OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
TechNewsWorld.com
Godzilla Foreshadows Trouble for Internet of Things
June 16, 2014
The Internet of Things has come under attack by pranksters in recent days. The events could signal tumultuous things to come as more and more everyday objects connect to the Internet. Homeland Security has advised the customers of digital sign maker Daktronics to "take defensive measures" following a series of cyberpranks on the company's traffic signs.
Project Galileo Offers DDoS Protection for Free Expression Online
June 13, 2014
CloudFlare on Thursday announced the launch of Project Galileo, a service designed to provide enterprise-grade protection against distributed denial of service attacks free of charge to certain sites, with the goal of protecting freedom of expression on the Internet. CloudFlare is working with a number of partners to identify at-risk sites that qualify.
TrueCrypt's Mysterious Vanishing Act
June 02, 2014
Anyone would be distressed to discover the disappearance of a favorite piece of software, but when the software in question was open source and endorsed by Edward Snowden -- and when the developer's site begins offering instructions for migrating to a Microsoft product instead -- alarm bells are sure to begin ringing throughout the FOSS world. That, sure enough, is just what's been going on.
Iranians Caught Cyber Snooping on High-Value US Targets
May 29, 2014
A cyberespionage campaign with links to Iran for at least three years has been targeting U.S. military and congressional personnel, journalists and diplomats, as well as U.S. and Israeli defense contractors and members of the U.S./Israel lobby, according to a report released Thursday by iSight Partners. The spy ring used more than a dozen phony identities on online social networks.
Chinese Media: Cisco Is Playing on US Cyberspy Team
May 28, 2014
Cisco has been accused of being in bed with U.S. cyberspying efforts, according to a Chinese state media outlet. Cisco "carries on intimately" with U.S. spying apparatuses, the outlet claims, and plays "a disgraceful role" in efforts to prop up U.S. power over the Web. Cisco denied the accusations. Beijing definitely seems to have taken umbrage with last week's U.S. indictments for cyberespionage.
Sony, China Strike PlayStation Deal
May 27, 2014
Japanese electronics giant Sony has inked a deal in China to manufacture and sell PlayStation consoles in the Middle Kingdom. The partnership creates two joint ventures with Shanghai Oriental Pearl, which will enable Sony to operate out of Shanghai's free trade zone. China's early-2014 approval of videogame consoles from foreign companies reversed a years-long ban.
China's Payback for US Hacker Indictments Begins
May 27, 2014
The Department of Justice last week unsealed indictments against five members of the Chinese military who were accused of hacking into the computer systems of U.S. companies to steal everything from trade secrets to confidential corporate correspondence. China's initial response was to deny any wrongdoing and charge that the U.S. had hacked into the systems of Chinese companies.
China Calls for Increased Testing of IT Products
May 23, 2014
The ever-testy cyberstandoff between the U.S. and China got a new twist when Beijing announced that it would start "cybersecurity vetting of major IT products and services" used for national security and public interests. The vetting is designed to prevent suppliers from using their products to control, disrupt or shut down clients' systems, or from using the systems to scoop up information.
Google's EU Migraine Rears Up
May 21, 2014
Yeah, about that breakthrough between Google and European antitrust regulators... The European Union's antitrust chief might pursue a tougher stance on Google than the one outlined in a February agreement, which was believed to have end -- finally -- the legal circus between the two sides. Google had agreed to display rivals' links more prominently in its search results, a chief concern.
Hackers Paint Bull's-eyes on Cybercurrencies
May 19, 2014
Another digital currency was brought to its knees last week when the administrators of Doge Vault had to suspend operations after they discovered their online wallet service had been attacked by hackers. Following an investigation of the incident and the reconstruction of some of their damaged information from a backup, the administrators contacted users.
Russian Rocket, Satellite Don't Quite Make It
May 19, 2014
A space-bound satellite designed to provide Internet access to remote regions in Russia and neighboring states was destroyed when its ride blew apart mid-flight. The Proton-M rocket, affixed with a European-built Express AM4R satellite, seemed to be doing just fine until nine minutes into the flight, when it exploded some 93 miles above Earth. The exact cause of the crash apparently was not known.
Vendors Quibble With US Procurement Cybersecurity Plan
May 16, 2014
Protecting supply lines is essential to military success. But the U.S. government has now launched an initiative designed to protect the supply chain of both civilian and military agencies from potential cyberattacks. The effort will be especially important in the e-commerce procurement process. The initiative is being managed jointly by the GSA and the DoD.
Fallout Begins Following EU Google Decision
May 15, 2014
This week's European high court decision against Google was "astonishing," according to Wikipedia founder Jimmy Wales, who called it "one of the most wide-sweeping Internet censorship rulings I've ever seen." Wales, like anyone who read the ruling, noticed that the parameters for judging whether content be removed were exceptionally ambiguous. This puts Google in dilly of a pickle, Wales said.
No, Bot! UN Ponders Regulations for Killer Robots
May 14, 2014
In a move that could complicate the creation of any more Terminator movies, United Nations diplomats on Tuesday discussed international laws to govern, or simply ban, the use of killer robots. This was the first time that a UN meeting was devoted entirely to the topic, which makes sense given that the robots in question don't yet exist. That said, the UN wants to be proactive.
Psychologist: Search Results Could Sway Elections
May 13, 2014
Search engines could have a profound influence on voters, according to psychologist Robert Epstein, whose recent study chronicles the impact of what he dubbed the "search engine manipulation effect." Epstein has not produced any evidence that search engines intentionally manipulate elections. Even so, he claims the phenomenon is legit. This is not a new topic for Epstein.
John McAfee Makes Dubious Tech Comeback With Chadder Privacy App
May 07, 2014
Future Tense Central and Etransfr have debuted Chadder, an app that sends private encrypted messages. The app is one of a growing number of security products built around encryption technology and touted as secure that hit the market following Edward Snowden's massive data dump revealing the extent of the U.S. government's reach into consumers' digital lives.
The Tangled Web of IoT Security
May 06, 2014
The Internet of Things, or IoT, consists of "uniquely identifiable objects and their virtual representations in an Internet-like structure," according to Wikipedia. The IoT is "the network of physical objects accessed through the Internet," according to Cisco Systems. In addition to there being no clear definition of the IoT, estimates vary widely about the number of unique devices it includes.
Security Pros Struggle With Cyberthreat Angst
May 05, 2014
As the volume and sophistication of cyberattacks increase, system defenders in the trenches are losing confidence in their ability to protect their organizations' information assets, suggests a survey released last week. The survey of almost 5,000 global IT security pros found that 57 percent felt their organizations were unprotected from sophisticated cyberattacks.
Feds Weigh In on Cybersharing Antitrust Issues
May 01, 2014
The use and scope of information technology has grown dramatically since 2000 -- and along with that growth have come ever greater cybersecurity threats to businesses, government agencies and consumers. The need to counter actual threats, as well as to prevent potential cybersecurity problems, calls for sharing information among vulnerable parties.
Verizon Dabbles in Security Reporting
April 23, 2014
Ninety-two percent of more than 100,000 incidents reported by 50 companies over the past 10 years fall into nine basic patterns, according to Verizon's 2014 data breach investigations report. An advance copy was released to the media Tuesday. Point-of-sale intrusions, Web app attacks, cyberespionage and card skimmers cause the most concern for data disclosure, it says.

See More Articles in Cybersecurity Section >>
Facebook Twitter LinkedIn Google+ RSS