Attention Marketers: Access 30 Million IT Decision Makers with ECT News Network's INSTA-LEADS Click to Learn More!
Welcome Guest | Sign In
TechNewsWorld.com
Google Gives WebView the Cold Shoulder
January 30, 2015
Google has decided not to fix vulnerabilities in WebView for Android 4.3 and older, sparking heated discussions among developers. Those versions of WebView run on the WebKit browser. Fixing them "required changes to significant portions of the code and was no longer practical to do so safely," explained Adrian Ludwig, lead engineer for Android security.
There's a GHOST in Linux's Library
January 28, 2015
Patches for GHOST, a critical vulnerability in glibc, the Linux GNU C Library, now are available through vendor communities for a variety of Linux server and desktop distributions. Qualys earlier this week reported its discovery of GHOST, a vulnerability that allows attackers to remotely take control of an entire system without having any prior knowledge of system credentials.
POS Terminals Rich Vein for Gold-Digging Hackers
January 28, 2015
Hackers are like gold miners. Once they find a rich vein for their malware, they mine it until it's dry. Point-of-sale terminals are such a vein, and it doesn't appear that it's one that's about to run dry any time soon. Following the success of the Target breach in 2013, the hacker underground was quick to rush more POS malware to market.
Businesses Seek Liability Protection for Cybersecurity Disclosures
January 28, 2015
"No foreign nation, no hacker, should be able to shut down our networks, steal our trade secrets, or invade the privacy of American families," President Barack Obama told the U.S. Congress during the State of the Union Address last week. However, hunting down the perpetrators of cyberattacks that compromise national security or disrupt commerce is only going to get more difficult in the future.
Wikileaks Steamed Over Google's Lengthy Silence on FBI Snooping
January 27, 2015
Google may have contributed to violating the First Amendment rights of three journalists working for WikiLeaks two and a half years ago, when it turned over to the FBI all their email, subscriber information and metadata. Google informed the journalists about its actions last month, saying that it had been unable to do so earlier due to a gag order.
White House Jump-Starts Cybersecurity Protection Programs
January 23, 2015
As members of the U.S. Congress started to prepare for the upcoming legislative session, President Obama lost little time in putting cybersecurity near the top of a to-do list for lawmakers. During a visit to the federal National Cybersecurity Communications Integration Center, Obama called for additional legislation to improve information technology protection.
Report: Dumb Password Use on the Decline
January 21, 2015
Millions of Net surfers use obvious passwords to log on to websites, but their numbers appear to be declining. SplashData on Tuesday published its annual list of the top 25 most common -- thus worst -- passwords leaked online. In the top spot was "123456," followed by "password" and "12345." Both "123456" and "password" claimed the top spots in 2013, too.
Businesses Waste Big Bucks Fighting Phantom Cyberattacks
January 21, 2015
Businesses spend an average of $1.27 million a year chasing cyberthreats that turn out to be dead ends. That is one of the findings in a report released last week on the cost of containing malware. In a typical week, an organization can receive nearly 17,000 malware alerts, although only 19 percent of them are considered reliable, the researchers found.
Keeping Score in the Google vs. Microsoft Zero-Day Games
January 20, 2015
Google's recent publication of Windows' vulnerabilities -- two within a week -- predictably raised Microsoft's ire. "Risk is significantly increased by publically announcing information that a cybercriminal could use to orchestrate an attack and assumes those that would take action are made aware of the issue," wrote Chris Betz, Microsoft's senior director of trustworthy computing.
Cameron Takes Hard Line on Encrypted Communications
January 15, 2015
UK Prime Minister David Cameron, who is standing for re-election, has vowed to ban personal encrypted communications apps such as Snapchat and WhatsApp if he is voted in. He also will allow UK government security agencies to monitor communications, with warrants signed by the Home Secretary. "The first duty of any government is to keep our country and our people safe," Cameron declared.
Data Breach Law Tops Obama Privacy Initiatives
January 12, 2015
A proposed national data breach reporting law, aimed primarily at protecting consumer privacy, headlined several initiatives the Obama administration announced Monday. The Personal Data Notification & Protection Act clarifies the obligations of companies when there's been a data breach. It includes a requirement to notify customers within 30 days of the discovery of a breach.
BlackBerry Jingles Its Keys to Recovery
January 08, 2015
BlackBerry has been hurting over the last several years, but recently it's starting to look like the stars may be lining up for recovery. If BlackBerry does make a comeback, it will be a very different company. This time, the focus will be on security -- plus one more important factor. BlackBerry succeeded years ago. It was the first successful smartphone maker.
