STE WILLIAMS

US Marines seek a few supposedly good men … who leaked naked pics of a few good women

The US Marine Corps is investigating how compromising photos of some of its female members came to be shared on Facebook and Google Drive by fellow marines.

In January, a closed Facebook group called Marines United was plastered with photos of partially clothed or naked female members of the Corps, along with their names, ranks and serial numbers in some cases, plus lewd comments about their looks. The pics were spotted by former Marine Thomas Brennan, who runs The War Horse, a non-profit blog. His story was published by the Center for Investigative Reporting.

“The Marine Corps is deeply concerned about allegations regarding the derogatory online comments and sharing of salacious photographs in Marines United, a closed website,” said a USMC spokesman on Sunday.

“This behavior destroys morale, erodes trust and degrades the individual. The Marine Corps does not condone this sort of behavior, which undermines its core values. Allegations of misconduct are thoroughly investigated and handled at the appropriate judicial or administrative forum.”

According to Brennan, more than two dozen active and retired female members of the USMC were exposed on the Facebook forum and via a Google Drive account. When he alerted the USMC, the postings were taken down, and a former Marine, now a civilian contractor, was identified as the source and was fired.

That didn’t stop the leaks: in February, more images were shared to the thousands of members in the Facebook group, and were accompanied by more than 2,500 crude comments. A Marine identified as the source of at least some of the images was discharged from the Corps. An internal investigation continues.

One victim, a corporal in uniform who was photographed at Camp Lejeune, North Carolina, told The War Horse she was very concerned, not only by the breach of privacy but also by what this could do to her military career. We’re told whoever took the snap was standing right by her.

“He was standing close enough to smell my perfume,” she said. “This is going to follow me – just like he did.”

Both the Chairman of the House Armed Services Committee, Representative Mac Thornberry (R-TX), and its ranking member Representative Adam Smith, (D-WA) have called for a relentless probe into the case, with the latter calling the case “degrading, dangerous and completely unacceptable.”

“The military men and women who proudly volunteer to serve their country should not have to deal with this kind of reprehensible conduct,” he added.

The social media pages have since been shut down. Meanwhile, Brennan has been facing threats and abuse for uncovering the photo swapping, saying a bounty has been put out on pictures of his daughter.

“It has been suggested that my wife should be raped as a result of this, and people are openly suggesting I should be killed … Can you imagine being one of the victims?” he told The Marine Corps Times.

“As a Marine veteran I stand by the code: honor, courage and commitment. This story was published with the intention of standing up for what is right and staying true to the leadership principle of looking out for Marines and their families.” ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/03/06/us_marines_photos_women/

US Lawmakers Seek Grant For State, Local Cybersecurity

State Cyber Resiliency Act aims to increase resources for governments so they can fight cyber threats.

US lawmakers from both parties and houses of Congress have introduced a bill called the State Cyber Resiliency Act to increase resources to states and local governments for ensuring cybersecurity, reports GCN. The bill was introduced by Representatives Derek Kilmer and Barbara Comstock and Senators Mark Warner and Cory Gardner.

The grant program, say the bill’s sponsors, will increase resources to state and local government bodies so they can strengthen their cyber plans, develop a stronger cybersecurity workforce and fight threats. Currently less than 2% of IT budgets are dedicated to cybersecurity, they claim.

The sponsors backed their bill by citing a 2015 study that reported 50 percent of state and local government had experienced over six breaches the previous two years and added that 2016 had witnessed 200,000 personal voter records being compromised in Arizona and Illinois. This prompted the Department of Homeland Security to label the state voting infrastructure “critical infrastructure.”

Click here for more.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: http://www.darkreading.com/operations/us-lawmakers-seek-grant-for-state-local-cybersecurity/d/d-id/1328322?_mc=RSS_DR_EDT

7 Hot Security Terms (and Buzzwords) to Know

How the security industry has a conversation with itself is constantly changing and the latest terms as well as buzzwords point us to where the technology is heading.PreviousNext

Image Source: Flickr, courtesy of Gavin Llewellyn

It’s tempting to dismiss buzzwords as slang-y, cliché, and overused (and they are … literally). But in the security industry, both buzzwords and the latest terms the industry has coined to describe a new technology or put a new spin on an old one also provide barometer-like clues of where the industry may be heading. What it’s excited about. Or how it sorts the jaded veterans from the newbies. 

