5 Steps to Cost-Effectively Manage eCommerce Fraud This Holiday Season *Free Guide*
Welcome Guest | Sign In
TechNewsWorld.com
'Data Divination: Big Data Strategies' Is a Great Hip-Pocket Tool
October 02, 2014
Most of today's books about Big Data delve into highly technical tools, cloud technology, and high-level computer-assisted math calculations and algorithms. For most people in the business world, this is far from motivating readers to appreciate just what Big Data does and how to let it get you there. However, that's not so with Data Divination: Big Data Strategies by Pam Baker.
Darkcoin Steps Out of the Shadows
October 01, 2014
Darkcoin has exited beta and is now ready for mainstream use. Also, the software's code is now open source. Darkcoin is the first fully open source cryptocurrency with financial privacy built directly into the software, its developers claimed. Open-sourcing financial software is vitally important, they said, because it instills confidence that users' financial privacy is protected.
Consumers Fed Up With Data Breaches
September 30, 2014
Consumers are beginning to lose their patience with the custodians of their personal information. Survey results from 2,000 consumers released last week by HyTrust, suggest that 51 percent of those polled would bolt from any business involved in a data breach that compromised personal information such as address, Social Security number or credit card details.
Banks, Businesses Scramble to Smash Bash Shellshock Bug
September 29, 2014
Banks and businesses toiled over the weekend to crush a bug in a widely used open source operating system. The flaw has been in Unix for some 25 years, but it was revealed just last week. If exploited, the vulnerability could be used to inject malicious code or take command of a system or device. Dubbed "Shellshock," it requires patching systems and devices running Apple's OS X, Linux and Unix.
FBI Director Comey Gives Apple and Google a Tongue-Lashing
September 26, 2014
FBI Director James Comey on Thursday strongly criticized Apple and Google for hardening information stored in smartphones by encrypting data, making it inaccessible to law enforcement even with a court order. The FBI has had conversations with both Apple and Google over the encryption features, Comey said, although he personally was not involved in those talks.
Bash Shellshock Bug Patched but Not Pummeled
September 25, 2014
Researchers on Thursday discovered proof-of-concept code that could take advantage of unpatched computer systems, and found evidence of attacks exploiting the BASH Shellshock bug in the wild. Shellshock, which came to light on Wednesday, could become a major threat to Linux/Unix and Apple operating systems if published patches to BASH are not applied before an attacker cashes in.
Self-Driving Car Security: No Room for Error
September 25, 2014
Walk into any electronics store and you will find antivirus software from companies like Norton, ESET, McAfee and Kaspersky. In the last few years, the risk has spread from our computers to our smartphones and our tablets. The next thing we will have to protect may be our cars -- and our lives could depend on it. We used to think the computer was the only device that needed virus protection.
Banking Trojan Targets Petrochemical Outfits
September 23, 2014
The pernicious program Citadel has been around for awhile, but it's using some new tricks on new targets. From its humble origins as a "man in the browser" thief of banking credentials, Citadel has become a knave of all trades. Once it lands on a computer, it can be configured in a number of ways with a file from a server operated by Web predators.
Phishing Scam Ensnares eBay Shoppers
September 23, 2014
Attackers for months have been using eBay listings to redirect visitors to password-harvesting scam sites. They use cross-site scripting to hijack shoppers and trick them into handing over personal data. Smartphones, televisions, hot tubs and clothing are among the items supposedly for sale in listings infected with malicious Javascript code. eBay reportedly has been slow to address the issue.
Home Depot Gives 56 Million Customers a Heads Up
September 19, 2014
Home Depot on Thursday said it had excised the malware demon from its computerized payment system after its recent discovery of a security breach in which thieves stole records of 56 million credit cards. Home Depot stopped short of admitting that an ongoing security upgrade may have contributed to the breach. Efforts to harden the system with enhanced encryption are under way.
Android L Will Keep Your Secrets Safer
September 19, 2014
Hard on the heels of increased security measures in Apple's newly released iOS 8, Google this week confirmed that encryption will be turned on by default in the next release of Android. Android has offered encryption for more than three years, and keys are not stored off the device, so they can't be shared with law enforcement, Google said. In Android L, encryption will be enabled by default.
Apple Fills iOS 8 Security Basket to Brim
September 19, 2014
With data thefts and cybersnooping making headlines daily, security has started to capture the attention of the disciples of the digital lifestyle -- and if the latest version of iOS is any indication, it's catching the attention of Apple, too. Along with nifty features like Hand Off and Family Sharing, iOS 8 contains a number of significant security and privacy enhancements.
