| | | INSIDER Alert | | Your guide to the top content posted this week for Insider members | | | | Computerworld Martyn Williams/IDG News Service An iPhone 6 being used to make an NFC payment via Apple Pay Apple Pay is up and running. I’m excited about that as a consumer but, naturally, wary about it as someone who works in the security field. So let’s consider Apple Pay from both perspectives — the consumer’s, and the security professional’s.When I was deciding whether to get an iPhone 6, Apple Pay was the most persuasive feature. Apple Pay works (remarkably seamlessly) on the iPhone 6 and 6 Plus. It’s available to the iPhone 5 range of devices, but only in conjunction with the upcoming Apple Watch. And it can be used for in-app purchases on some iPads. But right now, the only way to get the full experience of Apple Pay in stores is with one of the newest generation of iPhones. Here’s how it works. You register your supported credit cards in the device’s Passbook app. When you want to buy something from a retailer that supports Apple Pay, you just point your device at the near field communication (NFC) payment terminal, and your payment information is delivered from your iPhone to the payment terminal over a radio frequency connection. Then you just do a fingerprint scan on your phone’s TouchID sensor to verify your identity. If all is OK, your phone vibrates and tells you the transaction was approved. It all can be done in a single motion. Note that you may still need to sign a receipt as well, depending on the merchant and the amount of the purchase.To read this article in full or to leave a comment, please click here(Insider Story) | | CSO On Nov. 1 of next year, merchants that aren't ready to accept chip-based cards instead of the current magnetic-stripe cards will become liable for fraudulent transactions that today are covered by the credit card companies.That means that a lot of retailers will be switching to new, EMV-compliant point-of-sale terminals -- and, while they're upgrading, many will also roll out tokenization and end-to-end encryption as part of the package.[ Chip and PIN: No panacea, but worth the effort – and the cost ]To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | | Computerworld Buzzwords are a fact of life in the technology profession. Whether you’ve been in the industry for 30 years (remember WYSIWYG?) or for five (netiquette, anyone?), it’s a good bet you’ve incorporated tech-speak into your everyday conversation, maybe without even knowing it. As the global data tsunami continues to build, and a new wave of technologies from the consumer world hits IT, it’s not surprising that the buzzword count has surged. Here’s a look at eight of the hottest buzzwords being used today. To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | | Computerworld When it comes to mobile device security, we are our own worst enemies. Despite the fact that many people have come to rely on their mobile devices 24/7, most users don’t appear to be getting any smarter about security, researchers say. In 2012, 44% of adults were unaware that security solutions existed for mobile devices, according to Symantec’s Threat Report. That figure rose to 57% in the security vendor’s 2013 report, which was released in April 2014. Researchers say a lack of education among users is partly to blame. For example, people who move to smartphones after years of using feature phones with limited security requirements often aren’t aware of the need to install security apps.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | | Network World Understanding all the 802.1X client settings in Windows can certainly help during deployment and support of an 802.1X network. This is especially true when manual configuration of the settings is required, such as in a domain environment or when fine-tuning wireless roaming for latency-sensitive clients and applications, like VoIP and video. An understanding of the client settings can certainly be beneficial for simple environments as well, where no manual configuration is required before users can login. You still may want to enable additive security measures and fine-tune other settings. Though the exact network and 802.1X settings and interfaces vary across the different versions of Windows, most are quite similar between Windows Vista and Windows 8.1. In this article, we show and discuss those in Windows 7.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | | Network World The stage is set for SDN (software-defined networking) to change the way we push data through our infrastructures, with the promises of more agile network provisioning and management, as well as more affordable network hardware. But for many, the SDN concept is still amorphous. What does SDN look like in practice? To shed light on this question, I sat down with a few Dell Networking S6000 switches running Cumulus Linux 2.3. There are many approaches to an SDN solution, but one of the most significant is the advent of white-box switches and à la carte switch firmware. This is the essence of the solution offered by Cumulus Networks.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | | | |
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.