How Does Your Website Stack Up? View Mobile/Website Performance Free Today!
Welcome Guest | Sign In
TechNewsWorld.com
IoT Risky Business for Enterprise Networks
February 05, 2015
There were 9 billion Internet of Things units installed at the end of 2013 -- and analysts expect the figure to hit 28 billion by 2020. That's going to make life difficult for IT security admins. A Tripwire survey found that employed consumers who took work home had an average of 11 IoT devices on their home networks, and 24 percent of them had connected at least one of these devices to their enterprise network.
Infected Android Apps From Google Play Affect Millions
February 04, 2015
The malware harbors fake ads that pop up when users unlock their devices, to warn them about nonexistent infections, or that their devices are out of date or have porn. Victims are then asked to take action. If they agree, they are redirected to poisoned Web pages that contain a variety of hazards. Google spokesperson Elizabeth Markman did not confirm how many devices had been hit.
Is It Time to Trash Flash?
February 04, 2015
On Monday, Adobe Flash Player users were hit by a zero-day flaw for the third time in two weeks. The company issued a security advisory for the vulnerability, which it dubbed CVE-2015-0313. The flaw exists in Flash Player 16.0.0.296 and earlier versions on Windows and Macintosh platforms. Successful exploitation could crash the desktop and potentially let hackers take control of it, Adobe warned.
Good and Samsung Partner to Harden Android Security
February 04, 2015
Good Technology on Tuesday announced a merger of its app container and app ecosystem with the Samsung KNOX enterprise security platform for Android. The product merger is aimed at eliminating virus and malware concerns that come with Android adoption in the enterprise. The hardened security for Android targets the OS's deployment with U.S. government and Department of Defense agencies.
Is the FTC Jumping the Gun on IoT Security?
February 03, 2015
For months, the security community has been waving a red flag about how the nascent Internet of Things could become a cyber criminal's paradise. Last week, those admonitions were given some credence when the Federal Trade Commission recommended that the makers of IoT gadgets adopt some "best practices" to protect consumers from potential violations of their privacy and security.
AWS Success Underscores Demand for Cloud Services
February 02, 2015
Despite several highly publicized cloud hacks last year -- including the iCloud and Sony breaches -- the demand for cloud services is skyrocketing. Amazon Web Services grabbed 30 percent of the global cloud infrastructure service market in Q4, Synergy Research reports. AWS grew 51 percent year over year (YoY). Why the mad rush to the cloud? Isn't security an issue any more? And who's buying into the cloud?
China May Write New Rules for US Businesses Selling Tech to Banks
February 02, 2015
A group of organizations representing American businesses last week requested urgent discussion and dialog with China's government. They expressed concern about the possible adoption of a policy to ensure that any Internet and information communications technology products Chinese banks purchase from companies outside of China are secure and controllable.
A Little Dab of Credit Card Data Can ID Customers
February 02, 2015
Credit card users may be dismayed by findings MIT Researchers reported last week in the journal Science: Just four pieces of vague non-identifying information were enough to identify 90 percent of people in a data set of 1.1 million credit card users. When the researchers went to work with three pieces of less vague information, they achieved 94 percent success.
Google Gives WebView the Cold Shoulder
January 30, 2015
Google has decided not to fix vulnerabilities in WebView for Android 4.3 and older, sparking heated discussions among developers. Those versions of WebView run on the WebKit browser. Fixing them "required changes to significant portions of the code and was no longer practical to do so safely," explained Adrian Ludwig, lead engineer for Android security.
Canada Levitates Data from File-Sharing Sites
January 29, 2015
Canada's spy agency, the Communications Security Establishment, has been eavesdropping on 102 free file upload sites, including Sendspace, Rapidshare and Megaupload, which has been shut down. A CSE program called "Levitation" lets analysts access information on 10-15 million uploads and downloads of files from such sites daily, according to documents released by whistle-blower Edward Snowden.
There's a GHOST in Linux's Library
January 28, 2015
Patches for GHOST, a critical vulnerability in glibc, the Linux GNU C Library, now are available through vendor communities for a variety of Linux server and desktop distributions. Qualys earlier this week reported its discovery of GHOST, a vulnerability that allows attackers to remotely take control of an entire system without having any prior knowledge of system credentials.
POS Terminals Rich Vein for Gold-Digging Hackers
January 28, 2015
Hackers are like gold miners. Once they find a rich vein for their malware, they mine it until it's dry. Point-of-sale terminals are such a vein, and it doesn't appear that it's one that's about to run dry any time soon. Following the success of the Target breach in 2013, the hacker underground was quick to rush more POS malware to market.
