Google finds a nation-state level of attacks on iPhone

Credit to Author: Evan Schuman| Date: Tue, 11 Jan 2022 03:31:00 -0800

When it comes to mobile security, users are routinely warned to be extremely careful, avoid suspicious links, emails, and attachments. But the growth of no-click attacks sidesteps these soft defenses.

Google recently drilled into one such attack, which happened to have hit an iPhone. “We assess this to be one of the most technically sophisticated exploits we’ve ever seen, further demonstrating that the capabilities (one vendor) provides rival those previously thought to be accessible to only a handful of nation states,” said the Google advisory.

To read this article in full, please click here

Read more

Windows security in ’22 — you need more than just antivirus software

Credit to Author: Susan Bradley| Date: Mon, 10 Jan 2022 06:10:00 -0800

Do you need antivirus in 2022 — especially when some options now come with a cryptominer built in?

Several antivirus vendors — some options free, others, paid — have begun bundling their antivirus products with software that generates virtual currency. Of all of the requirements for antivirus, using excess cycles on your computer to generate crypto-coins is not on my list of must-haves.

Recently, Krebs on Security noted that both Norton Antivirus and Avira have told users that versions of their respective software now include a cryptominer. While it’s not enabled by default, it still gives me pause; antivirus is supposed to protect us from such potentially unwanted software, and these two vendors are now including it in their wares.

To read this article in full, please click here

Read more

How to choose a SaaS management platform

Credit to Author: Keith Shaw| Date: Mon, 10 Jan 2022 03:00:00 -0800

The flood of remote workers at the start of the global pandemic in early 2020 had companies scrambling to find new software for communicating and collaborating with remote workers. Many turned to software-as-a-service (SaaS) options.

It was an obvious choice. Under the SaaS model, applications are hosted and maintained by a third-party vendor and delivered to employees over the internet, making them easy to deploy remotely.

To read this article in full, please click here

Read more