Attention Marketers: Access 30 Million IT Decision Makers with ECT News Network's INSTA-LEADS · Click to Learn More!
Welcome Guest | Sign In
TechNewsWorld.com
China May Write New Rules for US Businesses Selling Tech to Banks
February 2, 2015
A group of organizations representing American businesses last week requested urgent discussion and dialog with China's government. They expressed concern about the possible adoption of a policy to ensure that any Internet and information communications technology products Chinese banks purchase from companies outside of China are secure and controllable.
Amazon WorkMail Lifts Back-End Email Burden From IT's Shoulders
January 30, 2015
Amazon is making a play for the enterprise email market. Offered by Amazon Web Services, WorkMail targets companies that want to move their on-premises email services to the cloud. WorkMail reduces complexity and cost. With all mail infrastructure relocated to Amazon's cloud, a company no longer need be concerned with buying hardware, installing patches, and installing mail backup systems.
POS Terminals Rich Vein for Gold-Digging Hackers
January 28, 2015
Hackers are like gold miners. Once they find a rich vein for their malware, they mine it until it's dry. Point-of-sale terminals are such a vein, and it doesn't appear that it's one that's about to run dry any time soon. Following the success of the Target breach in 2013, the hacker underground was quick to rush more POS malware to market.
Businesses Seek Liability Protection for Cybersecurity Disclosures
January 28, 2015
"No foreign nation, no hacker, should be able to shut down our networks, steal our trade secrets, or invade the privacy of American families," President Barack Obama told the U.S. Congress during the State of the Union Address last week. However, hunting down the perpetrators of cyberattacks that compromise national security or disrupt commerce is only going to get more difficult in the future.
White House Jump-Starts Cybersecurity Protection Programs
January 23, 2015
As members of the U.S. Congress started to prepare for the upcoming legislative session, President Obama lost little time in putting cybersecurity near the top of a to-do list for lawmakers. During a visit to the federal National Cybersecurity Communications Integration Center, Obama called for additional legislation to improve information technology protection.
Businesses Waste Big Bucks Fighting Phantom Cyberattacks
January 21, 2015
Businesses spend an average of $1.27 million a year chasing cyberthreats that turn out to be dead ends. That is one of the findings in a report released last week on the cost of containing malware. In a typical week, an organization can receive nearly 17,000 malware alerts, although only 19 percent of them are considered reliable, the researchers found.
Keeping Score in the Google vs. Microsoft Zero-Day Games
January 20, 2015
Google's recent publication of Windows' vulnerabilities -- two within a week -- predictably raised Microsoft's ire. "Risk is significantly increased by publically announcing information that a cybercriminal could use to orchestrate an attack and assumes those that would take action are made aware of the issue," wrote Chris Betz, Microsoft's senior director of trustworthy computing.
IBM's z13 Emerges From Mainframe Fountain of Youth
January 19, 2015
IBM launched its newest mainframe, the z13, last week in New York City. Built for the mobile economy, the z13 can process 2.5 billion transactions daily. It enables real-time encryption on all mobile transactions at scale, and it includes embedded analytics that provide real-time transactions faster and cheaper than the competition, the company said.
Docker Security Questioned
January 15, 2015
Security questions recently have been raised about Docker, a promising technology for running applications in the cloud. Docker is an open source initiative that allows applications to be run in containers for flexibility and mobility only dreamt of in the past. "Since the 70s, programmers have been talking about reusable code and the ability to migrate applications," noted IDC analyst Al Gillen.
Sony Sortie's Smoking Gun Still Missing
January 14, 2015
Recent research from security firm Cloudmark has raised doubt about the purported connection between North Korea and last November's intrusion on Sony Pictures Entertainment's computer networks. The FBI last week continued to press its case that North Korea was behind the cyberattack, pointing to an exposed block of IP addresses allocated to North Korea.
BlackBerry Jingles Its Keys to Recovery
January 8, 2015
BlackBerry has been hurting over the last several years, but recently it's starting to look like the stars may be lining up for recovery. If BlackBerry does make a comeback, it will be a very different company. This time, the focus will be on security -- plus one more important factor. BlackBerry succeeded years ago. It was the first successful smartphone maker.
Fingerprint Theft Just a Shutter Click Away
January 7, 2015
Ever since smartphone makers started incorporating fingerprint scanners as a means of unlocking mobile phones, the Chaos Computer Club has attacked the technology with vigor. Not long after Apple added Touch ID to its iPhones, the German hackers demonstrated how to lift prints from a surface and create a flexible pad containing the print that could be used to break into a phone.
