Tagged: Secure Toggle Comment Threads | Keyboard Shortcuts

  • jkabtech 4:17 am on July 5, 2018 Permalink | Reply
    Tags: , , , Secure   

    Six Tips to Keep Your Facebook Clean, Secure, and Private 

    Got hundreds of Facebook friends you hardly know?

    Now is a good time to do some digital cleanup, while the year is still fresh. Review your security and privacy settings, and make sure those casual acquaintances you met at a bar eons ago aren’t still getting the most intimate details of your life. Get rid of games and apps that might have latched onto your account years ago, but that you no longer use.

    .embed-container

    View the Original article

    Advertisements
     
  • jkabtech 12:17 pm on April 1, 2018 Permalink | Reply
    Tags: , , , , Hardware, , Secure   

    AMD Ryzen Pro CPUs With Hardware Encryption for Secure Corporate and Enterprise PCs Announced 

    Highlights The Ryzen 7 Pro, Ryzen 5 Pro and Ryzen 3 Pro will launch on August 29 All Ryzen Pro CPUs have hardware-level security co-processors Manageability and security enhancements begin on the production line

    AMD has announced that its Ryzen Pro CPUs for enterprise and corporate desktops will launch on August 29. There will be six models in all – two each under the Ryzen 7 Pro, Ryzen 5 Pro and Ryzen 3 Pro brands. AMD promises a number of features that distinguish Ryzen Pro CPUs from regular commercial Ryzen ones, and also claims to match or exceed Intel’s current-generation offerings in many ways.

    Ryzen Pro CPUs use the same basic architecture as their Ryzen counterparts, but are enhanced for reliability and security. Each CPU has a dedicated hardware co-processor on the same package, which the company says is superior to having a secure module on the motherboard, as it reduces opportunities for malware and attackers to get to the CPU. When powering up a computer, the co-processor holds the CPU cores in a suspended state until it can verify the integrity of the BIOS and other hardware. The normal boot process begins only after the hardware root of trust has authorised it.

    Ryzen Pro CPUS also have dedicated logic blocks for encryption and decryption, reducing the workload on the CPU cores. Data can be encrypted using AES as it is sent form the CPU to system memory, and decrypted as it comes in the opposite direction. This happens on-the-fly and is completely transparent to the OS and applications, meaning that even legacy software can be run in a more secure environment.

    AMD’s OEM partners can design custom systems that take advantage of hardware-based security for specific applications. As an example, future CPUs with integrated graphics will feature DRM support implemented through this secure enclave. AMD says that security is even built into the manufacturing process, with additional checks and tests performed on CPUs right as they leave the production line, to ensure their integrity.

    AMD will commit to making Ryzen Pro CPUs available for two years, and that the platform will remain unchanged for at least 18 months in order to simplify and reduce costs associated with large-scale deployment and management. Ryzen Pro will work with the DASH standard for bulk remote manageability, which is cross-platform and non-proprietary. Finally, Ryzen Pro CPUs will have a three-year warranty, compared to one-year for consumer Ryzen CPUs.

    The company stresses that while Intel restricts manageability features to its more expensive Core i5 and i7 CPUs, it will make the full range of features available across its entire stack. The idea is that users who don’t need much raw compute power shouldn’t have to sacrifice security, and companies shouldn’t have to spend more on capabilities their workers don’t need. Ryzen 7 Pro is aimed at heavy multitaskers and content creators who work with 3D graphics, software development and scientific data. Ryzen 5 Pro targets “advanced productivity” and remote collaboration, while Ryzen 3 Pro is suitable for those who work with documents, surf the Web, and use common productivity applications.

    The Ryzen Pro 7, Pro 5 and Pro 3 products were designed specifically to take on equivalent Intel Core i7, i5 and i3 models. The Ryzen 7 Pro 1700X and 1700 both have 8/16 cores and threads, while the Ryzen 5 1600 and 1500 mirror their Ryzen counterparts with 6/12 and 4/8 cores and threads respectively. The Ryzen 3 Pro 1300 and 1200 come in with four cores and four threads each.

