Safari to ape Firefox, go all-in on anti-tracking

Credit to Author: Gregg Keizer| Date: Tue, 20 Aug 2019 11:53:00 -0700

The WebKit project – the open-source initiative that generates code for Apple’s Safari browser – quietly announced last week that it would follow in Mozilla’s footsteps and quash tracking technologies designed to follow users across the web.

In a short message on Aug. 14, the WebKit team pointed to its new Tracking Prevention Policy, a document that spells out its plans in detail, including what types of tracking it will create and how it will deal with any side effects.

“We have implemented or intend to implement technical protections in WebKit to prevent all tracking practices included in this policy,” the document read. “If we discover additional tracking techniques, we may expand this policy to include the new techniques and we may implement technical measures to prevent those techniques.”

To read this article in full, please click here

Read more

Installing Windows 7 from a backup? You need a BitLocker patch right away

Credit to Author: Woody Leonhard| Date: Mon, 19 Aug 2019 09:33:00 -0700

No doubt you recall the warning back in February that Windows 7, Server 2008 and Server 2008 R2 patches starting in July would use the SHA-2 encryption protocol. If you want to install Win7 patches issued after July, you have to get the SHA-2 translator installed.

A few days ago, Microsoft tossed a zinger into the FAQs down at the bottom of its SHA-2 post, 2019 SHA-2 Code Signing Support requirement for Windows and WSUS. That post now says that you have to install a seemingly unrelated patch, KB 3133977, entitled, BitLocker can’t encrypt drives because of service crashes in svchost.exe process in Windows 7 or Windows Server 2008 R2.  

To read this article in full, please click here

Read more

How Do Threats Align With Detection And Solutions?

Credit to Author: Jon Clay (Global Threat Communications)| Date: Mon, 19 Aug 2019 14:05:16 +0000

There are many different threats targeting many different areas of a corporate network. Have you ever wondered how those threats are stopped? What threats impact which areas of a network? What technology detects and blocks those threats? I wanted to build an interactive graphic to answer those questions. This interactive infographic can help you understand…

The post How Do Threats Align With Detection And Solutions? appeared first on .

Read more

XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR

Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Mon, 19 Aug 2019 13:22:58 +0000

Real enterprises are messy places. One messy reality is that enterprises don’t manage all their endpoints. A smart colleague turned me onto using the % of endpoints and servers managed as a prime security metric. On one end of the spectrum are places like universities that maybe manage 10% of the endpoints on their network….

The post XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR appeared first on .

Read more