Google Outs Unpatched Windows 8.1 Kernel Flaw
January 6, 2015
Microsoft got a fiery start to 2015 when Google last week publicized a kernel vulnerability in Windows 8.1 Update. Google Project Zero's James Forshaw, who discovered the flaw, ranked it as a high-severity issue. Although Forshaw reported it to Microsoft last September, the company had not yet fixed the problem when Google published it. The vulnerability lets people falsely pose as administrators.
Yikes! Ransomware Could Take Over Your Hard Drive
January 5, 2015
Malware is running rampant on the Internet, affecting smartphones, tablets and PCs. Relatively new malware allows bad guys to encrypt devices until a ransom is paid. Usually the ransom is required in bitcoin, rather than U.S. currency, as it cannot be traced. What are the legal and other risks associated with ransomware? Ransomware is largely directed at personal devices and small businesses.
Hackers Give Touch ID the Finger
December 29, 2014
Hacker Jan Krissler, aka "Starbug," this weekend told attendees at the 31st Chaos Computer Club convention that he had replicated the fingerprints of German Defense Minister Ursula von der Leven using a standard photo camera and commercially available software. Krissler used a close-up of a photo of the minister's thumb and other pictures taken at different angles during a press event in October.
Misfortune Cookie Crumbles Millions of Security Systems
December 29, 2014
Check Point Software Technologies recently revealed a flaw in millions of routers that allows the devices to be controlled by hackers. The company detected 12 million Internet-connected devices that have the flaw. The vulnerability, which Check Point dubbed "Misfortune Cookie," can be found in the code of a commonly used embedded Web server, RomPager from AllegroSoft.
The Big Tech Stories of 2015
December 29, 2014
Last week, we looked back at the largely untold, or under told, stories of 2014. This week, let's look ahead to some of the stories that are coming in 2015. We'll have robots, self-driving cars, armed autonomous drones, the professional proliferation of head mounted cameras, some scandals, and some interesting political implications. I'll close with my product of the year, which even surprised me.
Boeing Picks BlackBerry to Brace Black's Security
December 22, 2014
Boeing has enlisted BlackBerry to help bolster the security of its Black smartphone by providing "secure mobile solutions for Android devices utilizing their BES-12 platform," said Boeing spokesperson Andrew Lee. BES 12 provides cross-platform enterprise mobile management that gives organizations strict control of devices, while letting users keep personal data private.
BlackBerry Bucks Up Its Loyal Base With Classic Comeback
December 17, 2014
BlackBerry has unveiled the BlackBerry Classic, a handset with a full QWERTY physical keyboard, physical navigation keys, and a design that can be best described as "retro," in that its appearance is virtually identical to the BlackBerry Bold. The Classic, which is smaller than the company's recently launched Passport smartphone, targets users who still long for the traditional BlackBerry handset.
FIDO Pursues Vision of a Password-Free World
December 17, 2014
A group of some 150 companies last week moved closer to eliminating the bane of many an online user: the ubiquitous password. The FIDO Alliance, which counts among its members Microsoft, PayPal, Google, Bank of America, Visa and MasterCard, released version 1.0 of its open specifications for strong authentication on the Internet without the use of passwords.
No Respite for Sony
December 12, 2014
Since the hacker group calling itself "Guardians of Peace" announced its attack on Sony Pictures Entertainment late last month, things have gone downhill for the company. After confidential documents were leaked to the Internet over several days, a denouement of sorts was reached last week, when a security company examining the stolen data discovered nearly 50,000 Social Security numbers.
FIDO Alliance Launches 'Password Killer' Spec
December 11, 2014
The Google-supported FIDO Alliance this week achieved a key milestone in its mission to end the use of passwords by releasing version 1.0 of its namesake open standard. "Today, we celebrate an achievement that will define the point at which the old world order of passwords and PINs started to wither and die," said Michael Barrett, president of the alliance. FIDO stands for "Fast IDentity Online."
Blackphone to Peddle a Few Good Apps
December 10, 2014
Blackphone plans to open an app store for privacy-focused applications to run on its secure smartphone. The store is expected to launch in January. The Blackphone runs PrivatOS, a modified version of Android 4.4.2 that comes bundled with tools that encrypt phone calls, texts, emails and Internet browsing. The app store will feature curated apps selected for their security and privacy chops.
Dashlane, LastPass Promise Easy Password Changing
December 10, 2014
Two password manager makers on Tuesday announced new features that allow their users to minimize the hassle of resetting passwords. One of the first things online users are advised to do after a data breach -- and there have been more than few of those lately -- is to change their passwords. Few users act on that advice, though, because password changing is too onerous.

See More Articles in Enterprise Security Section >>
Facebook Twitter LinkedIn Google+ RSS
Does technology create more jobs than it destroys?
Yes - The jobs new technologies create outnumber those lost due to machines replacing humans.
No- Companies fixated on cost-cutting are building workforces of robots and computers instead of people.
PENN STATE ONLINE Information Technology Degrees and Certificates