Tag Archive for: changes

Google Changes How it Analyzes Misbehaving Mobile Apps

Google has a new machine-learning algorithm it uses to compare new apps to known secure apps, improving the way it classifies submissions to Google Play.
Threatpost | The first stop for security news

Asus Zenfone AR update brings camera-related changes, Android Pay app – GSMArena.com


GSMArena.com

Asus Zenfone AR update brings camera-related changes, Android Pay app
GSMArena.com
A new BeautyLive app and the Android security fixes for May are also included. The change-log also says that Do It Later and ZenFit apps (as well as files related to PhotoCollage and MiniMovie) will get deleted post update. Finally, some third-party

and more »

android security – read more

New NIST guidelines banish periodic password changes

New NIST guidelines do away with periodic password changes

New draft guidelines have been issued by NIST are recommending that users should not be forced to periodically change their passwords.

Guest contributor Bob Covello reports.

Graham Cluley

IDG Contributor Network: Cyber crime as a service forces changes in information security

Cyber crime has been commercialized. Infecting computers with ransomware or using an advanced persistent threat to pilfer intellectual property no longer requires deep technical knowledge. Just use Google to learn how to access the Dark Web, and you can find hackers who, for a price, are more than happy to write malware, create highly effective spear phishing campaigns and develop bogus websites for harvesting login credentials.

+ Also on Network World: DDoS-for-hire services thrive despite closure of major marketplace +

Major companies (think Fortune 500 organizations) understand that cyber crime as a service has changed how they handle defense. But for organizations still maturing their defensive measures, here’s what the transformation of cyber crime into an industry means for how you approach information security.  

To read this article in full or to leave a comment, please click here

Network World Security