Tag Archive for: secure

Android security chief: There’s no doubt Google Pixel is as secure as the iPhone – Android Central


Android Central

Android security chief: There's no doubt Google Pixel is as secure as the iPhone
Android Central
Ludwig also mentioned that although Android's security may have improved overall in the last year, the onus remains on carriers and manufacturers to deploy timely software updates and security patches. "We got quite a bit of work left to do to get to a
Director of Android Security: “For Sure” Google's Pixel is as Secure as the iPhoneDroid Life (press release) (blog)
Android is now as secure as iOS: Android Security ChiefThe Tech Portal
Android is as secure as iOS on the iPhone, says Google's director of security9 to 5 Google
Android Authority (blog) –Hot Hardware –Phandroid.com –Android Police
all 127 news articles »

“android security” – read more

Down the rabbit hole, part 1: Making my life private and secure

Over the years I’ve done a number of—let’s just call them “experiments in computering”—where I attempt to use my computers in such a way that is outside of my comfort zone. 

Living entirely in a terminal. Getting rid of all Google software and services. Using nothing but a version of FreeDOS. That sort of thing. 

I typically give myself the simple goal of “do it for 30 days, and see how it goes.” In the process, I always learn something—about what I like, about what is possible. And even if I don’t learn a cotton-pickin’ thing of value, it’s still kinda fun—kinda. 

To read this article in full or to leave a comment, please click here

Network World Security

Got big data? Check out these 100 best practices for keeping it secure

Big data is best known for its volume, variety, and velocity — collectively referred to as the “3 Vs” — and all three of those traits make security an elusive goal. Targeting companies grappling with that challenge, the Cloud Security Alliance on Friday released a new report offering 100 best practices.

As its name would suggest, the CSA focuses on promoting the use of security best practices within the cloud computing world; corporate members include VMware, Microsoft, AWS, and Red Hat. In an earlier report, the CSA broke down big data security risks into a set of the top 10 major challenges. Now, for each of those, it presents 10 best practices designed to help enterprises keep their information safe.

To read this article in full or to leave a comment, please click here

Network World Security

Microsoft rushes to fix issue that unlocks devices protected by Secure Boot

Secure boot golden key thumb

Microsoft is scrambling to fix an issue that unlocks Windows tablets, phones, and other devices protected by Secure Boot.

David Bisson reports.

Graham Cluley