OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
HP, 3M to Shield Laptop Screens From Visual Hacking
October 15, 2015
HP and 3M are collaborating on privacy screens to protect notebook PCs from visual hacking. "3M is developing an innovative light-enhancement film that can be incorporated into a system that enables light to be directed to other viewers when you want information sharing, and away from onlookers when you need private viewing," 3M spokesperson Jessica Walton said.
Mate Makes Robolinux Raptor Soar
October 14, 2015
Robolinux Mate Raptor v8.1 is a stunningly gorgeous and well-tuned operating system that soars with unmatched functionality. This release of the Robolinux line runs the newest iteration of the Gnome 2 fork desktop Mate. It is fast and slick. The integration of Mate as a modern desktop environment is growing on me -- especially the way it's paired with the really cool features in Robolinux.
Apple News Goes Dark in China
October 13, 2015
Apple recently disabled its Apple News app for users in China, according to multiple reports triggered by software developer Larry Salibra's alerts last week. Although Apple is mum on the subject, users based in China have begun complaining on the Internet about the News app being unavailable there. Salibra could not connect to the News app, and he couldn't read previously downloaded content.
Apple's App Yanking Switches On Data Monitoring Red Light
October 12, 2015
Apple last week revealed that it had removed from its App Store several apps with root certificates that could allow data monitoring. The monitoring could compromise SSL and TLS protocols, the company said. It suggested users delete the apps and their associated configuration profiles. However, it did not name the apps users should delete.
User Info Safe After LoopPay Attack, Says Samsung
October 9, 2015
Samsung has assured users that their information is safe following a computer intrusion of a key company linked to its mobile payment system. The intrusion may have occurred as early as March. Samsung purchased LoopPay for $250 million in February. Its technology allows mobile phones to perform payment card transactions with older POS terminals that recognize only cards with magnetic strips.
Verizon Supercookie to Let Advertisers Gorge on Customer Data
October 8, 2015
Verizon has announced it will begin sharing customer data with its AOL Advertising Network, triggering concerns about privacy and customer tracking. AOL will use Verizon's supercookie -- which is difficult to get rid of -- to track users. "This is a huge privacy problem, but carriers have never really cared that much about customer satisfaction," said tech analyst Rob Enderle.
Canonical Plays With Internet of Toys Idea
October 7, 2015
Canonical last week announced plans to launch the Internet of Toys, an open source initiative calling on toy makers, hackers, Internet of Things fans and innovators to build the next generation of Web-accessing toys. Participants will build the next generation of toys around open source tools such as Cylon JS, Gobot, Snappy Ubuntu Core, Snapcraft, ROS and Erle-Spider.
DDoS Attacks Create Smokescreens for Larceny
October 7, 2015
DDoS attacks have evolved from protest tool to criminal weapon. More than one in three DDoS attacks are used to plant malware or a virus on company systems, and 40 percent of them result in data theft, according to NeuStar's semiannual DDoS attack and protection report. "Until two years ago, DDoS attacks were really seen as just a disruption and annoyance tool," said NeuStar's Joe Loveless.
EU Data Transfer Ruling Leaves Tech Companies in Quandary
October 6, 2015
Europe's highest court has ruled that a 15-year-old agreement regulating electronic data transfers with the U.S. was invalid, potentially striking a blow to thousands of U.S. technology companies that rely on a uniform legal standard do business overseas. The European Court of Justice ruled that the U.S. Safe Harbor agreement was inadequate to protect the privacy rights of ordinary citizens.
Federal Cybersecurity Performance Gets Mixed Reviews
October 6, 2015
The spectacular database breach that affected nearly 21 million people highlighted the continuing vulnerability of U.S. government information technology systems, despite the expenditure of billions each year on cybersecurity. The breach resulted in the departure of the head of the agency and triggered widespread questioning about the adequacy of federal IT security by members of Congress.
Another Day, Another Billion Android Users at Risk
October 5, 2015
Google on Monday released an over-the-air update for Nexus devices, which includes patches for the latest Stagefright vulnerabilities and other flaws. Android's Stagefright media processing feature, which recently imperiled 1 billion devices around the world, was once again putting them at risk, Zimperium revealed last week. Zimperium found two new vulnerabilities.
XOR Trojan Threatens Linux Networks
October 2, 2015
Researchers for the Security Intelligence Response Team at Akamai on Tuesday issued a high-risk threat advisory for XOR DDoS proliferation. The XOR DDoS Trojan is used to hijack Linux servers to build a botnet for distributed denial-of-service attacks with SYN and DNS floods, researchers tracking the malware said. The massive Linux-based botnet can take down websites under a flood of DDoS traffic.
Apple Trumpets New Privacy Policy
October 1, 2015
Apple has updated its privacy policy with new information regarding features in iOS 9 and OS X El Capitan. The company attempts to set itself apart from rivals by noting that it doesn't build profiles about its customers to sell to advertisers. For example, unlike Google Maps, which tracks a user's journey end to end, Apple Maps separates data about users' trips into segments that are not linked.
Black Hats Offer Million-Dollar iOS 9 Bug Bounty
September 30, 2015
Zerodium has posted a million-dollar bounty for juicy iOS 9 bugs or jailbreaks. Zerodium runs a market where exploits and vulnerabilities are bought and sold, according to Damballa. "While there is no insight into a specific buyer, we can assume if an exploit for iOS 9 is found, Zerodium will sell it for way more than $1 million," wrote Loucif Kharouni, senior threat researcher at Damballa.
BlackBerry Sees the Android Light
September 28, 2015
BlackBerry on Friday announced that it would introduce an Android smartphone later this year. The announcement came during the company's Q2 earnings call. The device will be known as the "Priv" and will be built around user privacy, said CEO John Chen. BlackBerry didn't offer any specifics about the Priv beyond the name -- nothing about pricing, U.S. carrier partners or any handset specs.
Two Risky Strategies Could Threaten Apple's Long-Term Survival
September 28, 2015
One of the ironies of my career is that when I first went to work for a tech company, I specifically wanted to work for a firm that was breaking the mold -- not representative of it. So, in my initial interview, I was concerned that IBM was going to buy the firm because it was the mold at that time. I was promised that there was a contract that said it couldn't. Then, six months later, it did.
Lockscreen Bug Fix Conspicuously Absent in iOS 9 Update
September 25, 2015
Apple has released the first update to its new iOS 9 operating system to clean up some bugs in the original version of the software. Bugs addressed in the update, iOS 9.0.1, include a system freeze on the slide to update screen, alarms and timers that would fail to go off, and frame distortion in paused videos. One bug Apple didn't address allows an intruder to bypass a device's lockscreen.
OPM's Latest Bad News: 5.6 Million Fingerprints Lifted
September 25, 2015
The Office of Personnel Management on Wednesday revealed that the hackers who penetrated its records system stole 5.6 million fingerprints of federal employees -- five times the 1.1 million originally reported. The cyberattack, which came to light this spring, compromised the Social Security numbers and other sensitive information of 21.5 million people.
Eternal Sunshine of the Spotless Timeline
September 24, 2015
That trip down memory lane may never be the same. Those who feel their Facebook Timeline leaves out any important moments in their lives can call up Google Maps' Timeline to fill in the blanks. With tech tools like these, who needs enemies? There may be some things you'd rather not remember -- and there probably definitely are things in your past that you'd rather others didn't know.
What Goes Around Comes Around: Russia Gets Hacked
September 23, 2015
Russia has been a prime suspect in recent cyberattacks against U.S. government targets. However, Russia has been poked with the other end of the hacker stick. For more than two months, hacker attacks originating in China have bedeviled Russia's military and telecom sectors, Proofpoint researchers have revealed. Russian-speaking analysts working at global financial firms also have been attacked.
