OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
TechNewsWorld.com
Congress Passes Budget Bill With Controversial Cybersecurity Provision
December 18, 2015
Congress on Friday passed an omnibus budget bill that included the Cybersecurity Information Sharing Act, or CISA. The Senate earlier this year passed CIS, which many conservative and liberal politicians, high-tech firms, and privacy and civil liberty advocates oppose. The latest version includes amendments that will allow corporations to share customers' information with the government.
MacKeeper Loses Control of User Data
December 17, 2015
Kromtech this week revealed a vulnerability in the data storage system of its MacKeeper software. Security researcher Chris Vickery, who alerted the company to the problem with its server, pegged the number of MacKeeper users affected at about 13 million. Kromtech posted a security alert about the breach on MacKeeper's website. The company fixed the error within hours of its discovery, it said.
Feds Give Commercial Off-the-Shelf IT a Closer Look
December 17, 2015
Federal information technology purchasing often involves large amounts of money based on the small print of acquisition requirements. Arcane procurement language seemingly can have a big impact on transactions. For IT vendors, provisions of recent legislation are prime examples of why it pays to scrutinize every line of the laws and regulations pertaining to federal acquisition programs.
Creating Rules of War for Cyberspace
December 17, 2015
The idea of a "Cyber Geneva Convention" has gained steam in the last five years. Based on the original Geneva Convention, it would ensure that certain types of attacks and specific targets would remain off-limits in a cyberwar. The concept of rules dictating what shouldn't be allowed in war came about after Henry Dunant visited wounded soldiers during the Second Italian War of Unification.
UK Police Pinch Suspect in VTech Hack
December 16, 2015
UK police have arrested a 21-year-old man as part of their investigation into last month's hack on VTech's systems. The man was arrested in Bracknell, 30 miles west of London, on suspicion of unauthorized access to a computer to facilitate the commission of an offense and suspicion of causing a computer to perform functions to secure or enable unauthorized access to a program or data, police said.
Twitter Alerts Users to State-Sponsored Cyberattack Threat
December 15, 2015
Twitter last week began warning some of its members that they may be the target of a state-sponsored attack on their accounts. Coldhak posted to its Twitter account a copy of the warning it received. It's among a small number of accounts that state-sponsored actors may be targeting in an attempt to obtain information such as email addresses, IP addresses and phone numbers, Twitter warned.
Hot Hacker Targets in 2016: Fantasy Sports, Professional Services
December 15, 2015
As 2016 approaches, it's time to get the crystal ball out and predict next year's cybersecurity trends. Here are some predictions from security pros TechNewsWorld interviewed. Fantasy sports sites in 2015 caught the attention of states' attorneys general, who wanted to treat the outfits as gambling enterprises. In 2016, the sites will get attention from another quarter: hackers.
FBI Chief: High-Tech Firms Need to Rethink Encryption Stance
December 11, 2015
FBI Director James Comey on Wednesday told members of a U.S. Senate committee that high-tech companies may need to adopt a new business model regarding encryption in order to get on the same page with law enforcement. "Encryption is getting in the way of our ability to have court orders effective to gather information we need in our most important work," he told the Senate Judiciary Committee.
Apple Tweaks Music, Mail, News in iOS Update
December 10, 2015
Apple on Tuesday released a new version of iOS, and while it was largely a maintenance release of the mobile operating system, the upgrade included some treats for music and news enthusiasts. The release, iOS 9.2, improved Apple Music, the company's streaming music service, in a number of ways. For example, users can create new playlists when adding a song to a playlist.
Federal IT Opportunities: Steady Funding, Constant Challenges
December 9, 2015
The good news for federal information technology managers -- and the vendor community -- is that government IT budgets will remain stable for the next few years in terms of projected spending. An additional potential benefit is that a recent budget agreement will support agencies for two years. The spending stability doesn't mean federal IT procurement will remain boringly routine, however.
