Remove Authentication Remove Linux Remove Security Remove Windows
article thumbnail

Microsoft Pluton is a new processor with Xbox-like security for Windows PCs

The Verge

Microsoft is creating a new security chip that’s designed to protect future Windows PCs. Microsoft Pluton is a security processor that is built directly into future CPUs and will replace the existing Trusted Platform Module (TPM), a chip that’s currently used to secure hardware and cryptographic keys.

Windows 141
article thumbnail

Technology Short Take 176

Scott Lowe

This Tech Short Take is a bit heavy on security-related links, but there’s still some additional content in a number of other areas, so you should be able to find something useful—or at least interesting—in here. Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Think Linux doesn’t have malware?

Linux 112
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Yubico’s new USB-C security key with NFC could be the one key to unlock them all

The Verge

Yubico is announcing a new version of its USB-C equipped YubiKey 5 security key with NFC built in, which should theoretically be a convenient combo and compatible with many future devices moving forward. Hardware-based keys offer extra layer of account security. Image: Yubico.

article thumbnail

Using Secure Configurations | Standardize Your Security

Linux Academy

This week, we’re discussing secure configurations, and why they matter. Our friends at the Center for Internet Security (CIS) listed “Secure Configurations” as the No. 5 most important security control on this year’s Top 20 hit list. Of course, I need to securely configure my devices.

article thumbnail

Wireless Security | Roadmap to Securing Your Infrastructure

Linux Academy

Wireless security is not only a huge subject, but it’s also extremely important. It was patched quickly but this raised wireless security questions about WPA2. This is a great example of being proactive in security. An attempt to help secure open wireless networks with Opportunistic Wireless Encryption (OWE).

article thumbnail

Information Stealing Malware on the Rise, Uptycs Study Shows

SecureWorld News

According to the new Uptycs whitepaper, Detecting the Silent Threat: 'Stealers are Organization Killers' (gated link), a variety of new info stealers have emerged this year, preying on Windows, Linux, and macOS systems. This demonstrates a focus on collecting data from multi-factor authentication tools.

Malware 63
article thumbnail

Passwords and Policies | Roadmap to Securing Your Infrastructure

Linux Academy

Welcome back to our weekly blog post as we look at how to better secure your infrastructure. Last week, we discussed the use of password managers and multi-factor authentication (MFA). Early on in my security days, I was introduced to policies, which, at the time, I thought were a waste of time. Policies are our foundation.