OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
TechNewsWorld.com
Uber Settles With New York AG After 'Playing God' With Data
January 8, 2016
New York Attorney General Eric Schneiderman on Thursday announced a deal that would require Uber to encrypt geolocation information about its riders, as well as enhance its data security practices. The AG opened an investigation into Uber in 2014, in response to allegations that the service had tracked riders and displayed their locations in an aerial format, known internally as the "God View."
Major Security Flaw Found in Silent Circle's Blackphone
January 7, 2016
Security researchers at SentinelOne on Wednesday revealed a vulnerability they discovered in the Blackphone. The flaw -- an obscure socket -- lets an attacker take over and control communications on the Blackphone, a highly secure Android smartphone Silent Circle developed and marketed in reaction to news of government surveillance of people's communications.
Iranian Cyberattack on American Dam Viewed As Rarity
January 7, 2016
Just days before Christmas, a rare event occurred: the report of a successful intrusion into America's infrastructure by overseas hackers. The event -- penetration of the control system of a dam 20 miles from New York City -- happened more than two years ago but wasn't made until last month. Cloaking such incidents in secrecy is standard operating procedure for industries that use control systems.
New Smart Cam Can Distinguish Between Cats, Cat Burglars and Cars
January 6, 2016
Netatmo on Monday announced a smart security camera and floodlight combo at CES 2016. The Presence camera is designed for outdoor use and can identify objects such as people, animals and vehicles. The camera, which connects to a rectangular floodlight, can be customized to send alerts to a smartphone app or desktop browser based on what it sees and where it sees it.
FTC Debates Cybersecurity Injury Standard
January 5, 2016
The U.S. Federal Trade Commission is engaged in an internal struggle over how it should assess the effect on consumers when businesses fail to provide proper e-commerce security. The outcome of the debate will have a significant impact on the FTC's ability to initiate cybersecurity violation cases. The legal issue could spill over to federal courts or even Congress for resolution.
Security Execs Sweat Insider Threats
December 31, 2015
Insider threats are becoming increasingly worrisome to corporate security executives. That is one of the findings in a survey of C-level businesspeople Nuix released last week. "The insider threat seems to be a bigger concern this year than it was in previous years," said Nuix's Keith Lowry. "People are recognizing that it is a significant weakness that has yet to be fully addressed."
China's Internet Tightrope Walk
December 30, 2015
Chinese President Xi Jinping recently told an international delegation of cybersecurity and technology experts that governments must be allowed to exercise sovereign rights and decision making over Internet use within their own countries. Speaking at the second annual World Internet Conference in Wuzhen, China, the president effectively called for a revised order in Internet governance.
All Security Pros Want for Christmas: Smarter Users, Decoy Networks
December 24, 2015
People like to see gifts from their wish lists under the Christmas tree, and security pros are no exception. Here are things some cyberwarriors would like old St. Nick to deliver to them. "It's probably never going to happen, but it would be fantastic to get smarter users who are less susceptible to social engineering," said Proofpoint's Ryan Kalember.
Apple's Cook Goes to the Barricades on Encryption
December 22, 2015
Apple CEO Tim Cook brought the encryption battle between the high-tech industry and the nation's law enforcement authorities to prime time TV Sunday in an interview on the CBS news program 60 Minutes. During the interview, Charlie Rose asked Cook about the need for law enforcement agencies to access data that has been encrypted on Apple phones. There's all kinds of sensitive information on smartphones today, Cook noted.
Congress Passes Budget Bill With Controversial Cybersecurity Provision
December 18, 2015
Congress on Friday passed an omnibus budget bill that included the Cybersecurity Information Sharing Act, or CISA. The Senate earlier this year passed CIS, which many conservative and liberal politicians, high-tech firms, and privacy and civil liberty advocates oppose. The latest version includes amendments that will allow corporations to share customers' information with the government.