Gadget Gives Passwords Pocket Protectors
December 9, 2015
Denis Clermont and Jérôme Jadot last month launched a Kickstarter campaign for the OdyOne digital identity manager. As much as many Web travelers and security experts would like usernames and passwords to disappear from use, the pesky credentials aren't going away anytime soon. That's why password managers are seen as a way to make the best of a bad situation.
Social Media Firms Face Quandary Over Terror Prevention
December 8, 2015
Following the recent terrorist attacks in Paris and San Bernardino, Calif., social media companies are coming under increased pressure, both internally and externally, to protect their networks from being used as platforms for operational planning and propaganda. "We should build tools to help de-escalate tensions on social media," wrote Google Executive Chairman Eric Schmidt in an op-ed.
VTech Hires Mandiant to Shore Up Security for Kids
December 4, 2015
VTech on Thursday revealed it has hired FireEye's Mandiant to help improve security after reaction from parents around the world over news that its servers were hacked. It also is cooperating with law enforcement agencies worldwide to investigate the incident and has temporarily shut down several websites, its Learning Lodge app store, and its Kids Connect service.
Forces That Will Reshape the IT Landscape in 2016
December 4, 2015
There may be no better way to capture the state of the technology industry than to borrow Charles Dickens' famous opening from A Tale of Two Cities: "It was the best of times, it was the worst of times..." It never has been a better time to launch offerings via the cloud, but the availability of low-cost computing power and open source software have created unprecedented competitive challenges.
'Tis the Season for Online Predators
December 3, 2015
While visions of holiday shoppers dance in retailers' heads, those visions are also on the minds of online marauders. Net predators are sticking to scams that have made them money throughout the year. "Over the last 12 months, we've seen a return to attachments with innocuous macros in them," said Kevin Epstein, vice president of advanced security and governance at Proofpoint.
More Things, More Cyberattacks
December 2, 2015
Not a day passes without mention of the Internet of Things in the media, as it appears to expand exponentially. Roughly 6.4 billion things will be connected to the Internet in 2016, at a rate of 5.5 million new things per day, according to Gartner. More than 20 billion devices will be in use by 2020. As a result, everyone must be more cognizant of cyber-risks.
Massive Hack Attack on Educational Toy Company Exposes Parents, Kids
November 30, 2015
Officials of several U.S. states on Monday have opened investigations into a massive data breach that occurred last month at VTech. The award-winning Hong Kong-based maker of electronic learning toys for kids on Friday announced that its Learning Lodge database was breached in a hack attack on Nov. 14. Learning Lodge offers apps, learning games, e-books, and other educational content.
How Technology Could Prevent Another Paris-Like Attack
November 30, 2015
What I find fascinating is that with all of the focus members of the intelligence community place on violating our privacy, they still aren't able to stop attacks like the one in Paris. Currently they are complaining that it is our fault for implementing encryption that blocks their often-illegal views into citizens' personal lives. I think that even if encryption didn't exist, they still would be ineffective.
Walmart to Jump the Gun on Cyber Monday
November 24, 2015
Walmart on Monday announced it will release all 2,000 Cyber Monday deals at 8 p.m. EST Sunday. That and other retailer moves are making it look as if Cyber Monday might be a nonevent this holiday season: Amazon is running an eight-day Black Friday sale that will take it through Cyber Monday, leading Walmart to launch a price-matching event to compete.
New Tech Targets Enterprise Ransomware
November 23, 2015
SentinelOne last week introduced an addition to its behavioral solution designed to address the problem of ransomware scrambling files on a computer. Ransomware has been a scourge not only for consumers, but for the enterprise, too. The malicious software can be particularly nettlesome for enterprises because they have to protect many endpoints -- phones, tablets, laptops, desktops and servers.
Telegram Shutters 78 ISIS Channels
November 20, 2015
The team behind the Telegram secure messaging app on Wednesday reported that it had shut down 78 channels, across 12 languages, used by ISIS and its supporters. However, the app's privately used channels weren't affected by the sweep. After the attacks on Paris last weekend, the Telegram team learned that the terrorist group had been communicating openly on its secure messaging platform.