Feds Award $500M Credit-Monitoring Contract Following OPM Breach
September 23, 2015
The U.S. government spends millions of dollars on IT systems designed to prevent cybersecurity attacks, but they still occur. Government agencies are hopeful that the learning curve will improve dramatically, and breaches will be reduced. In the meantime, what happens to people affected by a breach after an attack succeeds? This year, the OPM was hit with one of the biggest hack attacks ever.
Exploding Chip Could Thwart Cyberthieves
September 22, 2015
Researchers at Xerox PARC have developed a self-destructing mechanism for microchips embedded on a hardened glass surface. The glass can self-destruct upon command and could be used to secure personal data such as health and banking records. It also can be used to destroy encryption keys stored on memory chips in standard consumer, enterprise and government electronic devices.
Malware Jumps Apple's Garden Wall
September 22, 2015
Developers who unknowingly used a malicious tool to code their programs uploaded hundreds of malware-infected apps to the iTunes App Store, China-based iOS developers reportedly discovered last week. Security researchers around the world have analyzed it. Called "XcodeGhost," the malware is hidden in an unauthorized version of a program Apple distributes to create iOS apps.
Tests, Lies and Volkswagen
September 21, 2015
German automaker Volkswagen on Sunday admitted that it installed software that doctored the pollution tests for diesel vehicles sold in the United States. Volkswagen stock, which is listed in Europe, fell more than 20 percent Monday morning on the announcement. The company apparently was concerned that meeting the federal emissions standards would require it to degrade the vehicles' engines.
Patched Android Lockscreen Still a Threat
September 21, 2015
Google recently issued a patch for Nexus mobile devices to fix an Android Lollipop vulnerability that lets hackers bypass the lockscreen and gain control of mobile devices. However, it could take weeks to months for manufacturers and service providers to roll out the patch for other Android devices. University of Texas security researcher John Gordon discovered the vulnerability.
Will the IoT Be Held for Ransom?
September 17, 2015
A perfect cybercrime storm is brewing, and two of the main ingredients are ransomware and the Internet of Things. Cybercrime has become an industry with all the operational trappings of any legitimate sector, McAfee Labs noted earlier this month. It has its own supply chain, market segments, service providers, and finance and trading systems. It has its own business models.
IoT Can Open Doors to Cybercriminals, FBI Warns
September 16, 2015
The FBI has warned businesses and consumers to be careful when deploying devices that connect to the Internet of Things. As more companies and consumers use IoT devices to improve efficiency and convenience, their connection to the Internet creates opportunities for cybercriminals, the FBI said. The "Internet of Things" is a broad term that encompasses myriad devices that connect via cyberspace.
Court Bolsters FTC's Authority to Regulate Cybersecurity
September 16, 2015
Companies that experience data security breaches have a lot to worry about -- but their problems encompass much more than responding to irate consumers. The business community also has to worry about the U.S. government, which can penalize e-commerce companies for failing to provide adequate protection for consumers' personal data. A recent federal court ruling could give the FTC more muscle.
Hackers Home in on Health, Education, Government Sectors
September 16, 2015
A New York healthcare provider, California's higher education system and the Department of Energy have become the latest targets of data bandits. The latest massive data breach at a healthcare provider reportedly took place at Excellus BlueCross BlueShield, which last week revealed that the personal data of more than 10 million people was at risk due to an attack that dates back to December 2013.
Netflix Move Prompts Premature Antivirus Software Obit
September 11, 2015
Netflix reportedly is in the process of dumping its antivirus software and placing all its faith in an alternative solution to protect its more than 60 million subscribers from online nastiness, a move that prompted one pundit to pronounce the death of antivirus software yet again. Such dire pronouncements have been made for years, and they're likely to be made for many years to come.
See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS
Should social media sites be held accountable for terrorists' communications?
Yes -- They are providing a platform to facilitate murder and mayhem.
Yes -- Everything must be done to protect society from danger.
Maybe -- I'm not sure they have the technological capability to stop them.
Maybe -- I'm not convinced terrorists are using them for serious plotting.
No -- Authorities should monitor social networks to gather intelligence.
No -- Social networks are no different than phone carriers or mail services.