MacKeeper Loses Control of User Data
December 17, 2015
Kromtech this week revealed a vulnerability in the data storage system of its MacKeeper software. Security researcher Chris Vickery, who alerted the company to the problem with its server, pegged the number of MacKeeper users affected at about 13 million. Kromtech posted a security alert about the breach on MacKeeper's website. The company fixed the error within hours of its discovery, it said.
UK Police Pinch Suspect in VTech Hack
December 16, 2015
UK police have arrested a 21-year-old man as part of their investigation into last month's hack on VTech's systems. The man was arrested in Bracknell, 30 miles west of London, on suspicion of unauthorized access to a computer to facilitate the commission of an offense and suspicion of causing a computer to perform functions to secure or enable unauthorized access to a program or data, police said.
Twitter Alerts Users to State-Sponsored Cyberattack Threat
December 15, 2015
Twitter last week began warning some of its members that they may be the target of a state-sponsored attack on their accounts. Coldhak posted to its Twitter account a copy of the warning it received. It's among a small number of accounts that state-sponsored actors may be targeting in an attempt to obtain information such as email addresses, IP addresses and phone numbers, Twitter warned.
Hot Hacker Targets in 2016: Fantasy Sports, Professional Services
December 15, 2015
As 2016 approaches, it's time to get the crystal ball out and predict next year's cybersecurity trends. Here are some predictions from security pros TechNewsWorld interviewed. Fantasy sports sites in 2015 caught the attention of states' attorneys general, who wanted to treat the outfits as gambling enterprises. In 2016, the sites will get attention from another quarter: hackers.
FBI Chief: High-Tech Firms Need to Rethink Encryption Stance
December 11, 2015
FBI Director James Comey on Wednesday told members of a U.S. Senate committee that high-tech companies may need to adopt a new business model regarding encryption in order to get on the same page with law enforcement. "Encryption is getting in the way of our ability to have court orders effective to gather information we need in our most important work," he told the Senate Judiciary Committee.
Apple Tweaks Music, Mail, News in iOS Update
December 10, 2015
Apple on Tuesday released a new version of iOS, and while it was largely a maintenance release of the mobile operating system, the upgrade included some treats for music and news enthusiasts. The release, iOS 9.2, improved Apple Music, the company's streaming music service, in a number of ways. For example, users can create new playlists when adding a song to a playlist.
Mozilla Launches Free Ad Blocker for iOS 9
December 9, 2015
Mozilla on Monday launched Focus by Firefox, a free ad blocker for Safari users on iOS 9. It lets users block the same trackers blocked by Private Browsing with Tracking Protection in Firefox for the Windows, Mac, Linux and Android platforms. The protection is based on Disconnect's open source block list. Focus by Firefox doesn't work with Firefox.
Gadget Gives Passwords Pocket Protectors
December 9, 2015
Denis Clermont and Jérôme Jadot last month launched a Kickstarter campaign for the OdyOne digital identity manager. As much as many Web travelers and security experts would like usernames and passwords to disappear from use, the pesky credentials aren't going away anytime soon. That's why password managers are seen as a way to make the best of a bad situation.
VTech Hires Mandiant to Shore Up Security for Kids
December 4, 2015
VTech on Thursday revealed it has hired FireEye's Mandiant to help improve security after reaction from parents around the world over news that its servers were hacked. It also is cooperating with law enforcement agencies worldwide to investigate the incident and has temporarily shut down several websites, its Learning Lodge app store, and its Kids Connect service.
EFF Sues Google for Snooping on Students
December 3, 2015
The Electronic Frontier Foundation on Tuesday filed a complaint with the Federal Trade Commission, alleging that Google has used personal student data mined from its school Chromebook distribution, and requesting an investigation and an injunction against the practice. The EFF also launched a campaign to educate parents and school administrators about the risks of student data collection.
Court Lifts NSL-Imposed Gag Order on Warrantless FBI Probing
December 1, 2015
Calyx founder Nicholas Merrill -- who made history in 2004 when he sued to lift a nondisclosure order imposed by an FBI National Security Letter -- has won his 11-year battle. The ruling, handed down this summer by the United States District Court for the Southern District of New York, was stayed for 90 days to give the government time to file an appeal. It became public when the stay expired on Monday.