Businesses Seek Liability Protection for Cybersecurity Disclosures
January 28, 2015
"No foreign nation, no hacker, should be able to shut down our networks, steal our trade secrets, or invade the privacy of American families," President Barack Obama told the U.S. Congress during the State of the Union Address last week. However, hunting down the perpetrators of cyberattacks that compromise national security or disrupt commerce is only going to get more difficult in the future.
Wikileaks Steamed Over Google's Lengthy Silence on FBI Snooping
January 27, 2015
Google may have contributed to violating the First Amendment rights of three journalists working for WikiLeaks two and a half years ago, when it turned over to the FBI all their email, subscriber information and metadata. Google informed the journalists about its actions last month, saying that it had been unable to do so earlier due to a gag order.
Coinbase Bitcoin Exchange Off to a Rocky Start
January 26, 2015
Coinbase on Monday launched Coinbase Exchange, the first regulated bitcoin exchange in the U.S. It got the jump on the upcoming Gemini exchange currently being established by Cameron and Tyler Winkelvoss. The firm debuted in 24 U.S. states, but the launch was bedeviled with problems. Some pages reportedly failed to load completely, and some users had problems with access.
Google to Add Mobile Carrier Hat to Its Collection
January 23, 2015
Google reportedly is planning to set up shop as an MVNO, purchasing bandwidth from Sprint and T-Mobile in order to offer its own wireless service. Details are sparse, but Sprint is said to be putting a volume trigger into its contract that would allow for renegotiation if Google's customer volume should exceed a predefined number. The project, led by Nick Fox reportedly bears the code-name "Nova."
White House Jump-Starts Cybersecurity Protection Programs
January 23, 2015
As members of the U.S. Congress started to prepare for the upcoming legislative session, President Obama lost little time in putting cybersecurity near the top of a to-do list for lawmakers. During a visit to the federal National Cybersecurity Communications Integration Center, Obama called for additional legislation to improve information technology protection.
Businesses Waste Big Bucks Fighting Phantom Cyberattacks
January 21, 2015
Businesses spend an average of $1.27 million a year chasing cyberthreats that turn out to be dead ends. That is one of the findings in a report released last week on the cost of containing malware. In a typical week, an organization can receive nearly 17,000 malware alerts, although only 19 percent of them are considered reliable, the researchers found.
Keeping Score in the Google vs. Microsoft Zero-Day Games
January 20, 2015
Google's recent publication of Windows' vulnerabilities -- two within a week -- predictably raised Microsoft's ire. "Risk is significantly increased by publically announcing information that a cybercriminal could use to orchestrate an attack and assumes those that would take action are made aware of the issue," wrote Chris Betz, Microsoft's senior director of trustworthy computing.
Warning Sony of Coming Storm Wasn't NSA's Department
January 19, 2015
The United States National Security Agency reportedly knew in advance that North Korea was about to hack into Sony's systems. The NSA apparently penetrated North Korea's network through several vectors, including Chinese networks used to connect with the rest of the world and hacker connections in Malaysia. The NSA was able to burrow in using the networks of South Korea and other allies.
Hacking as a Service Hits the Mainstream
January 19, 2015
A fledgling website created last fall connects hackers with clients willing to pay for their services. Nearly 50 hackers have listed their services on Hacker's List so far, for tasks including data recovery, penetration testing and computer forensics. More than 500 hacking jobs reportedly had been out to bid as of last week, with prices ranging from $100 to $5,000.
Verizon's Cookies Never Crumble
January 16, 2015
Verizon advertising partner Turn is using the carrier's Unique Identifier Header, or UIDH, to maintain tracking cookies on smartphones even after privacy-minded users have deleted them, Jonathan Mayer, a computer scientist and lawyer at Stanford University, reported this week. Turn shares the cookies with dozens of major websites and advertising networks.
Cameron Takes Hard Line on Encrypted Communications
January 15, 2015
UK Prime Minister David Cameron, who is standing for re-election, has vowed to ban personal encrypted communications apps such as Snapchat and WhatsApp if he is voted in. He also will allow UK government security agencies to monitor communications, with warrants signed by the Home Secretary. "The first duty of any government is to keep our country and our people safe," Cameron declared.
Docker Security Questioned
January 15, 2015
Security questions recently have been raised about Docker, a promising technology for running applications in the cloud. Docker is an open source initiative that allows applications to be run in containers for flexibility and mobility only dreamt of in the past. "Since the 70s, programmers have been talking about reusable code and the ability to migrate applications," noted IDC analyst Al Gillen.

See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS
Are you looking forward to self-driving cars?
You bet -- I'd love to have a built-in chauffeur.
Yes -- self-driving cars will save lives.
Kind of -- I'd like some self-driving features, like parking.
No -- self-driving cars are too dangerous.
No -- I don't want to give up another freedom.
Absolutely not -- I saw Terminator and I'm not letting some robot take me for a ride!
PENN STATE ONLINE Information Technology Degrees and Certificates