Welcome Guest | Sign In
TechNewsWorld.com
What a Linux Desktop Does Better
February 23, 2017
After I resolved to adopt Linux, my confidence grew slowly but surely. Security-oriented considerations were compelling enough to convince me to switch, but I soon discovered many more advantages to the Linux desktop. For those still unsure about making the transition, or those who have done so but may not know everything their system can do, I'll showcase here some of the Linux desktop's advantages.
Verizon Cuts Better Deal for Breach-Battered Yahoo
February 21, 2017
Verizon and Yahoo on Tuesday announced new terms for the acquisition deal they inked last summer. Verizon will pay $350 million less than the original contract price, which places the new value of the deal at $4.48 billion. Yahoo will be responsible for 50 percent of any breach-related cash liabilities incurred as a result of non-SEC government investigations and third-party litigation, under the new agreement.
Microsoft Seeks Global Cybersecurity Accord
February 18, 2017
Microsoft has called on governments around the world to create a "digital Geneva Convention" as a way to normalize international cybersecurity rules and protect civilian use of the Internet. President Brad Smith, who is also Microsoft's chief legal officer, addressed the issue at the annual RSA conference held earlier this week, saying that governments need to establish international rules.
Trump's Not the Only One With a Phone Security Problem
February 17, 2017
Is your Android phone secure? President Donald Trump's favorite smartphone reportedly is an older Android device. Security concerns flared recently, following indications that he sent some tweets from it. Of course, the president has been given a special secure device, but it's not clear whether he is using it. My question is, if the president is not secure using an ordinary phone for his primary wireless communications... are any of us?
FTC's Lawsuit Should Make You Feel Very Insecure About the IoT
February 14, 2017
Even though D-Link expressly promised that many of its wireless devices had the highest level of security available, the FTC last month filed a lawsuit that alleges otherwise. The FTC filing includes copies of online marketing materials and technical specifications for D-Link's products, and flatly declares that "thousands of Defendants' routers and cameras have been vulnerable to attacks."
Capsule8 Launches Linux-Based Container Security Platform
February 11, 2017
Cybersecurity startup Capsule8 this week announced that it has raised $2.5 million to launch the industry's first container-aware, real-time threat protection platform designed to protect legacy and next-generation Linux infrastructures from existing and potential attacks. CEO John Viega, CTO Dino Dai Zovi and Chief Scientist Brandon Edwards, all veteran hackers, cofounded the firm.
Dozens of iOS Apps Vulnerable to WiFi Snooping
February 9, 2017
Dozens of applications for Apple's mobile devices are vulnerable to WiFi snoopers, according to Will Strafach, CEO of the Sudo Security Group. He identified 76 popular iOS apps available at Apple's App Store that were vulnerable to wireless eavesdroppers, even though the connections were supposed to be protected by encryption. There have been 18 million downloads of the vulnerable apps, he said.
Anonymous Hacker Pulls Plug on Thousands of Dark Net Sites
February 7, 2017
Twenty percent of the Dark Net was taken offline last week, when a hacker compromised a server hosting some 10,000 websites on the Tor network. Tor, designed to hide the identities of its users, is widely used on the Dark Web, which serves as a hub for illegal online activities. Visitors to the affected pages were greeted with the message, "Hello, Freedom Hosting II, you've been hacked."
Ode to Sprint: Somebody Calls You, You Answer Quite Slowly
February 7, 2017
As I write this, I'm listening to twangy guitar music that calls up vague images of big spiny cactus, dust, and a riderless swaybacked horse. Lots of dust. I've been listening to the same few bars for 43 minutes and counting. Every few seconds, the music is interrupted by this: "We apologize for the wait. We are currently experiencing higher than normal volumes and long hold times. ..."
Calling Facebook Customer Service? Beware of Fraudsters
February 2, 2017
Googling for a Facebook customer support phone number may connect users with fraudsters. A fraudulent number reportedly appeared not only as top result in a Google search, but also as a featured snippet -- that is, highlighted in a box at the top of the search results. An investigator who called the number, posing as a Facebook customer who had been locked out of his account.