    This is also the first look we’ve had at what AMD has planned for its consumer Ryzen 3 lineup, which is yet to be released. These models lack multi-threading, but could still pose a significant threat to Intel’s dual-core Core i3 models. However, all current Ryzen CPUs lack integrated graphics, which means that Intel still has a major cost and complexity advantage for users who don’t need a discrete graphics card.

    Along with all the Pro-specific features, these new CPUs will benefit from all the same features as the consumer Ryzen lineup, including fine-grained frequency control, advanced sensors embedded within the fabric to control heat and power consumption, and the 52 percent generational leap that the Zen architecture represents over previous AMD products.

    Further details regarding specific OEM partners and customised solutions will be announced on August 29 at the formal Ryzen Pro launch.

    For the latest tech news and reviews, follow Gadgets 360 on Twitter, Facebook, and subscribe to our YouTube channel.

    Tags: AMD, Ryzen, AMD Ryzen Pro, Ryzen Pro, Ryzen 7 Pro, Ryzen 5 Pro, Ryzen 3 Pro, AMD Ryzen Pro launch

    View the Original article

     
  • jkabtech 8:17 pm on March 29, 2018 Permalink | Reply
    Tags: , , , , Secure, , ,   

    Microsoft Pushing Windows 10 Users to Install Creators Update to Stay Secure 

    Highlights Windows 10 first version users won’t get future security updates It will send notifications to users to update to the latest version However, it won’t ask them to force install

    Microsoft’s trend of aggressively pushing its updates onto Windows users is now common knowledge. The company tried to tone it down a bit in the recent past, but has now announced that all Windows 10 first version users must update to the latest version as soon as possible. Of course, this time, it’s reason to push the updates is much more noble – user safety. To help users make this transition, Microsoft will send out notifications to users of the first version of Windows 10, recommending they install the Windows 10 Creators Update, as it’s the end of service for the first version.

    End of service means that users with Windows 10 version 1507 will no longer receive security patches – part of the monthly ‘quality’ updates issued by the company – in the future. Microsoft wants everyone to get onto the latest version as it also brings bunch of security fixes with each update, helping PCs and laptops get more secure and less prone to malware attacks.

    If Microsoft notices that you’re on the first version, it will send you notification alerting you to install the Creators update. This prompt won’t force you to install the update, but will only display a convenient button for updating to the latest ‘feature’ update – the Windows 10 Creators Update. There will also be another prompt to alert you to review your privacy settings. You can choose to postpone this process up to five times with the next prompt asking for confirmation of your privacy settings.

    View the Original article

     
  • jkabtech 12:17 pm on November 27, 2017 Permalink | Reply
    Tags: , halts, readiness, Secure   

    Lack of ISP readiness halts DNS secure key change 

    No new date for key rollover.

    An update to the digital security key for the domain name system (DNS) has been postponed due to a lack of readiness from some network operators.

    The Internet Corporation for Assigned Names and Numbers (ICANN) had originally scheduled the key rollover for the top-level DNS on October 11 this year, extensively communicated the change, and provided a testing platform for operators as well.

    ICANN said the update was an important step in keeping the global DNS safe and secure, but at the same time warned operators that they had to be ready for the change, or their users would be unable to look up domain names and reach large parts of the internet as a result.

    Despite the publicity around the issue, ICANN now says new data shows internet providers and network operators are not yet ready for the change.

    Rather than go ahead and risk internet breakage for 750 million people – or a quarter of all internet users that use DNS security extensions that depend on the functioning credentials – ICANN decided to postpone the key rollover.

    “We would rather proceed cautiously and reasonably, than continue with the roll on the announced date of 11 October,” ICANN chief executive Göran Marby said.

    “It would be irresponsible to proceed with the rollover after we have identified these new issues that could adversely affect a significant number of end users.”