Massive Hack Attack on Educational Toy Company Exposes Parents, Kids
November 30, 2015
Officials of several U.S. states on Monday have opened investigations into a massive data breach that occurred last month at VTech. The award-winning Hong Kong-based maker of electronic learning toys for kids on Friday announced that its Learning Lodge database was breached in a hack attack on Nov. 14. Learning Lodge offers apps, learning games, e-books, and other educational content.
BlackBerry to Pull Out of Pakistan on Privacy Grounds
November 30, 2015
BlackBerry on Monday announced that it will cease operations in Pakistan at the end of the year. The move is the result of a shutdown order from the Pakistan Telecommunication Authority, which in July notified the company that its BlackBerry Enterprise Service servers would no longer be allowed to operate in the country beginning in December for what it said were security concerns.
How Technology Could Prevent Another Paris-Like Attack
November 30, 2015
What I find fascinating is that with all of the focus members of the intelligence community place on violating our privacy, they still aren't able to stop attacks like the one in Paris. Currently they are complaining that it is our fault for implementing encryption that blocks their often-illegal views into citizens' personal lives. I think that even if encryption didn't exist, they still would be ineffective.
Austrian High Court to Rule on Class Action Status in Facebook Privacy Case
November 27, 2015
The Austrian Supreme Court will consider whether a suit against Facebook Ireland can proceed as a class action. Austrian privacy activist Max Schrems brought the suit to challenge the transfer of private data to Facebook's European subsidiary in Ireland. The Vienna Court of Appeals previously had ruled that the suit could be filed locally, as Schrems' claim fell under local privacy laws there.
New Tech Targets Enterprise Ransomware
November 23, 2015
SentinelOne last week introduced an addition to its behavioral solution designed to address the problem of ransomware scrambling files on a computer. Ransomware has been a scourge not only for consumers, but for the enterprise, too. The malicious software can be particularly nettlesome for enterprises because they have to protect many endpoints -- phones, tablets, laptops, desktops and servers.
Telegram Shutters 78 ISIS Channels
November 20, 2015
The team behind the Telegram secure messaging app on Wednesday reported that it had shut down 78 channels, across 12 languages, used by ISIS and its supporters. However, the app's privately used channels weren't affected by the sweep. After the attacks on Paris last weekend, the Telegram team learned that the terrorist group had been communicating openly on its secure messaging platform.
Dojo Stands Cybersecurity Guard for Smart Homes
November 20, 2015
Dojo-Labs on Thursday introduced Dojo, a device that plugs into the router of a home network and acts as a watchdog to ensure that everything connected to the network is operating on its best behavior. The device brings some of the advanced technologies used to protect corporate networks to the home. It can prevent attacks and detect intrusions by observing how a device behaves on the network.
FBI, Carnegie Mellon Deny $1M Contract to Crack Tor
November 19, 2015
The FBI has denied allegations that it paid Carnegie Mellon University security researchers $1 million to crack a network designed to protect the anonymity of its users. The Tor Project, which operates the network, last week accused the FBI of cutting the CMU deal. The attack on Tor occurred from January to July 2014. The attackers discovered a way to strip the anonymity of Tor users.
Paris Attacks Deepen Encryption Debate
November 18, 2015
Encryption once again has come under fire in the wake of last week's terrorist attacks in Paris. Western intelligence agencies reportedly blamed the technology for enabling communications among the attackers, and some officials renewed their calls for technology companies to give them decryption keys. However, the terrorists may have communicated through private messages on the PlayStation 4.
See More Articles in Privacy Section >>
Facebook Twitter LinkedIn Google+ RSS
What best reflects your opinion on online privacy?
We need new laws to curb government spying.
It's dead -- Google, Facebook and others killed it.
Personalized advertising is the worst -- it's creepy.
It's achievable through encryption and other tech.
It's an overblown issue -- I have nothing to hide.