Hackers Targeted DC Police Cams Days Before Inauguration
January 31, 2017
A ransomware attack darkened the video surveillance system of the District of Columbia's police department eight days before the presidential inauguration of Donald J. Trump. Video storage devices for 70 percent of the CCTV system reportedly were unable to record anything between Jan. 12 and Jan. 15, as police techies scrambled to combat malicious software found on 123 of 187 networked video recorders.
Trump Clings to Personal Phone Despite Security Risks
January 27, 2017
President Donald J. Trump apparently has continued to use his personal Android smartphone despite security concerns. Trump was concerned about losing access to his personal phone even prior to taking his oath of office, according to a report citing unnamed aides who said he worried about how isolated he could become in the White House without his phone to keep in touch with friends.
Personalization, Simplicity Key to Smart Home Device Adoption
January 26, 2017
Continued innovation and messaging are crucial for smart safety and security device manufacturers that want to capitalize on new opportunities in the emerging Internet of Things. Early adopters of smart devices are often drawn to the innovative design and technological gadgetry. However, mass market adoption depends on clear and compelling value propositions that appeal to the masses.
The Old Man and the Tsunami: A Security Story
January 23, 2017
There's a folk-story that all Japanese schoolchildren learn about an old man who lives in a village by the sea. One day, an earthquake hits. He's the only person in the village to realize that a tsunami will soon follow. He hurries to the nearby mountainside where the rice for the village is grown and sets the entire harvest aflame. All of the villagers race to the mountainside to deal with the conflagration -- their rice is their most precious resource.
Yahoo and the Year of Living Dangerously
January 20, 2017
If there is a lesson to be drawn from Internet search giant Yahoo's hellish past year, it is a grimly illustrative one: Never assume a cybersecurity disaster can't get worse. Last September, the Internet portal disclosed that it had suffered the most damaging and far-reaching data breach in history -- only to then announce in December the discovery of a second, earlier, and even larger hack.
Microsoft Hardens Latest Windows Version Against Hackers
January 17, 2017
Microsoft has fortified the latest version of Windows to make it more secure than previous editions, but the strongest protections will be available only to those willing to pay a steep price for them. Windows 10 Anniversary Update has introduced many mitigation techniques in core Windows components and the Microsoft Edge browser, researchers Matt Oh and Elia Florio wrote in a blog post last week.
US Pushes Cybersecurity Acquisition Tools as Contracts Flow
January 16, 2017
Vendors of cybersecurity offerings are finding that the U.S. government is serious about improving the protection of federal IT assets. A steady stream of data protection contracts has been flowing to providers, including some notable high-value transactions during the last half of 2016. One example is a Department of Homeland Security contract, with a potential value of $395 million.
St. Jude Medical Patches Cardiac Machine's Cybersecurity Flaw
January 11, 2017
Medical device maker St. Jude Medical on Monday began deploying software designed to protect its remote monitoring system for implantable pacemaker and defibrillator devices. The move came on the heels of the U.S. food and Drug Administration's warning that the company's Merlin@home Transmitter contained vulnerabilities that could be exploited by hackers.
CES 2017's Magic
January 9, 2017
CES was a fascinating show this year. One of the things that made it so fascinating was that everyone and their brother had cars demonstrating one form of technology or another. It kind of makes me wonder what we'll see at the next car show -- PCs, drones, tablets and smartphones? That wasn't the only surprise at the show, though. Nvidia, long thought of as living in Intel's shadow, broke out.
Las Vegas Captures Ransomware Crown
January 7, 2017
Las Vegas is arguably the gambling capital of the world, but it's also the king city for ransomware, based on recent research. Among the world's nations, the United States ranked highest in ransomware incidents, according to a Malwarebytes report on the prevalence and distribution of extortion apps. The area of the country that logged the most incidents was the Las Vegas-Henderson, Nevada, region.
