OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
TechNewsWorld.com
No Cellphone Search Without Warrant, Supreme Court Rules
June 26, 2014
Police need a warrant to search the cellphone contents of people they have arrested, the United States Supreme Court ruled Wednesday. Warrantless searches, in essence, would impact privacy to a far greater extent than is acceptable. The ruling also applies to individuals stopped for questioning by the authorities, said Jake LaPerruque of the Center for Democracy and Technology.
Card Fraud Hits 1 in 4 Consumers Worldwide: Report
June 25, 2014
As many as a quarter of the world's consumers were victimized by card fraud in the past five years, and financial institutions are losing customers as a result, suggests a new study. ACI Worldwide and the Aite Group, which jointly surveyed more than 6,100 customers in 20 countries, found that 23 percent of consumers hit by card fraud changed financial institutions because they were dissatisfied.
To Pay or Not to Pay - That's the Ransomware Question
June 24, 2014
Ransomware is a growing problem for consumers and businesses alike. In Symantec's most recent quarterly security report, the company's researchers found all targeted attacks -- including ransomware -- grew 91 percent year-over-year. That's raising a big question for those targeted by cyberextortionists: Should the ransom be paid? Security experts generally say no, but some insert a caveat or two.
Heartbleed Flaw Goes Unpatched on 300K Servers: Report
June 23, 2014
Two months after the Heartbleed vulnerability sent frissons of fear down the spines of IT managers everywhere, 300,000 servers still remain vulnerable, Errata Security said. When the flaw was announced in April, Errata found 600,000 servers vulnerable. "The norm is to do no patches at all for some systems, no matter how easy it is to patch," said Errata CEO Robert Graham.
White House Tilts Toward Public-Private Cybersecurity Cooperation
June 23, 2014
The Obama administration and the private sector -- often at odds over the regulation of everything from telecom issues to software protection to the environment -- apparently agree that a major issue dealing with cybersecurity should be addressed on a cooperative basis, largely free of federal regulation. The White House recently signaled its tilt toward a cooperative and voluntary approach.
Researchers Find Android Security on Par With iOS
June 18, 2014
The open source mobile operating system Android long has been considered by security experts to be the mobile OS most vulnerable to security threats, but iOS is just as vulnerable. However, the two OSes expose users to different types of threats. The perceived greater security of iOS rests on Apple's control of app distribution rather than on any inherent superiority of the OS over Android.
BlackBerry Unveils BBM Protected to, Ahem, Protect Market Share
June 18, 2014
BlackBerry, whose share of the mobile phone market has been on a downward spiral, this week launched BBM Protected, the first in its planned eBBM Suite of secure enterprise-class messaging products. BBM Protected targets regulated industries. It's claimed to be the only secure mobile instant messaging app that uses a FIPS 140-2 validated cryptographic library.
Godzilla Foreshadows Trouble for Internet of Things
June 16, 2014
The Internet of Things has come under attack by pranksters in recent days. The events could signal tumultuous things to come as more and more everyday objects connect to the Internet. Homeland Security has advised the customers of digital sign maker Daktronics to "take defensive measures" following a series of cyberpranks on the company's traffic signs.
Project Galileo Offers DDoS Protection for Free Expression Online
June 13, 2014
CloudFlare on Thursday announced the launch of Project Galileo, a service designed to provide enterprise-grade protection against distributed denial of service attacks free of charge to certain sites, with the goal of protecting freedom of expression on the Internet. CloudFlare is working with a number of partners to identify at-risk sites that qualify.
Microsoft Pushes Back Against US Data Warrant
June 12, 2014
The latest court ruling in an ongoing battle between Microsoft and demands from the United States government for data about one of the company's users, seems to have a lot of folks running for cover. In 2013, U.S. Magistrate Judge James Francis issued a search warrant requiring Microsoft to turn over all date pertaining to the subscriber, hosted on a server in Ireland, to the U.S. authorities.
5 Myths of Virtualization Security: You May Be More Vulnerable Than You Think
June 11, 2014
Businesses increasingly are relying on virtual machines to handle more critical data and tasks than ever before. The reality is that virtualization is growing as a platform for managing customer data, financial transactions and the applications that businesses use. Simply put, virtualization is a core component of today's mission-critical IT infrastructure.