There were plenty of examples of the latest terms and buzzwords in full view at the RSA Conference in San Francisco last month. Here’s a look at some of the more prolific ones seen and heard there; it’s not an exhaustive list, so we’re counting on you to help us embellish it. What did we forget? Please let us know in the Comments section.

 

Terry Sweeney is a Los Angeles-based writer and editor who has covered technology, networking, and security for more than 20 years. He was part of the team that started Dark Reading and has been a contributor to The Washington Post, Crain’s New York Business, Red Herring, … View Full BioPreviousNext

Article source: http://www.darkreading.com/perimeter/7-hot-security-terms-(and-buzzwords)-to-know/d/d-id/1328311?_mc=RSS_DR_EDT

Adware vs. Ad Fraud: Viva la Difference!

What’s This?

Both earn their money in the advertising trade but they each have very different means of operation and targets.

Adware and ad fraud are in basically the same business, and neither care very much how they make money as long as it keeps pouring in. But there are some major differences. To understand these differences let’s take a look at the separate entities.

Adware
Adware is any software application that shows advertisements while one of the components of the adware is running. The word is a contraction of advertising and software, and often just regarded as “advertising-supported freeware.”

With adware, consumers accept the well-known trade off of not having to pay for software in exchange for having to look at some advertisements in return. While this simple business model may appeal to many of us, there are definitely boundaries. We draw lines at the amount of advertisements, the moment and the way they are presented to us (consider for example,  in-game advertising), and the kind of advertisements. Pop-ups of an adult nature, for one,  may give those looking over your shoulder the wrong idea.

There are also some criteria that security vendors take into consideration when classifying adware:

  • Do the advertisements disappear when you uninstall the software they came with?
  • Was the user given a warning and a chance to opt out during install?
  • What is the nature of the changes the adware makes on the affected system?
  • How easy is it to remove under normal circumstances?
  • What is the impact on users privacy?
  • Does the adware grab permissions to update itself or install other similar programs?

This is why you will see (most) adware classified as potentially unwanted programs (PUPs), some as spyware, and others could even be classified as Trojans.

Ad fraud
Ad fraud is a type of fraud that lets advertisers pay for advertisements even though the number of impressions (the times that the advertisement has been seen) is enormously exaggerated. There are many different methods to achieve this:

  • SEO fraud, where sites are artificially made to appear very popular so advertisers will pay high prices for advertisements nobody may ever see.
  • Stacking or stuffing sites are filled with lots of advertisements. Sometimes they are on top of each other, or sometimes only one pixel big. When someone visits the site, all the advertisements register one impression.
  • Domain spoofing is when the site where the advertisement is placed is different than the one the advertiser expected. He pays a high price for a site with low or no traffic.
  • Click-fraud involves systems that are part of a botnet or have some other Trojan infection. Visitors are sent to a site or click on a URL. But despite the amount of impressions, the return value of the click is very low. The chance that the potential customer is mad at you, is bigger than the chance he’ll buy something.

The malware involved in this type of fraud is usually classified as a Trojan as the systems are remotely controlled and told to visit a site (to heighten the popularity) or click a URL (to register an impression). As you can imagine, hiring a botnet to do these tasks for you is a lot cheaper than owning and running large server-farms, although this happens as well. Ad fraudsters also sometimes pay people in low-income countries to do micro tasks for micro payment.

Both adware and ad fraud earn their money in the advertising business. But the means are different. While the main victims of adware are the users who may have knowingly installed advertising supported software, in the case of ad fraud the main victims are the advertisers,  even though unsuspecting users may be running click-bots or multi-purpose bots.

Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books. View Full Bio

Article source: http://www.darkreading.com/partner-perspectives/malwarebytes/adware-vs-ad-fraud-viva-la-difference!/a/d-id/1328317?_mc=RSS_DR_EDT

New York’s Cyber Regulations: How to Take Action & Who’s Next

Even if your company isn’t directly subject to these new rules, you can assume that the approach will be adopted by regulatory agencies at home and abroad eventually.

In September, New York Governor Andrew Cuomo released the nation’s first state-mandated cybersecurity regulations for banks and other financial institutions that reside in the state of New York. Fast forward to today, and financial firms are about to embark on a series of regulations put in place March 1 by the state Department of Financial Services, the National Association of Insurance Commissioners (NAIC), and the SEC, all aimed at protecting clients, consumers, and financial entities from the “ever-growing threat of cyber attacks.”

In the face of these new regulations, banks, hedge funds, insurers, and financial institutions must ensure client information, PII, investment strategy and all non-public information is safe and protected. The revised NY DFS proposal includes a few significant provisions that are very relevant to the office of the CISO and the CIO;, the most relevant are new requirements for access controls, encryption, and data loss prevention, and how security teams react and prepare.

What’s new? A focus on protecting data directly
Although the NY DFS cyber regulations build on earlier work by the SEC and the NAIC, there are four new and notable provisions that apply to protecting financial information. The new regs:

  • Enforce the broad implementation of encryption
  • Restrict access privileges to both systems and data
  • Provide for the retention and “timely destruction” of non-public information
  • Designate a qualified chief information security officer to oversee the implementation of these programs

These new regulations are notable because they dramatically expand the categories of data to be encrypted (the current draft calls for the “encryption of all nonpublic information held or transmitted”), and also tie them tightly to access control, acceptable usage policy, and data retention.

Here are four best practices security teams can begin on these requirements today.

1. Simple disk encryption isn’t enough
A driving force for the NY DFS is how often client information is shared “everywhere,” and how little control financial firms have over their data once it’s shared with third-party vendors. I’ve seen it first-hand. A leading New York hedge fund with over $20 billion in assets under management is constantly exchanging sensitive information with vendors that work outside financial firms. Lawyers, auditors, contractors, you name it. In my experience, it’s astonishing to see how very lax their procedures are for information that leaves the organization.

To comply, firms will need to implement protections beyond basic encryption at rest and in transit. They’ll need to find ways to enforce granular limitations on access privileges, implement new audit systems to document data governance inside and outside the firewall, and be able to remotely apply data disposition and destruction rules. It’s clear that firms will need to deploy more dynamic forms of data protection that extend beyond their current systems.

2. Access controls at the data-level
Ultimately, encryption, access controls, and data-in-use protections must persist with your information, independent of the type of data protected, where it’s stored, or how it’s shared. It’s no longer feasible to define access at the system, device, or perimeter. Identity is the one attribute that crosses on-premises, cloud, and unmanaged services, and provides a consistent way to set, audit, and control access to confidential information.

Take for example, an influential asset manager in Manhattan. That manager must now secure all legal, HR, and financial data stored in its local file shares. In order to maintain strict data governance requirements, IT and security teams must ensure their security tools integrate with the fund’s Active Directory to assign rights and permissions to highly sensitive data, anywhere files travel.

3. Automate audit trails
In the past, the requirement for an audit trail on data access was seen as an add-on or an after-thought. The NY DFS requirements call for improved visibility into data use, and a way to track and log assess privileges and reconstruct transactions.

Consider a private equity shop in New York that now must track quarterly letters sent to its limited partners. This will entail  logging all authorized and unauthorized access attempts to the data, including details such as  how, when and whether their licensed partners opened their investor communications, or whether competitors or nonaccredited investors attempted to access its nonpublic information.

4. Retention and ‘timely destruction” of data
This is not just for data that’s located internally, but anywhere that data travels, which is critical for financial institutions that work with hundreds of third-party vendors. How many times have you heard of someone sending the wrong file to the wrong person? Or the MA deal with company financials shared, downloaded and kept once the deal ends? Ultimately, giving owners of the data the ability to call back that data or kill access is paramount.

Exactly how does this apply in the real world? The mergers and acquisitions arm of a public banking entity must destroy its nonpublic information after the bank’s retention period expires. Access to all copies of the diligence materials, investor decks, financial models, accounting profiles, and audits are automatically destroyed, even if they’ve been moved to personal devices 

Coming to a regulatory body near you
Even if your firm isn’t directly subject to these new regulations, it’s safe to assume that this approach will be rapidly adopted by similar regulatory bodies domestically and around the world. We’re already seeing international bodies like the EU Parliament seek to expand regulation and expectations for cybersecurity outward from financial services. And as we’ve observed time and time again domestically, the best practices and approaches adopted in the financial system quickly make their way out into less-regulated industries.