Norton Core Router Gives Home Security a New Design
January 3, 2017
Norton by Symantec on Tuesday announced the Norton Core secure router for smart devices in the connected home at CES. The router protects up to 20 PCs, Macs, Android and iOS smartphones and tablets on a home network, and unlimited devices connected to the IoT. It will update its firmware in background mode automatically, said Ameer Karim, GM of consumer IoT security at Symantec.
Evernote Toes the Privacy Line
December 31, 2016
Caught off guard by a huge backlash, Evernote recently abandoned its plan to let staffers read customer notes under certain circumstances. The plan would have allowed staffers to review private customer notes as a means of assessing the accuracy of its new machine learning technology. The company made a mistake in judgment, Evernote CEO Chris O'Neil acknowledged.
2017: More Apple Security Flaws, Cyberattacks, Hacktivisim
December 28, 2016
More security vulnerabilities will appear in the software of Adobe and Apple than in Microsoft's, more attacks on the Internet's infrastructure will occur, and cybersecurity events will stoke international tensions. Those are a few of the predictions for 2017 that security experts have made. Signs of hackers' increased interest in Adobe and Apple started appearing in 2016, Trend Micro noted.
Uber Staff Still Stalking Customers, Claims Suit
December 17, 2016
The controversy over Uber staff using the company's tech to track people's movements was reignited this week when information in a pending lawsuit began circulating in the tech press. Uber employees can pull customer data at will, alleged Ward Spangenberg, the company's former forensic investigator, in a court declaration filed earlier this fall.
Yahoo Suffers Major Data Breach Deja Vu
December 16, 2016
Yahoo has revealed that Net bandits stole data associated with 1 billion of its user accounts -- one of the largest data breaches in Internet history. The theft, which occurred in 2013, is distinct from the theft disclosed earlier this fall, in which 500 million accounts were compromised, Yahoo CISO Bob Lord explained. Stolen data may include names, email addresses, telephone numbers and more.
Microsoft and Intel's Project Evo Ups the PC Game
December 9, 2016
Microsoft and Intel have announced Project Evo, their highly anticipated collaboration to create the next generation of personal computers. The project aims to expand on new advances in AI, mixed reality, advanced security and gaming, Terry Myerson, executive vice president of the Windows and Devices Group at Microsoft, unveiled some of Project Evo's ambitious plans at the WinHEC event in China.
Ransomware Fighters Get New Free Tool
December 7, 2016
Ransomware has become a gold mine for digital criminals. In the first three months of this year, electronic extortionists squeezed $209 million from victims desperate to recover their data after it was scrambled by the malicious software, based on FBI estimates. At that rate, ransomware could funnel as much as $1 billion into criminal coffers this year.
Multinational Effort Halts Malware Avalanche
December 6, 2016
The DoJ on Monday released new details about the multinational takedown of Avalanche, a multimillion-dollar malware and money-laundering network, following a four-year probe led by German police and prosecutors. Assistant Attorney General Leslie R. Caldwell, Acting U.S. Attorney Soo C. Song and Assistant Director Scott S. Smith of the FBI's Cyber Division made the announcement in Pittsburgh.
Gooligan Ransacks More Than 1M Android Accounts
December 2, 2016
More than 1 million Google accounts have been breached by Android malware dubbed "Gooligan," Check Point reported Wednesday. The malware roots infected devices and steals authentication tokens that can be used to access data from various Google apps including Gmail, Google Docs, G Suite and Google Drive. It potentially affects devices running Android 4 and 5.
China's Business-Unfriendly Cybersecurity Stance
November 30, 2016
China's parliament earlier this month passed a law aimed at addressing the country's concerns about hacking and terrorism, which has spiked concerns among foreign businesses and human rights advocates. One interpretation of the new law is that it only codifies China's existing cybersecurity practices. However, 46 global business groups across a variety of industries didn't see it that way.
See More Articles in Security Section >>