Cupid Fires Arrow at OpenSSL's Heart
June 10, 2014
As if the discovery of the Heartbleed flaw weren't enough woe for OpenSSL, more than half a dozen additional defects have been discovered in the code used to protect communication on the Web. Among them is one dubbed "Cupid" by its discoverers. The flaw can be used to compromise enterprise networks. Like Heartbleed, Cupid uses a malicious heartbeat packet to compromise a TLS connection.
Free Speech vs. Internet Privacy and the 'Right to Be Forgotten'
June 10, 2014
The conventional wisdom of the Internet is that everything posted, whether on social media, a website or anywhere else, will be on the Internet forever. That conventional wisdom was just challenged successfully in a recent ruling handed down by the EU's highest court. A new conventional wisdom may arise from that ruling -- that we have a "right to be forgotten."
Open Source Persistence: Resistance Is Futile
June 09, 2014
Software developers routinely use open source components to boost productivity and improve the quality of their code. The problem for enterprises is that companies using open source must properly manage it and comply with its licensing, as with any third-party code. That becomes difficult to do when corporate leaders do not know their computer systems are running open source code.
Why Mobile Providers Will Have to Give a Little on Privacy
June 06, 2014
Apple has tossed out some hints that its App Store may soon accept apps that handle digital currencies such as bitcoin. Though there are many possible reasons for the move, one stands out: PornHub last month released an analysis of its 38 million daily visitors, which included the interesting observation that more than half were using mobile devices like tablets and smartphones.
Google Releases Email Encryption Tool Alpha
June 06, 2014
Google this week released the alpha version of source code for End-to-End, a Chrome browser extension that encrypts email. End-to-End uses the OpenPGP standard to encrypt, decrypt, digitally sign and verify signed messages within the browser. "We're just sharing the code today so that the community can test and evaluate it, helping us make sure that it's as secure as it needs to be," Google said.
US-Led Posse Scatters GameOver Zeus Botnet
June 04, 2014
A worldwide operation led by the U.S. involving law enforcement, private sector cybersecurity firms and software vendors has disrupted the GameOver Zeus botnet for now. The U.S. also has filed criminal charges in Pittsburgh, Penn., and Omaha, Neb., against Russian national Evgeniy Mikhailovich Bogachev, and has charged a number of other suspects in the Russian Federation and the Ukraine.
Spammers Quick to Exploit eBay Breach
June 03, 2014
If you're a spammer, big news like the recent breach of eBay's computers is like striking oil in your back yard. Spammers live for headline-grabbing events that they can use to separate gullible Web wanderers from their money, so the eBay breach is a perfect vehicle for a scam. In this case, they try to convince recipients their eBay credentials could be used to give them a criminal record.
TrueCrypt's Mysterious Vanishing Act
June 02, 2014
Anyone would be distressed to discover the disappearance of a favorite piece of software, but when the software in question was open source and endorsed by Edward Snowden -- and when the developer's site begins offering instructions for migrating to a Microsoft product instead -- alarm bells are sure to begin ringing throughout the FOSS world. That, sure enough, is just what's been going on.
Heartbleed-Weary Tech Firms Show OpenSSL a Little Love
May 30, 2014
Remember Heartbleed? Several weeks ago, the exposure of this security bug chilled the Internet, highlighting once again that even the seemingly unbreakable can be hacked. In the case of the Heartbleed vulnerability, encrypted data was at risk of theft. Sites potentially vulnerable to Heartbleed -- from Canada's Revenue Agency to AWS to Yahoo to Reddit -- urged users to change their passwords.
Iranians Caught Cyber Snooping on High-Value US Targets
May 29, 2014
A cyberespionage campaign with links to Iran for at least three years has been targeting U.S. military and congressional personnel, journalists and diplomats, as well as U.S. and Israeli defense contractors and members of the U.S./Israel lobby, according to a report released Thursday by iSight Partners. The spy ring used more than a dozen phony identities on online social networks.
Getting Away With Privacy Murder
May 29, 2014
Snapchat in May agreed to implement a comprehensive privacy program and be audited for the next 20 years to settle U.S. Federal Trade Commission charges that it had, among other things, lied to users when it said messages sent through its service would be erased after a designated period of time. However, Snapchat's privacy violation is infinitesimally small compared to some others.

See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS