OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
TechNewsWorld.com
PENN STATE ONLINE Information Technology Degrees and Certificates
How Secure Is the Apple Watch?
March 19, 2015
Apple typically has impeccable timing for its new product introductions, but that may not be the case with its new smartwatch. In a gala event last week, the company announced model and pricing details -- but that came just six days after questions were raised about the security of Apple Pay. Those questions haven't gone away, and now they're also being asked about the Apple Watch.
Windows Hello Waves Off Passwords
March 18, 2015
Microsoft on Tuesday announced Windows Hello, a feature that allows users to access computers and devices running Windows 10 via face recognition, iris identification or fingerprint matching. In addition, the company raised the curtain on Microsoft Passport, a programming system that IT managers, software developers and website authors can use for signing in to websites and applications.
Talking Barbie Says Hello, Parents Say Goodbye
March 18, 2015
It's not so much Hello Barbie's talking -- it's her listening that has parents up in arms. Here's how Hello Barbie works: A kid presses on the doll's belt buckle and speaks into a microphone in the doll's necklace. An AI system processes and analyzes that speech in the cloud. Responses are then streamed back to the doll, who replies to the kid -- all over a secure WiFi connection to the Internet.
New Facebook Marketing Tool Chews Up Data, Spits It Out
March 17, 2015
Facebook has launched Topic Data, a new service that reveals to advertisers the subjects users discuss, the products they use, and the activities they follow. Marketers will be able to sift through data compilations of what users say about events, brands, subjects and activities. Data on all of Facebook's 1.3 billion users will be used -- anonymized and aggregated to protect their identities.
BlackBerry, IBM, Samsung Come Together on High-Price, High-Security Tablet
March 17, 2015
BlackBerry subsidiary Secusmart on Monday introduced the SecuTablet, a high-security tablet based on the Samsung Galaxy Tab S 10.5, at the CeBIT 2015 trade show in Dusseldorf, Germany. Developed in collaboration with IBM, the tablet targets national and international public sector markets and enterprises. IBM provided the secure app wrapping technology.
Survey: Surveillance Is Fine as Long as It's Not on Me
March 16, 2015
Growing concern over privacy in cyberspace has people changing their online behavior. Nearly 90 percent of 475 adults recently surveyed said they were aware of government surveillance programs targeting Internet users, the Pew Research Center found. Large numbers of adults supported monitoring programs aimed at others -- from terrorists to political leaders -- but opposed spying on U.S. citizens.
No Need to Waste Brain Space on Yahoo Passwords
March 16, 2015
The way to permanently cure someone's headache is to cut off their head, and that appears to be the principle Yahoo has adopted with a new security policy announced Sunday. Users of Yahoo Mail no longer have to rack their brains to remember passwords, said Chris Stoner, director of product management. Instead, they can opt for on-demand passwords after signing in to their Yahoo.com account.
Lawsuit Challenges NSA Internet Dragnets
March 13, 2015
The ACLU earlier this week filed a lawsuit seeking to stop the NSA from indiscriminately snooping on U.S. Internet traffic. Using a technique called "upstream" surveillance, the NSA does a spinal tap of the Internet's U.S. backbone, which carries the communications of millions of Americans, the ACLU explained in its complaint filed with a federal district court in Maryland.
Apple's Researchkit Could Be Gold Mine for Hackers
March 13, 2015
Apple earlier this week announced ResearchKit, an open source framework that will let medical and health researchers gather data through iPhone apps. ResearchKit will be released in April. Apps to monitor asthma patients and for studies on breast cancer survivors, cardiovascular health and Parkinson's Disease, already have been developed using ResearchKit.
The CIA Has Been Hacking iOS for Years: Report
March 12, 2015
The CIA for years has been working to break iOS security, according to a report published Tuesday. The allegations are based on documents provided by NSA whistle-blower Edward Snowden. Researchers working with the CIA have presented their tactics and achievements at Trusted Computing Base Jamborees, secret annual gatherings that have been going on for nearly a decade.
Security Experts Rap Clinton's Email Practices
March 11, 2015
Former Secretary of State Hillary Clinton is in hot water over her use of a private email server to handle emails for official business. The practice was very risky cybersecurity behavior for everyone involved, critics have alleged. In taking her mail outside the State Department's systems, Clinton appears to have turned up her nose at the agency's rules.
Schumer to FAA: Straighten Up Cybersecurity and Fly Right
March 10, 2015
The United States Federal Aviation Administration should implement cybersecurity upgrades recommended by the U.S. Government Accountability Office immediately, or risk hackers taking over its computer systems, Sen. Charles Schumer, D-N.Y., has warned. The GAO last week released a report that found significant security control weaknesses in the FAA's computer systems.
RHEL 7 Atomic Host Bolsters Container Security
March 9, 2015
Red Hat last week made Red Hat Enterprise Linux 7 Atomic Host generally available, following a four-month live beta test. "The beta release was very successful," said Lars Herrmann, senior director of product strategy at Red Hat. Feedback from customers and partners "helped us refine several features and tools" for the GA version. Atomic Host is a lean OS designed to run Docker containers.
