Explore Newsletters from ECT News Network » View Samples | Subscribe
Welcome Guest | Sign In
TechNewsWorld.com
Women in Tech
Grabbing the Cybersecurity and Privacy Problems by the Horns: ECT News Roundtable, Episode 3
January 23, 2020
Cybersecurity and privacy threats aren't confined to the tech world. They've cast their pall on the world in general. Computer viruses, malware and data leaks have become commonplace, personal privacy has become a bad joke, and cyberwar looms like a virtual mushroom cloud. What sometimes gets lost in the gloom are the many ways security professionals have been working to shore up cyberdefenses.
Report: FBI Got Apple to Roll Over on iCloud Encryption
January 23, 2020
Apple shelved plans to give iPhone users control over encrypted backups stored on the company's iCloud service over concerns raised by the FBI and internal sources, according to a report. The company made the decision to retain control over iCloud encryption around two years ago, but it came to light just recently. The plan would have removed Apple's ability to decrypt users' backups.
Is Congress Finally Ready to Take On Cybersecurity?
January 23, 2020
The United States Congress made some significant progress this session when it comes to data privacy, but cybersecurity remains a blind spot for lawmakers. Congress currently is considering a national privacy law that mirrors legislation enacted in the European Union. It would allow people to access, correct and request the deletion of the personal information collected from them.
Google CEO Adds His Voice to AI Regulation Debate
January 21, 2020
Sundar Pichai, CEO of Google and parent company Alphabet, called for government regulation of artificial intelligence technology in a speech at Bruegel, a think tank in Brussels, and in an op-ed. There is no question in Pichai's mind that AI should be regulated, he said. The question is what will be the best approach. Sensible regulation should balance potential harm with potential good.
Cybersecurity 2020: A Perilous Landscape
January 17, 2020
Cybersecurity is a very serious issue for 2020 -- and the risks stretch far beyond the alarming spike in ransomware. In addition to the daily concerns of malware, stolen data and the cost of recovering from a business network intrusion, there is the very real danger of nefarious actors using cyberattacks to influence or directly impact the outcome of the 2020 U.S. general election.
Business/Customer Sweet Spots: ECT News Roundtable, Episode 2
January 16, 2020
If you're a small business owner or a key member of an enterprise executive team, you want your firm to succeed. If you're a customer, you want to be treated well. Those goals are not diametrically opposed, but very often it seems that companies and customers are at cross-purposes. ECT News Network recently gathered together five technology experts who did some hard thinking on the subject.
Apple, DoJ Grapple Over Cracking Terrorist's iPhones
January 15, 2020
Apple and the U.S. Justice Department are at it again. This time it's over cracking a brace of iPhones owned by the Saudi Air Force cadet who killed three sailors in a shooting spree last month at the naval air station in Pensacola, Florida. At a news conference on the findings of an investigation into the incident, U.S. Attorney General William Barr called out Apple for refusing to help the FBI.
Clock Runs Out for Windows 7 Holdouts: Upgrade or Replace?
January 14, 2020
After 10 years of fully supporting Windows 7, Microsoft ended its official support for the out-of-date Windows operating system on Tuesday. The popular classic Windows 7 OS still runs on some 200 million PCs around the globe, according to industry estimates. Users include small business owners, some larger companies, and hordes of consumers holding onto aging personal computers.
What's in Your Containers? Try an Open Source Tool to Find Out
January 14, 2020
As most security pros know, application containers -- Docker, rkt, etc. -- and the orchestration elements employed to support them, such as Kubernetes, are used increasingly in many organizations. Often the security organization isn't exactly the first stop on the path to deployment of these tools. If it was in your shop, consider yourself one of the lucky ones.
The Most Important Autonomous Car Announcement at CES
January 13, 2020
Getting around Las Vegas during CES is a nightmare. One evening I wanted to go to the In-N-Out Burger place, and even though it was only a mile or two from my hotel, the traffic was so bad that I doubted I'd make there and back before midnight -- and it was only 6 p.m. I used to try to walk CES, but the miles of fast walking on concrete ripped the soles off both my feet one year.
Cybersecurity 2020: The Danger of Ransomware
January 10, 2020
Ransomware tops the list of cybersecurity threats for 2020. While there have been efforts to convince individuals, corporations and municipalities not to pay ransoms, the simple fact is that whenever one is paid, the attack becomes a success that encourages cyberthieves to try again. Ransomware attacks increased 18 percent in 2019, up from an average 12 percent increase over the past five years.
Tech Strides, Tech Worries and Tech Visions: ECT News Roundtable, Episode 1
January 8, 2020
If you're turned off by the mere thought of talking heads vying to speak the loudest or the longest in a TV "discussion" of some pressing issue of the day, read on for a refreshing dose of sanity. ECT News Network recruited five smart people with plenty to say about the state of technology, and we gave them plenty of time to say it. The result is a far-ranging intercourse.
CES 2020: Prepare to Be Amazed
January 6, 2020
Every year I look forward to CES being over. That's not because it isn't interesting -- it is. It's because the place is a nightmare to get around, thanks to some incredibly stupid decisions that turn Las Vegas into a gridlocked mess. Coming right after the holidays, it destroys more family vacations than any other event short of a long driving trip with very young children.
2010 - 2019: Product of the Decade
December 30, 2019
As we get to the end of December, I typically pick my product of the year, but this is also the end of the decade, so I'll go back and look at the prior products of the year, name my pick for this year, and then pick my product of the decade. 2010 was an easy choice as the iPad came out and scared the hell out of the entire PC market. Its release made the whole "PC is Dead" thing real.
Tech Firms Join Forces to Create Smart Home Connectivity Standard
December 19, 2019
Amazon, Apple, Google and the Zigbee Alliance are teaming up on a new Internet Protocol-based standard for smart home device connectivity. Connected Home over IP will be an open source project. A working group will define a specific set of IP-based networking technologies for device certification. The goal is to enable communication across smart home devices, mobile apps and cloud services.
Google's Chrome 79 Puts Heavy Emphasis on Security
December 12, 2019
Google has released an update to its Chrome browser with a slew of new features that are heavy on security. The new version has 51 security fixes. It offers improved password protection over earlier versions, real-time phishing protection, and predictive phishing tools. Google recognizes the issues and has taken steps to fix them, noted James McQuiggan, security awareness advocate at KnowBe4.
Should Discord Be in Your Incident Response Toolbox?
December 11, 2019
Cybersecurity incident response teams have choices when it comes to communication tools: Microsoft Teams, Slack, Zoom and numerous others. Some require a subscription or commercial license -- others are free. Some are niche tools specifically designed for incident response. Some are generic business communication tools that IR teams have adapted for use during a cybersecurity incident.
Facebook Won't Let US, UK, Australia Get Toe in Backdoor
December 11, 2019
Facebook has rejected a request from the U.S., the UK and Australia for a "backdoor" in its encrypted messenger apps to help law enforcement agencies combat crime and terrorism. "Cybersecurity experts have repeatedly proven that when you weaken any part of an encrypted system, you weaken it for everyone, everywhere," wrote WhatsApp head Will Cathcart and Facebook Messenger head Stan Chudnovsky.
Your Smart TV Could Give Hackers a Window on Your World
December 6, 2019
Cybercriminals have discovered ways to compromise smart TVs, the FBI recently warned. Smart TV owners should do their due diligence to secure the devices, the bureau urged. Smart TVs are just as accessible to unauthorized parties as computers or other Internet-connected devices. Because many TVs now feature microphones and cameras, predators could commit serious privacy intrusions.
Small Etailers: It's Not Too Late to Protect Your Holiday Revenue
December 5, 2019
As consumers start to tackle their holiday shopping lists, retailers are scrambling to finish preparations for what's likely to be a record-breaking year. Total sales could break through the $1.1 trillion mark for the first time in history. Cyber Monday alone racked up an estimated $9.4 billion in sales. Most merchants understand how significant this time of year is.
How the Quantum Tech Race Puts the World's Data at Risk
November 27, 2019
The technology one-upmanship between the United States and China is fast becoming the new space race. There's been a lot of talk in the press about the competition to reach 5G, but little traction outside of the tech community about something more momentous: the dangers of computing in a post-quantum world. The recent news from Google about its quantum capabilities is exciting.
Consider Service Mesh as a Security Tool
November 26, 2019
If you're like most security pros, chances are you're starting to get frustrated with microservices a little -- or maybe a lot. Microservice architectures -- that is, architectures that leverage REST to build a number of small, distributed, modular components -- are powerful from a software architect's point of view. Want to make a change to a component quickly? Add new functionality?
Windows 7 End of Life
November 19, 2019
Microsoft will end support for Windows 7 on Jan. 14, 2020. Windows 7 will continue to run on Jan. 14 as it did on Jan. 13. So why is it so important to upgrade to Windows 10? The answer: cybercrime. End of support means that Windows 7 no longer will receive the OS patches or security updates that keep your IT systems safe. Uusing an unpatched out-of-date system is like leaving the door wide open.
The Thorny Problem of 5G Security
November 15, 2019
A few years ago, putting the words "mobile telecoms security" in the title of an article would be a license to write whatever you wanted below, because no one was likely to read any of the words after the title. Sprinkling the magic ingredient 5G has changed this, and "5G security" is a hot topic now. What has changed? There is a geopolitical aspect to 5G security, but it is not the full story.
Calling All Retailers - Ready or Not, CCPA Is on Its Way
November 9, 2019
We're just a few short months away from the California Consumer Privacy Act going into effect. The regulation brings privacy rights to residents in California and gives them control of their personal information and how companies can use it. Any business that sells to a California resident needs to be CCPA-compliant. Nearly every brick-and-mortar store nowadays has an e-commerce site.
Researchers Use Lasers to Hack Smart Speakers
November 6, 2019
University researchers have discovered a way to issue unauthorized commands to digital assistants like Alexa, Google Assistant, Facebook Portal and Siri via laser beams. The microphones in devices like smart speakers, mobile phones and tablets convert sound into electrical signals, but what the researchers found was that the mics react to light aimed directly at them, too.
Smart Speaker Apps Caught Snooping Around Homes
October 22, 2019
Flaws in Amazon and Google smart speakers can expose users to eavesdropping and voice phishing. Researchers at Security Research Labs discovered that developers could create malicious apps for the Amazon and Google platforms to turn the smart speakers into smart spies. Using the standard development interfaces for the platforms, the researchers found a way to request and collect personal data.
Adopt a Maintenance Mindset: Protect IT
October 18, 2019
As part of National Cyber Security Awareness Month, the National Cyber Security Alliance is advising all computer users to "Protect IT" by taking precautions such as updating to the latest security software, Web browser and OS. The nonprofit public-private partnership, which works with DHS and private sector sponsors, advised computer users on ways to protect their personal data.
'Serious' Linux Sudo Bug's Damage Potential Actually May Be Small
October 16, 2019
Developers have patched a vulnerability in Sudo, a core command utility for Linux, that could allow a user to execute commands as a root user even if that root access was specifically disallowed. The patch prevents potential serious consequences within Linux systems. However, the Sudo vulnerability posed a threat only to a narrow segment of the Linux user base, according to Todd Miller, a maintainer of the open source Sudo project.
Security First: The Double-Edged Sword of Collaboration
October 14, 2019
Online tech support scams have been on the rise for the past decade, as hackers found new ways to trick consumers into providing remote access to their computers in order to steal information. This tried-and-true scam currently relies on sophisticated social engineering, fueled by detailed user information that creates enough credibility to dupe even the most savvy and skeptical users.
See More Articles in Cybersecurity Section >>
download NICE inContact Remote Agent Checklist
Which technology has the strongest positive or negative impact on race relations?
Smartphone cameras, by holding people accountable.
Twitter, by reporting news as it happens.
Facebook, by providing a platform for discussing the issues.
YouTube, by exposing viewers to other cultures.
Twitter, by fueling antagonisms.
Facebook, by spreading fake news.
Women in Tech