The Latest in IT Security

minus
  • img
  • img
  • img
  • img
  • img
  • img
  • img
  • img
plus

Categories

FRIDAY, FEBRUARY 12, 2016

Featured

Archives

Latest Comments

Social Networks

Part of data privacy protection consists in being able to permanently delete data when necessary. Data deletion is another form of user control over sensitive or private information that has been at one moment entrusted upon a device or a storage medium. This brings out the question of how hard it is to permanently delete […]

Read more ...

Microsoft’s February 2016 Patch Tuesday updates include a total of 13 bulletins designed to address dozens of vulnerabilities in the company’s products. It’s worth pointing out that one of the bulletins, MS16-022, fixes the 22 Flash Player flaws resolved by Adobe on Tuesday. The Microsoft bulletin patches the Flash libraries used in Internet Explorer 10 […]

Read more ...

As with anything techy, terms like “threat intelligence” have myriad definitions. For our purposes, let’s use Gartner’s description: “Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject’s response to that menace […]

Read more ...

From now on, Gmail users will be able to see whether their communications with other email account holders – whether Gmail or any other email service – is secured. If it’s not, there will be a red broken lock icon in the upper right corner of the message. “Gmail has always supported encryption in transit […]

Read more ...

AT&T’s CEO believes that the company should not offer robust security to its customers: But tech company leaders aren’t all joining the fight against the deliberate weakening of encryption. AT&T CEO Randall Stephenson said this week that AT&T, Apple, and other tech companies shouldn’t have any say in the debate. “I don’t think it is […]

Read more ...