Mobile Wallets as Credit Card Killers
March 9, 2015
Years have spent trying to oust the credit card as the ultimate payment method. Publications and pundits have been quick to hail new technologies as "credit card-killers," and they're not without justification. The credit card has lost whatever futuristic luster it may have once had. Magnetic stripes wear out, plastic snaps in half, and the incessant manual inputting of 16-digit numbers becomes tiresome.
Windows Caught in Path of FREAK Security Storm
March 6, 2015
Microsoft on Thursday issued a security advisory acknowledging a vulnerability in all versions of Windows that could allow FREAK exploits. Windows systems previously were thought to be immune to FREAK attacks. "The vulnerability could allow an attacker to force the downgrading of the cipher suites used in an SSL/TLS connection on a Windows client system," the advisory reads.
Bracing for the Cyberthreat Deluge
March 6, 2015
Almost 17,000 malware alerts surface every week, the Ponemon Institute recently found. Only 4 percent of alerts were investigated, and traditional antivirus products missed nearly 70 percent of malware in the first hour, researchers discovered in a recent Damballa study. Rescanning led to identification of 66 percent of the malware in 24 hours and 72 percent after seven days.
China's Cybersecurity Plans Draw US Fire
March 5, 2015
China should change its tune on new rules for purchases from American high-tech companies if it wants to do business with the United States, President Obama recently warned. China reportedly is planning to ask U.S. high-tech firms to hand over their encryption keys and install security backdoors in their systems to allow surveillance as a counterterrorism measure.
Apple Pay Cybercrime Burns Banks
March 4, 2015
Identity thieves are using Apple Pay to defraud banks of what could amount to millions of dollars. Due to weak authentication procedures at the institutions issuing the cards, fraudsters are able to use stolen cards to make purchases through Apple Pay. Before cards can be added to Apple Pay, they must be approved by the card issuer. Criminals are finding that process easy to game.
BlackBerry Makes a Leap in the Dark
March 4, 2015
BlackBerry introduced its new Leap smartphone at the Mobile World Congress in Barcelona, Spain. Equipped with a touchscreen rather than a physical keyboard, the Leap is a successor to BlackBerry's Z3 model. Its enhanced security and performance features are designed to appeal to young professionals and startup companies. BlackBerry is counting on the Leap to help it bounce back.
Twitter's New Safety Rules: Hot Diggity or Hot Air?
March 3, 2015
Twitter has announced actions to further protect users of its network -- but it left them vague. The company is rolling out unspecified improvements to its reporting process for content issues including impersonation, self-harm, and the sharing of private and confidential information, aka "doxing." It's also beginning to add new enforcement actions for use against accounts that violate its rules.
Monster Problem Threatens New US Cyberthreat Plan
March 3, 2015
President Barack Obama last week made good on his promise to establish a center for cybersecurity information gathered by agencies of the federal government. It's a laudable initiative -- if it works. The Cyber Threat Intelligence Integration Center will connect the dots regarding malicious foreign cyberthreats to the nation and cyberincidents affecting U.S. national interests.
Government Spies Came Up Dry, Says Gemalto
February 26, 2015
SIM card maker Gemalto, whose networks reportedly were breached by hackers from the United States National Security Agency and the UK's GCHQ, on Wednesday said the spies got nothing. The hackers stole cryptokeys for millions of SIM cards, according to The Intercept, which cited documents released by NSA whistle-blower Edward Snowden. Gemalto denied any SIM cryptokeys had been stolen.
Malicious Emailers Find Healthcare Firms Juicy Prey
February 26, 2015
Healthcare providers have garnered growing interest from hackers in recent months. More evidence of that trend appeared last week in a report on email trust. An email that appeared to come from a healthcare company was four times more likely to be fraudulent than an email purportedly from a social media company like Facebook, one of the largest creators of email on the Internet, Agari found.
Yahoo CISO, NSA Chief Slug It Out Over Security Backdoors
February 25, 2015
Yahoo CISO Alex Stamos on Monday confronted NSA Director Adm. Mike Rogers over the United States government's plan to require built-in backdoors in hardware and software made by American companies. The exchange took place at the New America Foundation's cybersecurity conference. Building backdoors into cryptography is "like drilling a hole in the windshield," Stamos said.

See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS
Is native advertising good for journalism?
Yes -- It's a reasonable source of additional revenue for media outlets to support their traditional editorial efforts.
Yes -- Paid-for articles can contain useful information, but readers might bypass them if they look too much like ads.
Maybe -- But only if it's clearly labeled as paid-for content.
No -- I don't trust any information from media outlets that cloak paid-for content as objective journalism.
No -- Native advertising is confusing and devious, and it threatens the fabric of traditional journalism.
I Don't Know -- I don't understand what native advertising is.
PENN STATE ONLINE Information Technology Degrees and Certificates