Welcome Guest | Sign In
TechNewsWorld.com
Open Source Flaw 'Devil's Ivy' Puts Millions of IoT Devices at Risk
July 21, 2017
Millions of IoT devices are vulnerable to cybersecurity attacks due to a vulnerability initially discovered in remote security cameras. Senrio found the flaw in a security camera developed by Axis Communications, one of the world's biggest manufacturers of the devices. The Model 3004 security camera is used for security at the Los Angeles International Airport, according to Senrio.
V2V's Place in an Increasingly Connected World
July 21, 2017
You're probably tired of reading that the Internet of Things is the hottest thing going, and that IoT is a boon to technology and, simultaneously, a potential disaster for security and privacy. However, over the past few years, another IoT-related technology has been growing: vehicle to vehicle. V2V is a way for automobiles to communicate directly with other vehicles on the road.
Vendor Exposes Millions of Verizon Customers on Amazon Cloud
July 17, 2017
Verizon, the largest wireless carrier in the U.S., has confirmed that data belonging to about six million of its wireless customers was exposed after the information mistakenly was allowed to remain unprotected on an Amazon cloud server. The disclosure follows reports that an engineer at Nice Systems allowed the data of 14 million Verizon customers to reside on an Amazon Web Services S3 bucket.
Amazon's Echo Show: The Future Is Here
July 13, 2017
Amazon recently launched its Echo Show, which brings a visual screen to its smart speaker device. I wonder whether we're ready to start living in what seems like a futuristic Star Trek world. The Echo Show experience is sort of like having a laptop sitting on your table -- one that uses AI, allows you to speak to it, speaks back to you, and shows you relevant things on its screen.
Petya's Ransomware Cloaking Device
July 11, 2017
Recent ransomware threats have escalated into a global crisis, and cybersecurity experts and government authorities have redoubled their investigative efforts. Of grave concern is the possibility that the recent Petya attack had more sinister motives than typical ransomware operations, and that state actors were involved behind the scenes. The Petya attack actually used ransomware as a cover.
IoT Fuels Growth of Linux Malware
July 5, 2017
Malware targeting Linux systems is growing, largely due to a proliferation of devices created to connect to the Internet of Things. That is one of the findings in a report WatchGuard Technologies released last week. The report, which analyzes data gathered from more than 26,000 appliances worldwide, found three Linux malware programs in the top 10 for the first quarter of the year.
Google Gives Up Scanning Personal Gmail
June 30, 2017
Google recently announced the end of its policy of scanning user emails for targeted advertising purposes -- a controversial practice that riled privacy advocates and spurred legal challenges. Gmail is the world's most widely used email provider, with more than 1.2 billion users. Google attributed its decision to gains it has made in the enterprise.
Petya Ransomware Sinks Global Businesses Into Chaos
June 28, 2017
A new ransomware exploit dubbed "Petya" struck major companies and infrastructure sites this week, following last month's WannaCry ransomware attack, which struck more than 300,000 computers worldwide. Petya is believed to be linked to the same set of hacking tools as WannaCry. Petya already has impacted a Ukrainian international airport and shut down radiation monitoring systems at Chernobyl.
Cyberattackers Kick Down a Few Parliament Email Doors
June 27, 2017
The United Kingdom's Parliament on Monday reported a cyberattack on its email system over the weekend, when hackers attempted to access user accounts without authorization. Due to the "robust measures" in place to protect the legislative body's accounts and networks, fewer than 1 percent of the 9,000 accounts on the network were compromised, officials said. Accounts that were compromised reportedly had weak passwords.
Sudo or Sudo Not, There Is No (4th) Try
June 24, 2017
If you're a Linux user, at some point in some tutorial or troubleshooting guide you've more than likely encountered Linux's magic word: "sudo". A casual observer probably can tell you that it's used to access restricted functions on your computer, but there is much more to it than that. My hope is that by taking a moment to learn about the power of "sudo", you will be better equipped to use it.