Related content: 

Prakash is the chief technology product officer and co-founder of Vera. In this role, he oversees all products and technology, and is responsible for developing the overall product strategy and technical vision of the company.
Prakash is an entrepreneur who is passionate … View Full Bio

Article source: http://www.darkreading.com/attacks-breaches/new-yorks-cyber-regulations-how-to-take-action-and-whos-next/a/d-id/1328318?_mc=RSS_DR_EDT

FTC Report Highlights Low DMARC Adoption

New Federal Trade Commission research discovers most online businesses employ email authentication, but few use DMARC to combat phishing.

A new Federal Trade Commission Office of Technology Research and Investigation (OTech) report shows most organizations aren’t fully utilizing the latest technology available to combat phishing, which is contributing to a growing distrust in email.

Email is a top attack vector for cybercriminals targeting the enterprise. Most major online businesses use email authentication to fight threats, but they could do more, experts say, by automatically telling servers to reject unauthenticated emails.

“One of the main concerns around email is it’s very effective — if it’s trusted,” says Alexander García-Tobar, CEO at ValiMail. “Trust has become a very large issue recently,” amid the increase in impersonation attacks.

OTech evaluated more than 500 businesses with “a significant online presence” and discovered most (86%) employ Sender Policy Framework (SPF), a domain-level authentication they can use to determine an IP address to send email, and DomainKeys Identified Mail (DKIM), which lets them use digital signatures to verify message authenticity.

Only one-third employ Domain Message Authentication Reporting Conformance (DMARC), a standard technology that verifies whether an email is truly from the domain it claims to be from. It instructs receiving servers to delete fraudulent messages upon arrival so users don’t see them, and only lets in authenticated emails. Part of the benefit is creating a whitelist of verified senders.

Organizations can also use DMARC to gather feedback on how scammers are misusing their information in phishing attacks. “The owner of a domain will be able to say, ‘these are all the people, all the servers across the world who try to send something as me,'” explains García-Tobar.

Of the businesses that have implemented DMARC, OTech discovered less than 10% are using the strongest available setting, which tells recipients to reject unauthenticated messages.

There are several reasons why adoption is lagging, García-Tobar says. First off, DMARC is not broadly known.

“There’s very low awareness of the DMARC standard,” which was compiled by technical committees and hasn’t had a strong marketing drive behind it. Awareness is on the uptick, however, thanks to adoption by tech giants like Google and Microsoft. The FTC recognizing DMARC’s importance is another sign awareness is starting to spread, he continues.

Companies aware of DMARC often struggle to propery deploy it. Yes, there are technical difficulties, but many problems stem from disagreement over what the corporate whitelist should include.

“It sounds easy to say, ‘I’m going to declare which servers are allowed to send [emails] as me, but it’s not actually that easy,” García-Tobar says. “This requires internal investigations and discussions about who is allowed to send as you.”

Because of this, it’s often difficult for large global organizations to define the whitelist. Until they have their technical details in place, many businesses end up with a DMARC record but no enforcement.

García-Tobar expects DMARC adoption to grow at a faster clip this year. As more businesses begin to use it, awareness will continue to spread, as will the desire to correctly implement the standard and use it well.

“People are starting to acknowledge that the way email is functioning today cannot continue if email is going to be an effective communication platform,” he explains. “The fact that we have a federal agency supporting DMARC is very encouraging.”

Related Content:

Kelly is an associate editor for InformationWeek. She most recently reported on financial tech for Insurance Technology, before which she was a staff writer for InformationWeek and InformationWeek Education. When she’s not catching up on the latest in tech, Kelly enjoys … View Full Bio

Article source: http://www.darkreading.com/attacks-breaches/ftc-report-highlights-low-dmarc-adoption/d/d-id/1328325?_mc=RSS_DR_EDT

Veracode Snapped Up by CA Technologies in $614 Million Deal

CA acquisition of app security firm to close in the first quarter of fiscal year 2018.

CA Technologies today said it will acquire application security service firm Veracode for $614 million. 

Veracode, which celebrates its tenth anniversary this year, launched in 2007 with $19.5 million in venture capital funding and offering the industry’s first automated, on-demand security analysis services via a software-as-a-service (SaaS) platform.