Dojo Stands Cybersecurity Guard for Smart Homes
November 20, 2015
Dojo-Labs on Thursday introduced Dojo, a device that plugs into the router of a home network and acts as a watchdog to ensure that everything connected to the network is operating on its best behavior. The device brings some of the advanced technologies used to protect corporate networks to the home. It can prevent attacks and detect intrusions by observing how a device behaves on the network.
FBI, Carnegie Mellon Deny $1M Contract to Crack Tor
November 19, 2015
The FBI has denied allegations that it paid Carnegie Mellon University security researchers $1 million to crack a network designed to protect the anonymity of its users. The Tor Project, which operates the network, last week accused the FBI of cutting the CMU deal. The attack on Tor occurred from January to July 2014. The attackers discovered a way to strip the anonymity of Tor users.
Docker, Yubico Team Up to Secure App Development
November 19, 2015
Docker this week announced new security enhancements at DockerCon EU in Barcelona, Spain, including hardware signing of container images -- an industry first -- through a partnership with Yubico. Docker Content Trust offers hardware signing through support for Yubico's YubiKey. The YubiKey 4 lets Docker users digitally sign code during initial development and through subsequent updates.
ISIS Mocks Anonymous' War Declaration
November 18, 2015
ISIS has rebuffed the declaration of cyberwar Anonymous issued. "The #Anonymous hackers threatened in new video release that they will carry out a major hack operation on the Islamic state (idiots)," reads a message posted in a Telegram channel believed to be affiliated with ISIS hackers. "What they gonna hack," it continues. "All what they can do is hacking Alansar twitter accounts, emails etc."
Paris Attacks Deepen Encryption Debate
November 18, 2015
Encryption once again has come under fire in the wake of last week's terrorist attacks in Paris. Western intelligence agencies reportedly blamed the technology for enabling communications among the attackers, and some officials renewed their calls for technology companies to give them decryption keys. However, the terrorists may have communicated through private messages on the PlayStation 4.
FBI Paid Carnegie Mellon $1M to Crack User IDs, Claims Tor
November 17, 2015
The Tor Project last week claimed the FBI paid Carnegie Mellon University $1 million to crack the anonymity of Tor users. The claim appears to have been triggered by a report that said the FBI's arrest of an alleged member of Silk Road 2.0 was based on "information obtained by a 'university-based research institute' that operated its own computers on the anonymous network used by Silk Road 2.0."
Nadella: Microsoft to Be Stealth Operator for Cloud Security
November 17, 2015
CEO Satya Nadella on Monday made a bid to reintroduce Microsoft to professionals working in a brave new cyberworld of virtual, interconnected computing. Speaking at the Microsoft Government Cloud Forum in Washington, Nadella presented a broad new vision of a cloud- and mobile-first enterprise that promises to make personal and client security a central theme of its business.
Report: Botnets Help Bump Cyberattack Attempts by 20 Percent
November 17, 2015
ThreatMetrix last week reported that it had detected and prevented more than 90 million attempted cyberattacks in real time across industries from July to September. The attempted attacks covered fraudulent online payments, logins and new account registrations, and represented a 20 percent increase over the previous quarter, according to ThreatMetrix Cybercrime Report: Q3 2015.
Gmail to Warn Users of Unencrypted Email
November 16, 2015
Google last week announced that it is developing features for Gmail that will notify them when they get messages through a nonencrypted connection. Regions of the Internet are preventing message encryption by tampering with requests to initiate SSL connections, and malicious DNS servers are publishing fake routing information to email servers looking for Gmail, a study found.
See More Articles in Cybersecurity Section >>
Facebook Twitter LinkedIn Google+ RSS
What is your reaction to the rumored
4-inch iPhone?
I'm in -- I'd love to have a smaller iPhone.
I prefer a larger iPhone, but it's good to have more options.
I expect innovation from Apple -- seems it's running out of ideas.
I'm not interested in an iPhone of any size.
Try MailChimp Pro