OTA Report: Consumer Services Sites More Trustworthy Than .Gov Sites
June 22, 2017
The Online Trust Alliance on Tuesday released its 2017 Online Trust Audit & Honor Roll. Among its findings: Consumer services sites have the best combined security and privacy practices. FDIC 100 banks and U.S. government sites are the least trustworthy, according to the audit. The number of websites that qualified for the honor roll is at a nine-year high.
3 WannaCry Talking Points to Win Security Buy-In
June 21, 2017
By this point, most technology practitioners -- and nearly all security practitioners -- know about WannaCry. In fact, you might be sick of people analyzing it, rehashing it, sharing "lessons learned" about it, and otherwise laying out suggestions -- in some cases, contradictory -- about what you might do differently in the future. The level of unsolicited advice can border on the annoying.
Deep Root Analytics Downplays Giant Voter Data 'Oops'
June 20, 2017
A data contractor working on behalf of the Republican National Committee earlier this month allowed the personal data of 198 million voters to be exposed online, marking the largest ever leak of voter data in history. Deep Root Analytics exposed 1.1 terabytes of sensitive information -- including names, home addresses, dates of birth, phone numbers and voter registration information.
Apple Centers Health Data Strategy on iPhone
June 19, 2017
Apple quietly has been strategizing to expand its growing healthcare business to include the management of digital health records, with the iPhone operating as a central data hub. Apple reportedly has been in talks with numerous health industry groups that are involved in setting standards for the storage and sharing of electronic medical records, in a way that would give consumers more control.
The Art of Manipulation and Misdirection
June 19, 2017
Last week, I listened to an economist talk about Apple's complaints that Qualcomm had charged Apple too much for access to patents. What was fascinating was that Apple had folks focused on the 5 percent Qualcomm had charged it instead of on the massive profit that Apple made on each phone. The price of the iPhone 8 likely will be well over $1,000 -- but it could cost well under $500 to build.
Broader Scope of Russian Election Cyberattacks Revealed
June 15, 2017
Federal and state officials have confirmed that cyberattacks against state voting systems during the 2016 election were more widespread than previously disclosed to the public, but they said the heightened activity did not impact final vote tallies. The confirmations follow a report that attempts to influence the 2016 presidential election were much greater than previously disclosed.
Securing Your Linux System Bit by Bit
June 13, 2017
As daunting as securing your Linux system might seem, one thing to remember is that every extra step makes a difference. It's almost always better to make a modest stride than let uncertainty keep you from starting. Fortunately, there are a few basic techniques that greatly benefit users at all levels, and knowing how to securely wipe your hard drive in Linux is one of them.
Microsoft Buys Hexadite to Toughen Windows Security
June 9, 2017
Microsoft on Thursday said it has agreed to buy a Hexadite, which incorporates artificial intelligence in its automated responses to cyberthreats. The acquisition will help bolster the company's efforts to help commercial Windows 10 customers deal with advanced attacks on their networks, Microsoft said. The acquisition will include Hexadite's endpoint security automated remediation.
BitKey Unlocks Mysteries of the Bitcoin Universe
June 1, 2017
BitKey is a Debian-based live distribution with specialist utilities for performing highly secure air-gapped bitcoin transactions. This distro is not for everyday computing needs, but if you are obsessed with the use of bitcoin or other cryptocurrencies, it might be just what you need. I am a high-tech sort of guy with a keen interest in diving through Linux distros both simple and complex.
Hacking and Linux Go Together Like 2 Keys in a Key Pair
May 31, 2017
Ever since taking an interest Linux, with the specific aim of better understanding and enhancing my personal digital security, I have been fascinated by hacker conferences. As soon as I learned of their existence, I made a point of keeping tabs on the major conferences so I could browse through the latest videos in their archive once each one wraps up. I thought that was the closest I would get.
