Search Results

Results 1-20 of 53 for Michael Sutton

The Convoluted Trail Linking North Korea to Sony

"I know a number of people who are concerned that we don't have definitive proof to give proper attribution to the attack, but in cases like this we rarely have all the evidence we need to provide attribution," noted Michael Sutton, vice president of security search for Zscaler.

Apple Fills iOS 8 Security Basket to Brim

"Apple has a tendency to perform bulk security patching with OS upgrades, and iOS 8 didn't disappoint," said Michael Sutton, vice president of security research at Zscaler One of the more interesting patches in the batch modified "diagnostic capabilities" in iOS 8.

Yahoo, Google Team Up to Fight Email Snoops

"For what Yahoo and Google are proposing, they almost have to do it that way," said Michael Sutton, vice president of security research at Zscaler "For things like encrypting everything in SSL, you don't need implicit buy-in from the users because it's very transparent. PGP is...

Google Aims to Defrag Android Universe

"When a vulnerability is discovered, the ability to get a patch or move to the latest upgrade isn't in the hands of Google; it's in the hands of the hardware vendor," noted Michael Sutton, vice president of security research at Zscaler. "We've seen many situations over time w...

Con Artist Harasses Aussie Apple Customers in Ransomware Attempt

That should raise awareness among consumers about how to use a kill switch, said Michael Sutton, vice president of security research at Zscaler "It'll draw attention to the importance of having a device properly locked down," he told TechNewsWorld. "Here's a situation where if...

SPOTLIGHT ON SECURITY

Twitter Bags Encryption Program

Suspension of the direct messaging encryption program may disappoint some users, but it doesn't mean Twitter's commitment to privacy and security is diminishing, maintained Michael Sutton, vice president of security research at Zscaler "While adding direct message encryption w...

SPOTLIGHT ON SECURITY

Poor Patch Management Makes CMSes Low-Hanging Fruit for Hackers

"For the most part, hackers are not compromising WordPress websites simply to deface them, but rather as the first step of a larger attack," Michael Sutton, vice president of security research at Zscaler, told TechnewsWorld "Compromised WordPress sites can serve as watering ho...

Google Tries On IaaS for Size

"It's not surprising to see Google dipping its toe in the water," said Michael Sutton, VP of security research with Zscaler. "This has been expected for a while that it would compete with the likes of AWS and Rackspace." Google's sheer immensity, however, just about ensures ...

Loophole Could Give Android Devs a Private Picture Show

"Loose restrictions in the Android SDK (software development kit) due to legacy issues let the app created by Gootee snoop on the smartphone's photo library," said Michael Sutton, vice president of security research at Zscaler ThreatLabZ How the Rogue App Worked...

Google Hires Bouncer to Give Android Malware the Heave-Ho

"Google's introduction of the Bouncer service is an encouraging step forward for mobile security. Many mistakenly assume that the app store gatekeepers are protecting them from malicious content, but history suggests that detailed security reviews of apps have been lacking prior to their inclusion in the app stores," Michael Sutton, vice president of security research at Zscaler ThreatLabZ, told TechNewsWorld...

Can Amazon Save Android From Malware Hell?

Google "takes a much more open approach [than Apple] when permitting content into their marketplace, relying on crowdsourcing -- the belief that any unsavory app will quickly be called out by the millions of Android users and can then quickly be revoked," Michael Sutton, vice president of security research at Zscaler ThreatLabZ, told TechNewsWorld...

Can HP Printers Be Remote-Detonated?

"Devices commonly come with embedded Web server functionality fully enabled, and yet they either have no password, or simply use a default password across all devices," Michael Sutton, vice president of security research at Zscaler ThreatLabZ, told TechNewsWorld in a previous interview...

Smart Devices, Dumb Security?

"When it comes to usability versus security, usability tends to win out, and vendors enable functionality by default to ensure that you're aware of it," Michael Sutton, vice president of security research at Zscaler ThreatLabZ, told TechNewsWorld That's because device manufact...

Why Do Email Links Feel So Right When They Do Such Wrong?

"Links in email can never be fully trusted," Michael Sutton, vice president of security research at Zscaler Labs, pointed out This is compounded with HTML-formatted messages, which can "easily obfuscate" the true destination of a link, Sutton told TechNewsWorld....

LulzSec’s Latest Lark Targets Ariz. Cops

"Arrests will be made, LulzSec will adapt and likely evolve into a completely different entity over time," Michael Sutton, vice president of security research at Zscaler, told TechNewsWorld Exposing sensitive documents to the public may appear similar to the activities of site...

Can Lulz Be Lassoed?

"The attacks have succeeded not because they exploited zero-day vulnerabilities, but because competent and determined individuals scoured chosen networks looking for a weak link in the security chain. Time and time again, they found it. We clearly have a long way to go as an industry before we have set the bar high enough to deter such an adversary," Michael Sutton, vice president of security research at Zscaler Labs, told TechNewsWorld...

Seeking Clarity in the Cloud’s Security Haze

Ultimately, it is up to cloud customers to know about cloud security. But that is a costly research task that cloud vendors are better able to handle, suggested Michael Sutton, vice president of security research for Zscaler "There is no straight answer to the cloud security q...

Judge Imposes Stiff Sentence on Heartland Hacker

Sentences for similar crimes and ID theft are too lenient, with some perpetrators getting out of jail within months or a few years, said Michael Sutton, VP of security research at Zscaler. Then there is this to consider: "As an attacker the odds are in your favor," Sutton tol...

Google Buzz Gives Spammers a New Sweet Spot

The default setting automatically provides a list of followers comprised of those you chat or email with, Michael Sutton, VP of security research at Zscaler, told the E-Commerce Times. Cranky Spouses ...

The Friction in the Federal Cloud

Once that is done, the government needs to ensure that cloud service vendors are adequately focused on security before and after the contracts are signed. "Security doesn't end once the services are procured," Michael Sutton, vice president of security research at ZScaler, pointed out. Like any other buyer, the federal government can include right-to-audit clauses in contracts and insist on seeing the results of regular third-party audits and assessments, he told the E-Commerce Times...

LinuxInsider Channels