In a case of life imitating warnings, the US government appointed anew White House cyber security chief and was hoping China would agree to rules the US wants to impose on potential cyber wars, while the domestic security industry waslargely happy to hear about efforts to bring CREST accreditation to Australia . Efforts to improve sharing of threat information don't always gosmoothly, but over 1000 US defence contractors seem determined tochange that by voluntarily sharing information about cyber threats (and potentially nobbling the CISPAlegislation in the process); could a similar program work inAustralia? Others are concerned about sharing of a less benevolent kind, asthe heavy use of wireless in healthcare environments sets somepeople worrying about healthcare data security . Aiming to quash its own concerns about data security, CSO featured the story of bus transport group Grenda Security , which has revisited its server and security infrastructure toaccommodate its new reliance on virtualised infrastructure. It's not the only one: Eugene Kaspersky , who did the rounds throughout Australia on the back ofappearances at AusCERT and CeBIT, warned that Apple is still waybehind Microsoft in terms of its security. Apparently Yahoo wasn'tdoing too well either, with the company forced to update its Axisextension for Google's Chrome browser after a slight snafu with its private key that let anybody sign extensions using Yahoo's credentials; on arelated note, researchers were suggesting a way to use Transport Layer Security (TLS) protocol extensions to help browsers automatically figure out whenthey're presented with fraudulent certificates. Even as Intel launched a cloud-based single sign-service , some industry figures were asking whether cloud-based security isactually cheaper than the alternative. An Armenian malware author was sentenced to four years in prison for creating the Bredolab malware, even as Anonymous claimed it hacked a US Department of Justice website . Malware fighters were kept busy by news of a cross-browser worm that spreads via Facebook and new banking-industry Trojans thatspread via an online scam and hijack users' webcams and microphones . Indeed, statistics from McAfee suggest we've just come off the busiest quarter for PC malware inrecent history. Straight from the what-could-possibly-go-wrong department, a new SDK from Soti allows remote control of mobile applications on iPhones, iPads andiPod touches. Similarly, straight from the we-learned-the-hard-way-what-could-go-wrong department,Microsoft took down its Bing Streetside site in Germany after getting too many complaints that it's aprivacy intrusion. And Google, which faced eight new vulnerabilities in its products after they were announced by researchers, is inthe process of notifying half a million people that their systemsmay be infected with DNSChanger malware ; is still copping scrutiny from EU regulators over its privacy-policy changes; and may face new investigationsafter lawmakers pushed the US Department of Justice to reopen its investigations into Google's Wi-Fi snooping . It doesn't take a malware hit to cause a privacy breach, but a newsurvey debunked popular belief by concluding that the US Patriot Act won't actually give the US government special accessto personal data stored in US-based cloud services. It may be more useful forcompanies to focus on robust destruction of their confidential data when it's no longer necessary, some experts say, while a reportfrom security firm Onapsis found that over 95 per cent of tested SAP systems hadn'tbeen patched enough to be considered secure anymore. Follow @CSO_Australia and sign up to the CSO Australia newsletter . I am an expert from hairsalonequipments.com, while we provides the quality product, such as China Hair Stylist Combs , Salon Hair Brush, Hair Stylist Combs,and more.
Related Articles -
China Hair Stylist Combs, Salon Hair Brush,
|