Leaked Docs Spotlight Complexity of Moderating Facebook Content
May 23, 2017
The public got a rare view into how Facebook tries to keep offensive and dangerous content offline in a report published Sunday. Leaked confidential documents exposed the secret rules by which Facebook polices postings on issues such as violence, hate speech, terrorism, pornography, racism and self-harm, as well as such subjects as sports fixing and cannibalism.
Intertwining Artificial Intelligence With Blockchain
May 18, 2017
Except for those folks living under rocks, everyone knows about or at least has heard of bitcoin. However, not everyone understands the technology of bitcoin, which extends well beyond Internet-based currency. For the rock people, bitcoin is an Internet-based currency that allows for transparency with respect to each transfer of the currency through the use of a distributed database.
Crate.io Packs New Features, Services Into DB Upgrade
May 17, 2017
Crate.io on Tuesday announced an upgrade to its open source CrateDB, and introduced a commercial version. The database now is available as a managed service as well. CrateDB 2.0 features clustering enhancements and SQL improvements. The enterprise edition adds authentication and authorization features for enhanced security, which are not provided in the open source version.
Massive Ransomware Attack Reaps Meager Profits
May 17, 2017
The WannaCry ransom attack that quickly circled the globe last week is not yet fully contained. So far, it has impacted more than 300,000 computers in 150 countries. However, one of the remarkable things about it is that only a trifling $100,000 in ransom, give or take, apparently has been paid. That represents a surprisingly low response from an attack generally considered the biggest ever.
Microsoft Bashes NSA Following Massive Ransomware Attacks
May 15, 2017
Microsoft this weekend unleashed its wrath on the National Security Agency, alleging it was responsible for the ransomware attack that began last week and has spread to thousands of corporate, government and individual computer systems around the world. Microsoft Chief Legal Officer Brad Smith launched a blistering attack on the NSA and governments worldwide.
British Hospitals, FedEx Among Thousands Hit by Ransomware
May 13, 2017
Authorities are investigating a massive ransomware attack that reportedly hit more than 45,000 computers in 74 countries worldwide, including the UK's NHS England national health service, international delivery service FedEx, and Spanish telecom firm Telefonica. Security experts have linked the exploit to an earlier leak by the Shadow Brokers, who allegedly pilfered hacking tools from the NSA.
The IoT's Scramble to Combat Botnets
May 11, 2017
With shadowy botnet armies lurking around the globe and vigilante gray-hat actors inoculating susceptible devices, the appetite for Internet of Things security is stronger than ever. "If you throw IoT on a con talk, you've got a pretty good chance to get in," remarked information security professional Jason Kent, as he began his presentation at Chicago's Thotcon conference last week.
Flaw in Intel Chips Could Open Door to Botnet Armies
May 9, 2017
A 7-year-old flaw in Intel chips could enable hijackers to gain total control of business computers and use them for malicious purposes. The Intel AMT vulnerability is the first of its kind, according to Embedi, which released technical details about it last week. Attackers could exploit the flaw to get full control over business computers, even those turned off but plugged into an outlet.
Surviving the Security 'Skills Desert'
May 8, 2017
If you've ever spent time in a desert, it may seem inconceivable to you that creatures actually can live there. The fact that animals not only survive, but also thrive in those conditions seems counterintuitive. In fact, a number of animals do so -- in many cases, they are aided by an array of specialized adaptations that allow them to leverage the environment to their advantage.
Google Neutralizes Docs Phishing Scam
May 5, 2017
A phishing scam that surfaced earlier this week used Google Docs in an attack against at least 1 million Gmail users. However, that amounted to fewer than 0.1 percent of Gmail users were affected, according to the company. Google last year put the number of active monthly Gmail users at more than 1 billion. Google shut down the phishing scam within an hour, it said.
See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS
How do you feel about shopping for your next new phone?
I can't wait for the new iPhone.
I'm eagerly awaiting the Galaxy Note 8.
I enjoy shopping for a great bargain, not necessarily a new model.
I dislike the phone shopping experience -- it's too confusing.
Phones have become boring -- I wish I could get excited.
Switching phones is monumentally inconvenient and annoying.