Tag Archive for: secure

How you can secure your android phone with Android Device Manager security – TheNewsGuru

How you can secure your android phone with Android Device Manager security
TheNewsGuru
Do you know Android Device Manager is a useful tool kit that takes very little time and effort to set up? If you have an Android device released after mid-2010, then you probably have access to the Android Device Manager security feature – although you

and more »

android security – read more

Tixeo Launches its New Secure Videoconferencing Android App – Telepresence Options


Telepresence Options

Tixeo Launches its New Secure Videoconferencing Android App
Telepresence Options
Tixeo, a European software company specialized in secure video conferencing, launches its new mobile app designed to host or attend meetings from any Android smartphone or tablet. Tixeo provides the first professional secure videoconferencing mobile …

android security – read more

Cisco: Secure IoT networks, not the devices

With networking pros unable to trust the security of Internet of Things devices, Cisco says they should focus on implementing network-based security protections that limit the blast radius of IoT security breaches.

This week Cisco unveiled a new package named IoT Threat Defense at the company’s IoT World Forum in London.

 IoT Threat Defense combines seven separate offerings, including network-segmentation rule creator TrustSec, network behavior analytics platform Stealthwatch and device-visibility offering named Cisco Identity Service Engine.

 +MORE AT NETWORK WORLD: 8 Tips to secure IoT devices | IoT security guidance emerges +

To read this article in full or to leave a comment, please click here

Network World Security

IDG Contributor Network: Are VMs more secure than containers?

We often say, “HTTPS is secure,” or “HTTP is not secure.” But what we mean is that “HTTPS is hard to snoop and makes man-in-the-middle attacks difficult” or “my grandmother has no trouble snooping HTTP.”

Nevertheless, HTTPS has been hacked, and under some circumstances, HTTP is secure enough. Furthermore, if I discover an exploitable defect in a common implementation supporting HTTPS (think OpenSSL and Heartbleed), HTTPS can become a hacking gateway until the implementation is corrected.

HTTP and HTTPS are protocols defined in IETF RFCs 7230-7237 and 2828. HTTPS was designed as a secure HTTP, but saying HTTPS is secure and HTTP is not still hides important exceptions.

To read this article in full or to leave a comment, please click here

Network World Security