The acquisition by CA is scheduled to close in the first quarter of fiscal year 2018, and is subject to regulatory approval. CA said Veracode will boost its position in the Secure DevOps market.

“Software is at the heart of every company’s digital transformation. Therefore, it’s increasingly important for them to integrate security at the start of their development processes, so they can respond to market opportunities in a secure manner,” said Ayman Sayed, CA Technologies president and chief product officer. “This acquisition will unify CA’s Security and DevOps portfolios with a SaaS-based platform that seamlessly integrates security into the software development process. Looking holistically at our portfolio, now with Veracode and Automic, we have accelerated the growth profile of our broad set of solutions. We now expect that the size of our growing solutions within our Enterprise Solutions portfolio will eclipse the more mature part of the Enterprise Solutions portfolio in FY19.”

Veracode was founded by famed security expert Chris Wysopal, and fellow former @stake executives Christien Rioux and Mike Pittenger. 

For more information on the acquisition, see CA’s blog.

 

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: http://www.darkreading.com/application-security/veracode-snapped-up-by-ca-technologies-in-$614-million-deal/d/d-id/1328328?_mc=RSS_DR_EDT

Ex penetrated us almost 700 times through secret backdoor, biz alleges

A sportswear company in Oregon has alleged that a senior IT manager left a backdoor in its systems before departing to a business partner and illegally used that access almost 700 times for his new employer’s benefit.

In its complaint to a federal court in Oregon [PDF], Columbia Sportswear demanded a jury trial for Michael Leeper, who it alleged had illegally accessed highly confidential information to the benefit of a business parter, tech consulting firm Denali Advanced Integration, which Leeper had left to work for.

The accusation of betrayal notes that Leeper had been an employee at Columbia since May 2000, when he joined as manager of its desktop services team. He was subsequently promoted to senior director of technology infrastructure, from which he was responsible for maintaining Columbia’s global IT systems and dealing with technology vendors including Denali, for which he departed the sportswear business in 2014.

Just a day before leaving, however, Leeper allegedly created a network account under the name “Jeff Manning”, called “jmanning”, which provided him with remote access to Columbia’s network, including its VPN. Using this account, Leeper plundered Columbia nearly 700 times over the next two years, stealing corporate plans as well as information on its technology budget, all for the benefit of Denali as it competed for his former employer’s cash.

Columbia complained that Leeper and Denali had accessed information including emails concerning business transactions in which it had financial interests, stating: “Leeper illegally accessed that information in furtherance of Denali’s desire to profit from its business relationship with Columbia, and in his capacity as Denali’s CTO.”

Denali did not immediately respond to The Register’s requests for comment. The case is ongoing. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/03/06/columbia_sportswear_versus_denali/

Threats Converge: IoT Meets Ransomware

Ransomware is already a problem. The Internet of Things has had a number of security issues. What happens when the two combine?

Ransomware had a breakout year in 2016, making headlines as it affected everything from hospitals to police stations. At the same time, attacks against Internet of things (IoT) devices — home appliances, toys, cars, and more, all brimming with newly exploitable connectivity — have continued to proliferate.

Most information security professionals agree that ransomware and IoT hacks will continue to increase in frequency, but one less obvious development that could be on the horizon is a convergence of both of these attack methods. So, what could the implications of an IoT ransomware attack be?

To answer this question, we first need to consider the potential target of an IoT ransomware attack. Ransomware usually goes after computers and networks that house the mission-critical data necessary to maintain the day-to-day operations of a business. Such targeting ensures that once this data has been encrypted and rendered useless, the organization has adequate incentive to purchase the cryptocurrency (typically Bitcoin) being demanded by the hacker to release its data.

 More on Security Live at Interop ITX

Luckily for us, many IoT devices don’t qualify as mission critical, as I doubt any parent is going to fork over a ransom to unlock their child’s Hello Barbie. But there are certain devices that perform critical functions and therefore could meet this criterion. As IoT becomes more widespread and increases in sophistication, the number of potentially lucrative targets will only increase. Unlike with traditional ransomware, attackers that hijack IoT devices can not only compromise the data collected through a device’s sensors, but could also render a critical device’s physical functions inaccessible — greatly increasing the chances that a victim will pay up.

