"I know a number of people who are concerned that we don't have definitive proof to give proper attribution to the attack, but in cases like this we rarely have all the evidence we need to provide attribution," noted Michael Sutton, vice president of security search for Zscaler.
"Apple has a tendency to perform bulk security patching with OS upgrades, and iOS 8 didn't disappoint," said Michael Sutton, vice president of security research at Zscaler One of the more interesting patches in the batch modified "diagnostic capabilities" in iOS 8.
"For what Yahoo and Google are proposing, they almost have to do it that way," said Michael Sutton, vice president of security research at Zscaler "For things like encrypting everything in SSL, you don't need implicit buy-in from the users because it's very transparent. PGP is...
"When a vulnerability is discovered, the ability to get a patch or move to the latest upgrade isn't in the hands of Google; it's in the hands of the hardware vendor," noted Michael Sutton, vice president of security research at Zscaler. "We've seen many situations over time w...
That should raise awareness among consumers about how to use a kill switch, said Michael Sutton, vice president of security research at Zscaler "It'll draw attention to the importance of having a device properly locked down," he told TechNewsWorld. "Here's a situation where if...
Suspension of the direct messaging encryption program may disappoint some users, but it doesn't mean Twitter's commitment to privacy and security is diminishing, maintained Michael Sutton, vice president of security research at Zscaler "While adding direct message encryption w...
"For the most part, hackers are not compromising WordPress websites simply to deface them, but rather as the first step of a larger attack," Michael Sutton, vice president of security research at Zscaler, told TechnewsWorld "Compromised WordPress sites can serve as watering ho...
"It's not surprising to see Google dipping its toe in the water," said Michael Sutton, VP of security research with Zscaler. "This has been expected for a while that it would compete with the likes of AWS and Rackspace." Google's sheer immensity, however, just about ensures ...
"Loose restrictions in the Android SDK (software development kit) due to legacy issues let the app created by Gootee snoop on the smartphone's photo library," said Michael Sutton, vice president of security research at Zscaler ThreatLabZ How the Rogue App Worked...
"Google's introduction of the Bouncer service is an encouraging step forward for mobile security. Many mistakenly assume that the app store gatekeepers are protecting them from malicious content, but history suggests that detailed security reviews of apps have been lacking prior to their inclusion in the app stores," Michael Sutton, vice president of security research at Zscaler ThreatLabZ, told TechNewsWorld...
Google "takes a much more open approach [than Apple] when permitting content into their marketplace, relying on crowdsourcing -- the belief that any unsavory app will quickly be called out by the millions of Android users and can then quickly be revoked," Michael Sutton, vice president of security research at Zscaler ThreatLabZ, told TechNewsWorld...
"Devices commonly come with embedded Web server functionality fully enabled, and yet they either have no password, or simply use a default password across all devices," Michael Sutton, vice president of security research at Zscaler ThreatLabZ, told TechNewsWorld in a previous interview...
"When it comes to usability versus security, usability tends to win out, and vendors enable functionality by default to ensure that you're aware of it," Michael Sutton, vice president of security research at Zscaler ThreatLabZ, told TechNewsWorld That's because device manufact...
"Links in email can never be fully trusted," Michael Sutton, vice president of security research at Zscaler Labs, pointed out This is compounded with HTML-formatted messages, which can "easily obfuscate" the true destination of a link, Sutton told TechNewsWorld....
"Arrests will be made, LulzSec will adapt and likely evolve into a completely different entity over time," Michael Sutton, vice president of security research at Zscaler, told TechNewsWorld Exposing sensitive documents to the public may appear similar to the activities of site...
"The attacks have succeeded not because they exploited zero-day vulnerabilities, but because competent and determined individuals scoured chosen networks looking for a weak link in the security chain. Time and time again, they found it. We clearly have a long way to go as an industry before we have set the bar high enough to deter such an adversary," Michael Sutton, vice president of security research at Zscaler Labs, told TechNewsWorld...
Ultimately, it is up to cloud customers to know about cloud security. But that is a costly research task that cloud vendors are better able to handle, suggested Michael Sutton, vice president of security research for Zscaler "There is no straight answer to the cloud security q...
Sentences for similar crimes and ID theft are too lenient, with some perpetrators getting out of jail within months or a few years, said Michael Sutton, VP of security research at Zscaler. Then there is this to consider: "As an attacker the odds are in your favor," Sutton tol...
The default setting automatically provides a list of followers comprised of those you chat or email with, Michael Sutton, VP of security research at Zscaler, told the E-Commerce Times. Cranky Spouses ...
Once that is done, the government needs to ensure that cloud service vendors are adequately focused on security before and after the contracts are signed. "Security doesn't end once the services are procured," Michael Sutton, vice president of security research at ZScaler, pointed out. Like any other buyer, the federal government can include right-to-audit clauses in contracts and insist on seeing the results of regular third-party audits and assessments, he told the E-Commerce Times...
Ubuntu 23.04 ‘Lunar Lobster’ Lands With Newly Minted Cinnamon Desktop Flavor
DOJ, Five Eyes Nations Unite To Dismantle Russian Cyber-Espionage Network
Personal Data Harvesting and How To Reduce Your Digital Footprint
EdTech Developer’s Study Game Approach Aces Med School Testing Curve
Digital Health Care Flourishing Despite Legal, Logistical Hurdles
Leverage the Power of Data To Monitor Home Energy Efficiency
Unresolved Conflicts Slow eSIM Upgrade Path to Better IoT Security
Lazarus Hackers’ Linux Malware Linked to 3CX Supply-Chain Attack
Mobile Shopping Apps Linked to Digital Wallets: A Loyalty-Driving Duo
AnkerWork SR500 Speakerphone: Near Nirvana for PC Use, Phones Heck No
FBI Issues Warning About ‘Juice Jacking’ at Public USB Charging Stations
DARPA Moves Forward With Project To Revolutionize Satellite Communication
Gen AI and AR/VR: Unintended Consequences, Unproven Mainstream Appeal
Study Finds EV Battery Replacement Rare, Most Covered by Warranty
Female Army Veteran Uses Tech To Help Create a Better Future