security
By Evan Schuman The global outage that last month prevented McDonald's from accepting payments prompted the company to release a lengthy statement that should serve as a master class in how not to report an IT problem. It was vague, misleading and yet the company used language that still allowed many of the technical details to be figured out. (You know you've moved far from home base when Burger King UK makes fun of you— in response to news of the McDonald's outage, Burger King played off its own slogan by posting on LinkedIn: “Not Loving I.T.”) The McDonald's statement was vague about what h...
Computer World
By Jonny Evans Have you ever had an unexpected direct phone call from Apple support? I have not, and if you do ever receive one, you probably aren’t talking to Apple. The company says you should immediately hang up. “If you get an unsolicited or suspicious phone call from someone claiming to be from Apple or Apple Support, just hang up,” the company support website states. Don’t fall for itOther things it warns against are suspicious calendar invitations in Mail or Calendar, annoying pop-ups in the browser, unexpected software download prompts, and fraudulent emails. The company offers up repo...
Computer World
By Greg Lambert Microsoft this week pushed out 61 Patch Tuesday updates with no reports of public disclosures or other zero-days affecting the larger ecosystem (Windows, Office, .NET). Though there are three updated packages from February, they're just informational changes with no further action is required. The team at Readiness has crafted this helpful infographic outlining the risks associated with each of the March updates. Known issues Each month, Microsoft publishes a list of known issues that relate to the operating system and platforms included in the latest update cycle; for March, t...
Computer World
By Lucas Mearian More than 150 leading artificial intelligence (AI) researchers, ethicists and others have signed an open letter calling on generative AI (genAI) companies to submit to independent evaluations of their systems, the lack of which has led to concerns about basic protections. The letter, drafted by researchers from MIT, Princeton, and Stanford University, called for legal and technical protections for good-faith research on genAI models, which they said is hampering safety measures that could help protect the public. The letter, and a study behind it, was created with the help of ...
Computer World
By Bob Violino Generative artificial intelligence (genAI) has become a focal point for many organizations over the past year, so it should come as no surprise that the technology is moving into the enterprise mobility space, including unified endpoint management (UEM). “Generative AI is the latest trend to impact the UEM space,” says Andrew Hewitt, principal analyst, Forrester. “This has been the main topic of interest in the last year. We see generative AI having impacts in multiple areas, such as script creation, knowledge-based article creation, NLP [natural language processing]-based query...
Computer World
By Preston Gralla Of all the potential nightmares about the dangerous effects of generative AI (genAI) tools like OpenAI’s ChatGPT and Microsoft’s Copilot, one is near the top of the list: their use by hackers to craft hard-to-detect malicious code. Even worse is the fear that genAI could help rogue states like Russia, Iran, and North Korea unleash unstoppable cyberattacks against the US and its allies. The bad news: nation states have already begun using genAI to attack the US and its friends. The good news: so far, the attacks haven’t been particularly dangerous or especially effective. Even...
Computer World
By Jonny Evans Your enterprise security does not live in isolation — the threat environment extends across all your colleagues, partners, and friends. That's why it’s very concerning that so many businesses continue to fail to meet basic security hygiene standards, according to the latest Security 360 report from Jamf. Data is gold, which attackers recognize — even many in business don’t. Every stolen address, email, phone number, name, or even passport number is an ID attack waiting to happen, a path to enable a more complex phishing scam, or just an opportunity to call someone up and claim t...
Computer World
By Jonny Evans Apple is preparing for future threats to iMessage by introducing upgraded encryption for its messaging service by using quantum computers. Think of it as state-of-the-art quantum security for messaging at scale, the company says, resulting in Apple's messaging system being more secure against both current and future foes. What is the protection?Announced on Apple’s Security Research blog, the new iMessage protection is called PQ3 and promises the “strongest security properties of any at-scale messaging protocol in the world.” The rationale behind this protection is “What if?” In...
Computer World
By Cisco Small and medium sized businesses can cut costs and drive growth by adopting remote working – but increasingly sophisticated cyber attackers can exploit these new practices. The trend toward hybrid working is now well established, with employees largely showing positive sentiment toward a mode of work that enables greater flexibility and eases the strain of issues such as caregiving and commuting. According to Cisco’s Global Hybrid Work Study 2022, a large majority of employees across all age groups believe that the ability to work remotely has improved their wellbeing and boosted pro...
Computer World
By Matthew Finnegan Miro has unveiled a set of security tools designed to help businesses protect sensitive data shared on its digital whiteboard application. The new Miro Enterprise Guard includes features to automate detection and classification of sensitive data, manage content for legal audits, and provide IT admins with greater control over encryption. Visual collaboration is one of the fastest-growing areas of the wider collaboration software market, according to IDC. Digital whiteboard apps provide a shared canvas for coworkers to brainstorm ideas and plan projects, with Miro competing ...
Computer World
閲覧を続けるには、ノアドット株式会社が「プライバシーポリシー」に定める「アクセスデータ」を取得することを含む「nor.利用規約」に同意する必要があります。
「これは何?」という方はこちら