One device that is currently ripe for exploitation is the connected thermostat. Products like Nest and Ecobee remotely monitor and regulate the temperatures of homes. If compromised by hackers, they could be used to blast the air conditioning during a blizzard or crank up the heat in the middle of a July heatwave. Although this may seem like an inconvenience rather than a catastrophe for a typical homeowner, when applied to business environments, the stakes are raised. For example, an attacker who gains control of the HVAC systems of a large building could theoretically increase an organization’s electricity bill to the point where paying a ransom becomes a practical and cost-effective alternative.  

The same reasoning behind the thermostat example can be applied to a wide range of other IoT devices. It wouldn’t be difficult to imagine a hijacked smart lock taking on a mind of its own or a connected lightbulb refusing to illuminate. However, one can also imagine more disturbing scenarios arising from advanced IoT use cases, such as connected cars and smart cities. In such cases, a successful ransomware attack could extend well beyond a minor inconvenience, exposing affected victims to potentially dangerous or even life-threatening consequences.

However, IoT isn’t a lost cause altogether. As with any emerging technology, IoT device vendors need to work out the security bugs in their products, and they’re already beginning to do so. For every snooping Barbie discovered and connected car hacked, the industry moves one step closer to achieving the level of security that enterprise customers need. Similar to how the Target breach was a wake-up call for retailers, the IoT industry will inevitably be hit with an attack of a similar scope, whose repercussions will in turn serve as a major catalyst for industry-wide change.

Until we see this change, though, IT teams tasked with deploying connected devices must become more aware of the issues around IoT security and keep these in mind when deciding which devices to buy and deploy in their organizations. If your business can survive the next couple of years without going all in on IoT, it might be worth postponing purchases until the technology, especially the security, of these devices has evolved.

But if you absolutely can’t wait, there are several considerations that are critical when purchasing a new device. These include:

  • Assess how easy it is to change default credentials. Many IoT-enabled devices, such as the Internet-enabled cameras that made up the Mirai botnet, are insecure because their owners never think to change the password. You wouldn’t do that with your new laptop, would you?
  • Disable any insecure protocols. Not all devices are created equally, and device makers that fail to invest in secure protocols must be avoided. Right now, there is a lack of standards for what makes an IoT device secure, so it’s up to buyers to assess what makes the device tick. For example, many vulnerable webcams were reported in 2016, due to a Real Time Streaming Protocol that enabled video sharing but didn’t require a password for authentication.
  • Evaluate the recovery process. Many devices can have factory settings reset with one click, while others may require manufacturer involvement. Worse yet, in some cases, recovery may be impossible, forcing users to pay the ransom as a last resort. It’s up to buyers to understand the recovery process for the devices they own, and to create a contingency plan should one of them be compromised. 

Whether you end up making the plunge into IoT or waiting until the kinks are worked out, the threats posed by Internet-connected devices are real. That being said, IoT is here to stay, so it’s up to us to ensure it isn’t allowed to compromise the security of our future. 

Related Content:

Javvad Malik is a London-based IT Security professional. Better known as an active blogger, event speaker and industry commentator who is possibly best known as one of the industry’s most prolific video bloggers with his signature fresh and light-hearted perspective on … View Full Bio

Article source: http://www.darkreading.com/vulnerabilities---threats/threats-converge-iot-meets-ransomware/a/d-id/1328304?_mc=RSS_DR_EDT

Users Can Now Time Their Windows 10 Updates

Microsoft gives option to users to fix security update schedule within three days of notification.

Users of Windows 10 have been given the option to schedule their security updates as per their convenience rather than immediately, BBC News reports. Update timing has to be fixed once notifications are received but it must be installed within three days and can also be rescheduled during the waiting period.

This decision is a part of Microsoft project Creators Update, which is also looking into changing privacy settings, and was taken to ease user impatience because updates require rebooting which can happen at the wrong time and be disruptive.

However, cybersecurity experts fear this flexibility can give hackers the upper hand.

“I’m not 100% sold on the idea precisely because quite often these updates have critical security fixes in them, and you really want them on people’s machines as quickly as possible,” says Professor Alan Woodward of Surrey University, adding, “Once a critical flaw gets understood by hackers they will be out there trying to exploit it.”

Read more on BBC News.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: http://www.darkreading.com/application-security/users-can-now-time-their-windows-10-updates/d/d-id/1328323?_mc=RSS_DR_EDT