The usual suspects

Credit to Author: Sharky| Date: Fri, 13 Dec 2019 03:00:00 -0800

One morning Wilma, the print shop manager at a beer distributor, discovers that her computer has a virus. It’s no big deal — sometimes bad things happen to good computers — so she cleans up the system and gets on with her day.

But a few days later the system is infected again.

Considerably more annoyed this time, she contacts Betty (the company’s sole IT person) to get some assistance and make sure the system is 100% clean. After disinfecting the system, Betty checks the browser history and finds that someone has been making late-night visits to X-rated websites.

The question then becomes, Who is using company resources to watch porn? At most companies, suspicion would immediately fall on the nighttime cleaning crew. But the print shop is located in the warehouse, to which the cleaning crew doesn’t have access.

To read this article in full, please click here

Read more

Blockchain/IoT integration accelerates, hits a 'sweet spot'

Credit to Author: Lucas Mearian| Date: Wed, 11 Dec 2019 03:00:00 -0800

Three-quarters of companies implementing IoT have already adopted blockchain or plan to use it by the end of 2020, an indicator of the growing connection between the two, according to a survey of 500 U.S. companies by Gartner.

While the marriage between the two technologies has been expected to be crucial for  industry digital transformation, the adoption rate is happening at a “much faster pace than expected,” Gartner said.

“Among the blockchain adopters, 86% are implementing the two technologies together in various projects,” Avivah Litan, a Gartner vice president and report author,  wrote in a blog. She called IoT integration “a sweet spot” for blockchain, the much-hyped distributed ledger technology.

To read this article in full, please click here

Read more

The Great $50M African IP Address Heist

Credit to Author: BrianKrebs| Date: Wed, 11 Dec 2019 22:31:12 +0000

A top executive at the nonprofit entity responsible for doling out chunks of Internet addresses to businesses and other organizations in Africa has resigned his post following accusations that he secretly operated several companies which sold tens of millions of dollars worth of the increasingly scarce resource to online marketers. The allegations stemmed from a three-year investigation by a U.S.-based researcher whose findings shed light on a murky area of Internet governance that is all too often exploited by spammers and scammers alike.

Read more

Apple is forcing the ad industry to change

Credit to Author: Jonny Evans| Date: Wed, 11 Dec 2019 07:44:00 -0800

Advertising has become too personal.

Modern systems learn too much about your personal life, tastes and aspirations, and while this is manna from heaven for advertisers, it’s an invasion of privacy for many. And Apple is changing the equation.

Intelligent Tracking Prevention

Apple has built a technology that reduces the quantity of data advertisers can harvest from your online life. It is called Intelligent Tracking Prevention and The Information tells us that since the technology debuted in 2017:

To read this article in full, please click here

Read more

Apple is forcing the ads industry to change

Credit to Author: Jonny Evans| Date: Wed, 11 Dec 2019 07:44:00 -0800

Advertising has become too personal.

Modern systems learn too much about your personal life, tastes and aspirations, and while this is manna from heaven for advertisers, it’s an invasion of privacy for the many. And Apple is changing the equation.

Intelligent Tracking Prevention

Apple has built a technology that reduces the quantity of data advertisers can harvest from your online life. It is called Intelligent Tracking Prevention and The Information tells us that since the tech debuted in 2017:

To read this article in full, please click here

Read more

Patch Tuesday brings a reprise of the Autopilot debacle, now quashed, and another Win7 nag

Credit to Author: Woody Leonhard| Date: Wed, 11 Dec 2019 07:33:00 -0800

Patch Tuesday in December rarely brings anything worthwhile — everybody’s on vacation, or wants to be on vacation — and this month’s no exception. We got patches for 36 separately identified security holes and two new advisories, full of sound and fury but covering very little.

The one “exploited” security hole — CVE-2019-1458 Win32k Elevation of Privilege Vulnerability — shouldn’t cause any heartburn. Microsoft says:

To read this article in full, please click here

Read more

Blockchain/IoT integration accelerates, hits a 'sweet spot' for the two technologies

Credit to Author: Lucas Mearian| Date: Wed, 11 Dec 2019 03:00:00 -0800

Three-quarters of companies implementing IoT have already adopted blockchain or plan to use it by the end of 2020, an indicator of the growing connection between the two, according to a survey of 500 U.S. companies by Gartner.

While the marriage between the two technologies has been expected to be crucial for  industry digital transformation, the adoption rate is happening at a “much faster pace than expected,” Gartner said.

“Among the blockchain adopters, 86% are implementing the two technologies together in various projects,” Avivah Litan, a Gartner vice president and report author,  wrote in a blog. She called IoT integration “a sweet spot” for blockchain, the much-hyped distributed ledger technology.

To read this article in full, please click here

Read more

Patch Tuesday, December 2019 Edition

Credit to Author: BrianKrebs| Date: Wed, 11 Dec 2019 01:51:25 +0000

Microsoft today released updates to plug three dozen security holes in its Windows operating system and other software. The patches include fixes for seven critical bugs — those that can be exploited by malware or miscreants to take control over a Windows system with no help from users — as well as another flaw in most versions of Windows that is already being exploited in active attacks.

Read more