports, but company spokesperson Joel Sider declined to disclose the terms of the acquisition, which requires regulatory approval. Secure Islands’ products will be integrated into the Azure Rights Management Service, but current clients can continue using its products for now, Microsoft said.

The original article can be found here: http://www.ecommercetimes.com/story/82733.html?rss=1

Powered by WPeMatico

JPEG Committee Proposal Stirs Image-DRM Fears


The JPEG Committee last week met in Brussels to discuss a proposal to secure privacy information such as metadata for published pictures that includes geographical information enabling identification of people who have given anonymous interviews to journalists, and pictures posted on social media intended only for a limited audience.
The proposal also seeks to address intellectual property rights for images provided by commercial stock providers or news agencies. Privacy concerns inhibit digital content distribution, the JPEG Committee said.

The original article can be found here: http://www.ecommercetimes.com/story/82628.html?rss=1

Powered by WPeMatico

Australian shopper lines up for iPhone 6s with iPad-based telepresence robot

Article Image An Australian woman is using an iPad-equipped telepresence robot in Sydney to remotely secure her place in line for Apple’s Friday launch of the highly anticipated iPhone 6s.

The original article can be found here: http://appleinsider.com.feedsportal.com/c/33975/f/616168/s/4a2361ee/sc/28/l/0Lappleinsider0N0Carticles0C150C0A90C240Caustralian0Eshopper0Elines0Eup0Efor0Eiphone0E6s0Ewith0Eipad0Ebased0Etelepresence0Erobot/story01.htm

Powered by WPeMatico

Tech Q&A: Online banking, TV as computer monitor, music streaming and more

Kim Komando answers your questions about secure online banking, turning your TV into your computer monitor, streaming music services, and more. 

The original article can be found here: http://www.foxnews.com/tech/2015/06/27/tech-qa-online-banking-tv-as-computer-monitor-music-streaming-and-more/

Powered by WPeMatico

BitTorrent's Bleep secure chat comes to iOS, Microsoft adds features to core iOS Office apps

BitTorrent on Tuesday released the first iOS version of Bleep, its secure messaging app, while Microsoft updated its flagship Office iOS apps with a handful of new features.



The original article can be found here: http://appleinsider.com.feedsportal.com/c/33975/f/616168/s/46405d3b/sc/15/l/0Lappleinsider0N0Carticles0C150C0A50C120Cbittorrents0Ebleep0Esecure0Echat0Ecomes0Eto0Eios0Emicrosoft0Eadds0Efeatures0Eto0Ecore0Eios0Eoffice0Eapps/story01.htm

Powered by WPeMatico

Researchers leverage SSL bug to crash Apple devices over Wi-Fi in 'No iOS Zone' attack

A bug in iOS’s secure sockets layer (SSL) library could allow an attacker to force apps –?or in some cases, the entire device –?to crash if users connect to a malicious Wi-Fi hotspot, security researchers demonstrated this week.



The original article can be found here: http://appleinsider.com.feedsportal.com/c/33975/f/616168/s/45a307c7/sc/28/l/0Lappleinsider0N0Carticles0C150C0A40C220Cresearchers0Eleverage0Essl0Ebug0Eto0Ecrash0Eapple0Edevices0Eover0Ewi0Efi0Ein0Eno0Eios0Ezone0Eattack/story01.htm

Powered by WPeMatico

Linux’s worst-case scenario: Windows 10 makes Secure Boot mandatory, locks out other operating systems

linux-boot-windows-81
With Windows 10, Microsoft will mandate Secure Boot — and the ability to turn the feature off has gone from mandatory to optional. This could cripple the ability to install any other OS on OEM hardware.

The original article can be found here: http://www.extremetech.com/extreme/201722-linuxs-worst-case-scenario-microsoft-makes-secure-boot-mandatory-locks-out-other-operating-systems

Powered by WPeMatico

Apple reportedly in talks to build $1.7B plant in partnership with Japan Display

Apple may soon secure a more stable source for small to medium sized device displays, as the company is said to be in talks with Japan Display on the buildout of a $1.7 billion manufacturing plant.



The original article can be found here: http://appleinsider.com.feedsportal.com/c/33975/f/616168/s/439359ef/sc/21/l/0Lappleinsider0N0Carticles0C150C0A20C190Capple0Ereportedly0Ein0Etalks0Eto0Ebuild0E17b0Eplant0Ein0Epartnership0Ewith0Ejapan0Edisplay0E/story01.htm

Powered by WPeMatico

Vital email security researcher may call it quits over lack of funds

Data security
One of the most prominent developers of secure email software may have to call it quits due to funding shortages. This is a repeated problem in computer software — the standards we depend on are appallingly underfunded.

The original article can be found here: http://www.extremetech.com/computing/198906-vital-email-security-researcher-may-call-it-quits-over-lack-of-funds

Powered by WPeMatico

Hacker 'reconstructs' German politician's fingerprint from photos

Fingerprint-based biometric technology is used to secure everything from iPhones to safes. Now, a member of the Chaos Computer Club, a European hacker network, claims to have replicated the fingerprint of German Defense Minister Ursula von der Leyen using photographs of the politician’s thumb,

The original article can be found here: http://www.foxnews.com/tech/2014/12/29/hacker-reconstructs-german-politician-fingerprint-from-photos/

Powered by WPeMatico