Thieves Take $5M Bite Out of Bitcoin Exchange
January 07, 2015
An estimated $5.2 million was stolen over the weekend from Bitstamp, a digital currency exchange. It has suspended services pending an investigation. The company assured its customers that bitcoins held with Bitstamp prior to suspension of services were completely safe and would be honored in full. Bitstamp on Sunday discovered that some of its operational wallets had been compromised.
Fingerprint Theft Just a Shutter Click Away
January 07, 2015
Ever since smartphone makers started incorporating fingerprint scanners as a means of unlocking mobile phones, the Chaos Computer Club has attacked the technology with vigor. Not long after Apple added Touch ID to its iPhones, the German hackers demonstrated how to lift prints from a surface and create a flexible pad containing the print that could be used to break into a phone.
Yikes! Ransomware Could Take Over Your Hard Drive
January 05, 2015
Malware is running rampant on the Internet, affecting smartphones, tablets and PCs. Relatively new malware allows bad guys to encrypt devices until a ransom is paid. Usually the ransom is required in bitcoin, rather than U.S. currency, as it cannot be traced. What are the legal and other risks associated with ransomware? Ransomware is largely directed at personal devices and small businesses.
Hackers Give Touch ID the Finger
December 29, 2014
Hacker Jan Krissler, aka "Starbug," this weekend told attendees at the 31st Chaos Computer Club convention that he had replicated the fingerprints of German Defense Minister Ursula von der Leven using a standard photo camera and commercially available software. Krissler used a close-up of a photo of the minister's thumb and other pictures taken at different angles during a press event in October.
Misfortune Cookie Crumbles Millions of Security Systems
December 29, 2014
Check Point Software Technologies recently revealed a flaw in millions of routers that allows the devices to be controlled by hackers. The company detected 12 million Internet-connected devices that have the flaw. The vulnerability, which Check Point dubbed "Misfortune Cookie," can be found in the code of a commonly used embedded Web server, RomPager from AllegroSoft.
The Big Tech Stories of 2015
December 29, 2014
Last week, we looked back at the largely untold, or under told, stories of 2014. This week, let's look ahead to some of the stories that are coming in 2015. We'll have robots, self-driving cars, armed autonomous drones, the professional proliferation of head mounted cameras, some scandals, and some interesting political implications. I'll close with my product of the year, which even surprised me.
Fraud-Proofing Credit Cards Through Quantum Physics
December 26, 2014
Researchers at the University of Twente and the Eindhoven University of Technology have come up with what they claim is an unprecedentedly secure way to authenticate credit cards, IDs, biometrics, and parties involved in quantum cryptography. The method -- quantum-secure authentication of optical keys -- basically consists of sending a beam of light at cards treated with a special paint.
Flaws in Ancient Standard Enable Wireless Eavesdropping, Spying
December 23, 2014
Vulnerabilities in Signaling System 7, telephony signaling protocols used by carriers worldwide, allow third parties to listen to people's cellphone calls and intercept text messages despite encryption, The Washington Post reported last week. German cybersecurity researchers Tobias Engel of Sternraute and Karsten Nohl of Security Research Labs separately discovered these vulnerabilities.
Tech Industry Rallies Around Microsoft in Data Privacy Battle With US
December 18, 2014
A coalition of supporting organizations filed 10 amicus briefs with the U.S. Second Circuit Court of Appeals in a case challenging a U.S. government search warrant for Microsoft customer data stored on a server based in Ireland. The coalition includes 28 technology and media companies, 35 computer scientists, and 23 trade associations and advocacy organizations.
BlackBerry Bucks Up Its Loyal Base With Classic Comeback
December 17, 2014
BlackBerry has unveiled the BlackBerry Classic, a handset with a full QWERTY physical keyboard, physical navigation keys, and a design that can be best described as "retro," in that its appearance is virtually identical to the BlackBerry Bold. The Classic, which is smaller than the company's recently launched Passport smartphone, targets users who still long for the traditional BlackBerry handset.
FIDO Pursues Vision of a Password-Free World
December 17, 2014
A group of some 150 companies last week moved closer to eliminating the bane of many an online user: the ubiquitous password. The FIDO Alliance, which counts among its members Microsoft, PayPal, Google, Bank of America, Visa and MasterCard, released version 1.0 of its open specifications for strong authentication on the Internet without the use of passwords.
Iowa to Lead Digital Driver's License Movement
December 12, 2014
Iowa plans to issue digital drivers' licenses in the form of a smartphone app by next year, Paul Trombino, director of the Iowa Department of Transportation, said earlier this week at a public state agency budget hearing. The digital license will be accepted by Iowa law enforcement officers conducting traffic stops, as well as by security officers who screen travelers at Iowa's airports.

See More Articles in Consumer Security Section >>
Facebook Twitter LinkedIn Google+ RSS