Web-Surfing Adults More Infection-Prone Than Teens
September 16, 2014
American teens spend a lot more time online than older Web surfers, yet it doesn't seem to increase their vulnerability to malicious activity. Teens last year spent a little more than four hours a day on the Net, while adults in the 50-to-64 age bracket burned two hours, 41 minutes online daily, MarketingCharts found. Those numbers piqued the interest of Enigma Software.
XSS Flaw Burns a Hole in Kindle Security
September 16, 2014
Security consultant Benjamin Mussler last week warned that the Kindle e-book library had a cross-site scripting vulnerability. It appears Amazon previously had fixed the XSS flaw but two months ago reintroduced it in a new version of the "Manage Your Kindle" Web application, according to Mussler. People who download pirated e-books are at greatest risk, he said.
Feds Wielded Baseball Bat to Win Yahoo's NSA Cooperation
September 12, 2014
The Obama administration threatened Yahoo with fines of $250,000 daily if it wouldn't comply with demands to hand over user information to the NSA, Yahoo has disclosed. Yahoo had filed suit against the demands in 2007, citing the Fourth Amendment. "They basically said you must do this thing that you don't want to do or we'll put you out of business," said ITIF's Daniel Castro.
DoD Ramps Up Security as It Drifts Toward Cloud
September 12, 2014
DoD is committed to pursuing cloud-based services and steadily has been improving its capabilities to utilize the technology. The latest evidence of its embracing the cloud is approval of a protocol that will facilitate the use of the technology at higher security levels. DISA has granted provisional authorization for the use of cloud services to levels 3 to 5 of its Cloud Security Model.
Apple Pay Could Slam Door on Data Thieves
September 11, 2014
Despite the efforts of some big name tech players, consumers have been reluctant to turn their smartphones into wallets. That could be about to change with Apple Pay. Apple Pay is the new mobile payment system Apple introduced with its iPhone 6 and 6 Plus earlier this week. "Apple being Apple is going to change the game," said Christopher Budd, threat communications manager at Trend Micro.
If Google Were French
September 11, 2014
Europeans are relentlessly attacking Google: A German official called for its breakup, a French minister charged it was a threat to sovereignty, and a publisher compared it to a dragon, according to a report. Really? I would have thought the euro and the draconian austerity program needed to keep it functioning threatened sovereignty more than Google.
Millions of Gmail Users Victims of Latest Password Heist
September 11, 2014
About 5 million Gmail usernames and passwords have been published on a Russian bitcoin security forum as a text file. Sixty percent of the 4.93 million credentials in the file were valid, claimed the poster, who used the online handle "tvskit." The information reportedly was dumped on several Russian cybercrime forums and shared through a variety of peer-to-peer services.
IBM Enlists Intel to Shore Up Hybrid Cloud
September 10, 2014
Despite the growing momentum behind cloud computing in recent times, security concerns have been a drag on adoption. IBM sought to reduce that resistance by announcing on Monday that it would start using Intel chip technology to better secure its SoftLayer cloud platform. The Intel technology can be especially reassuring to enterprises running hybrid clouds.
Salesforce Issues Dyre Warning
September 10, 2014
Salesforce.com this week notified its customers that the Dyre malware, which typically targets customers of large financial institutions, might have been tweaked to target some Salesforce users as well. There was no evidence that any Salesforce customers had been impacted, the company said, but if any customer should be affected, it would provide guidance.
Comcast Ad Tinkering Could Muck Up WiFi Security
September 10, 2014
Comcast has begun using JavaScript injection to serve ads for its services to devices connected to its publicly accessible Xfinity WiFi hotspots across the U.S. The ads are fleeting, but they can appear roughly every seven minutes. The program reportedly began months ago. "This practice is definitely concerning for multiple reasons," said the Electronic Freedom Foundation's Jeremy Gillula.
Botnet Twists the Knife in iCloud Security
September 10, 2014
Hot on the heels of hackers stealing celebrities' nude photos from their iCloud accounts and posting them on the Web comes news that iCloud users are being targeted again. The Kelihos botnet is sending emails purporting to be from Apple, informing targets they have purchased a film through their iTunes account using a PC or other device not previously linked to their Apple ID.
The Dark Side of BYOD
September 09, 2014
The BYOD trend offers pluses for both employers and employees, but sometimes there's a hitch. Under certain circumstances, the owner of a device suddenly might lose all of the data stored on it. Clients of Fiberlink remotely wiped 81,000 mobile devices between January and June. About 30,000 of them, or 37 percent, were cleaned of everything -- including personal data.

See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS