Why the Fed is considering a cash-backed cryptocurrency

Credit to Author: Lucas Mearian| Date: Tue, 11 Feb 2020 03:00:00 -0800

The Federal Reserve is investigating the potential of a central bank digital currency (CBDC) as the backbone for a new, secure real-time payments and settlements system.

The move toward a form of government-backed digital currency is being driven by Fintech firms and a banking industry already piloting or planning to pilot cash-backed digital tokens, according to Lael Brainard, a member of the U.S. Federal Reserve’s Board of Governors.

“Today, it can take a few days to get access to your funds. A real-time retail payments infrastructure would ensure the funds are available immediately – to pay utility bills or split the rent with roommates, or for small business owners to pay their suppliers,” said Brainard, who serves as chair of the committees overseeing Financial Stability and Payments, Clearing and Settlements.

To read this article in full, please click here

Read more

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Credit to Author: BrianKrebs| Date: Tue, 11 Feb 2020 03:25:52 +0000

The U.S. Justice Department today unsealed indictments against four Chinese officers of the People’s Liberation Army (PLA) accused of perpetrating the 2017 hack against consumer credit bureau Equifax that led to the theft of personal data on nearly 150 million Americans. DOJ officials said the four men were responsible for carrying out the largest theft of sensitive personal information by state-sponsored hackers ever recorded. 

Read more

Patch Tuesday’s tomorrow. Verify you have 'Pause Updates' enabled

Credit to Author: Woody Leonhard| Date: Mon, 10 Feb 2020 12:13:00 -0800

Read more

UEM to marry security — finally — after long courtship

Credit to Author: Lucas Mearian| Date: Mon, 10 Feb 2020 03:00:00 -0800

The days of enterprise security being a separate entity from mobile and desktop endpoint management are coming to an end, which should delight infrastructure and security teams who’ll eventually have more powerful machine learning-enabled tools at their disposal — and a single console through which to control them.

Security around mobile and desktop infrastructures has traditionally depended on what’s being managed; you purchase one for mobile devices and another for the rest of your endpoints, whether laptop or desktop.

While security threats are growing, particularly phishing attacks via email, SMS or hyperlinks, the amount of money companies spend on mobile security appears to be shrinking. And yet, the percentage of organizations that admit to having suffered a mobile compromise grew in 2019, according to a Verizon survey.

To read this article in full, please click here

Read more

UEM to marry security – finally – after long courtship

Credit to Author: Lucas Mearian| Date: Mon, 10 Feb 2020 03:00:00 -0800

The days of enterprise security being a separate entity from mobile and desktop endpoint management are coming to an end, which should delight infrastructure and security teams who’ll eventually have more powerful machine learning-enabled tools at their disposal – and a single console through which to control them.

Security around mobile and desktop infrastructures has traditionally depended on what’s being managed; you purchase one for mobile devices and another for the rest of your endpoints, whether laptop or desktop.

While security threats are growing, particularly phishing attacks via email, SMS or hyperlinks, the amount of money companies spend on mobile security appears to be shrinking. And yet, the percentage of organizations that admit to having suffered a mobile compromise grew in 2019, according to a Verizon survey.

To read this article in full, please click here

Read more

Dangerous Domain Corp.com Goes Up for Sale

Credit to Author: BrianKrebs| Date: Sat, 08 Feb 2020 17:32:04 +0000

As an early domain name investor, Mike O’Connor had by 1994 snatched up several choice online destinations, including bar.com, cafes.com, grill.com, place.com, pub.com and television.com. Some he sold over the years, but for the past 26 years O’Connor refused to auction perhaps the most sensitive domain in his stable — corp.com. It is sensitive because years of testing shows whoever wields it would have access to an unending stream of passwords, email and other proprietary data belonging to hundreds of thousands of systems at major companies around the globe.

Read more

Smart lighting security flaw illuminates risk of IoT

Credit to Author: Jonny Evans| Date: Fri, 07 Feb 2020 06:35:00 -0800

The latest smart home security nightmare sheds light on the risk you take each time you add another connected item to your home, office or industrial network – and even market leading brands make mistakes.

The story of Hue

Philips Hue smart lighting systems are probably among the most widely installed smart home solutions in the world, so plenty of people deserve to learn about the latest Check Point research which warns of a major security flaw in them.

To read this article in full, please click here

Read more

U.S. Air Force to pilot blockchain-based database for data sharing

Credit to Author: Lucas Mearian| Date: Thu, 06 Feb 2020 13:23:00 -0800

The U.S. Air Force (USAF) is planning to test a blockchain-based graph database that will allow it to share documents internally as well as throughout the various branches of the Department of Defense and allied governments.

The permissioned blockchain ledger comes from a small Winston-Salem, N.C. start-up, Fluree PBC, which announced the government contract this week. Fluree is working with Air Force’s Small Business Innovation Research AFWERX technology innovation program to launch a proof of concept of the distributed ledger technology (DLT) later this year.

To read this article in full, please click here

Read more

Is Apple's iCloud folder sharing a shadow IT problem?

Credit to Author: Jonny Evans| Date: Thu, 06 Feb 2020 06:35:00 -0800

After a long delay, Apple is preparing to introduce iCloud Folder Sharing across both its Mac and iOS platforms. This is a big blessing for collaboration, but is it safe?

What is iCloud Folder Sharing?

iCloud Folder Sharing was first announced at WWDC 2019, but delayed until – well, at present it is still delayed and was only recently made available inside the latest iOS and macOS developer betas. Which means it should be on the way.

Probably.

How it works?

To read this article in full, please click here

Read more

When Your Used Car is a Little Too ‘Mobile’

Credit to Author: BrianKrebs| Date: Thu, 06 Feb 2020 00:44:26 +0000

Many modern vehicles let owners use the Internet or a mobile device to control the car’s locks, track location and performance data, and start the engine. But who exactly owns that control is not always clear when these smart cars are sold or leased anew. Here’s the story of one former electric vehicle owner who discovered he could still gain remote, online access to his old automobile years after his lease ended.

Read more