    The issues identified by ICANN include providers not configuring their resolver software properly, and a bug in an unnamed but widely-used program not updating the key automatically as expected as per RFC 5011.

    If the validating resolver in question has an incorrect implantation of RFC 5011, or if its automated trust anchor update protocol is incorrectly configured, then updates during the key rollover might not work properly.

    Should that happen, domain name resolution will fail after the key rollover.

    ICANN hopes providers will sort out the issues and hopes to reschedule the key rollover to take place in the first quarter of next year, but the organisation has not set a specific date yet.

    The current key for the DNS remains secure and can be used until the new one can be deployed, ICANN said.

    View the Original article

     
  • jkabtech 4:17 am on September 22, 2017 Permalink | Reply
    Tags: clinics, Secure, trying   

    How ADHA is trying to secure GP clinics 

    As opt-out change looms.

    It’s no secret that your local doctor’s office is unlikely to have the best protections when it comes to securing your personal health records.

    In this small business environment, technology often gets pushed to the bottom of the priority list when contending with life or death matters.

    It means medical practices often fall victim to ransomware attacks that exploit vulnerabilities in old software – like the recent WannaCry epidemic – and hold patient and practice data to ransom.

    Health services was the second most frequently breached industry in 2016, according to Symantec. Medical records also fetch a pretty penny on the black market, at somewhere around US$10 per record on average.

    But with the shift to an online health record for every Australian looming – and in light of the recent access control issues raised in the discovery of black market sales of Medicare details – strengthening these weak links in the chain becomes all the more pertinent.

    From next year every Australian will get an e-health record, unless they explicitly remove their consent.

    It means the Australian Digital Health Agency (ADHA) will be in charge of securing around 22 million e-health records within a big ecosystem of healthcare providers.

    “We’ve worked on the basis that one record is worth US$1 and we’ve got 22 million of them – is that enough for somebody to get out of bed and try to steal our data? I think it is,” ADHA chief information security officer Anthony Kitzelmann told the Technology in Government conference.

    This is why the ADHA will spend $15.8 million this year alone shoring up the security of the My Health Record system.

    This focus on security was also behind the hiring of Kitzelmann, a former Lockheed Martin CISO who joined the agency in February.

    But one of ADHA’s biggest challenges is working out what an applicable standard for digital health in Australia looks like in lieu of any prescriptive documentation.

    “Is the ISM an appropriate standard? Is the ISO standard applicable? HIPAA regulations out of the US? Which one works, which is fit for purpose?” Kitzelmann said.

    An internal review conducted in the lead-up to the policy switch to opt-out e-health records found that there were elements of all these standards that could apply to Australia’s e-health ecosystem.

    More importantly what came out of the review process was that ADHA needed to change its focus and move to a risk-based governance model.

    “If we have a large jurisdiction that has 130,000 employees and a massive investment in their health strategy, we’d expect them to sit

    View the Original article

     
  • jkabtech 5:21 am on April 29, 2016 Permalink | Reply
    Tags: , , , Secure,   

    Can Apple still claim its iPhones are secure? 

    Getty ImagesApple CEO Tim Cook (left) and FBI Director James Comey.

    Has Tim Cook’s biggest fear been realized?

    For weeks, Apple’s CEO said the company wouldn’t comply with a court order to help the FBI crack an iPhone tied to the San Bernardino terror attack in December. Creating a backdoor, Cook argued, would open the way for any bad guys who wished to enter.

    “In the wrong hands, this software

    View the Original article

     
  • jkabtech 12:40 am on March 30, 2016 Permalink | Reply
    Tags: BlackBerry, Denied, , Secure,   

    Security News This Week: The NSA Denied Hillary a Secure BlackBerry 

    Caption: Chip Somodevilla/Getty Images

    Skip Article Header. Skip to: Start of Article. hillary-clinton-84199280.jpgChip Somodevilla/Getty Images
     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel
%d bloggers like this: