Get the ECT News Network Weekly Newsletter » Subscribe Today
Welcome Guest | Sign In
TechNewsWorld.com
Get the ICMI Agent Experience Toolkit
Your Smart TV Could Give Hackers a Window on Your World
December 6, 2019
Cybercriminals have discovered ways to compromise smart TVs, the FBI recently warned. Smart TV owners should do their due diligence to secure the devices, the bureau urged. Smart TVs are just as accessible to unauthorized parties as computers or other Internet-connected devices. Because many TVs now feature microphones and cameras, predators could commit serious privacy intrusions.
Small Etailers: It's Not Too Late to Protect Your Holiday Revenue
December 5, 2019
As consumers start to tackle their holiday shopping lists, retailers are scrambling to finish preparations for what's likely to be a record-breaking year. Total sales could break through the $1.1 trillion mark for the first time in history. Cyber Monday alone racked up an estimated $9.4 billion in sales. Most merchants understand how significant this time of year is.
How the Quantum Tech Race Puts the World's Data at Risk
November 27, 2019
The technology one-upmanship between the United States and China is fast becoming the new space race. There's been a lot of talk in the press about the competition to reach 5G, but little traction outside of the tech community about something more momentous: the dangers of computing in a post-quantum world. The recent news from Google about its quantum capabilities is exciting.
Consider Service Mesh as a Security Tool
November 26, 2019
If you're like most security pros, chances are you're starting to get frustrated with microservices a little -- or maybe a lot. Microservice architectures -- that is, architectures that leverage REST to build a number of small, distributed, modular components -- are powerful from a software architect's point of view. Want to make a change to a component quickly? Add new functionality?
Windows 7 End of Life
November 19, 2019
Microsoft will end support for Windows 7 on Jan. 14, 2020. Windows 7 will continue to run on Jan. 14 as it did on Jan. 13. So why is it so important to upgrade to Windows 10? The answer: cybercrime. End of support means that Windows 7 no longer will receive the OS patches or security updates that keep your IT systems safe. Uusing an unpatched out-of-date system is like leaving the door wide open.
The Thorny Problem of 5G Security
November 15, 2019
A few years ago, putting the words "mobile telecoms security" in the title of an article would be a license to write whatever you wanted below, because no one was likely to read any of the words after the title. Sprinkling the magic ingredient 5G has changed this, and "5G security" is a hot topic now. What has changed? There is a geopolitical aspect to 5G security, but it is not the full story.
Calling All Retailers - Ready or Not, CCPA Is on Its Way
November 9, 2019
We're just a few short months away from the California Consumer Privacy Act going into effect. The regulation brings privacy rights to residents in California and gives them control of their personal information and how companies can use it. Any business that sells to a California resident needs to be CCPA-compliant. Nearly every brick-and-mortar store nowadays has an e-commerce site.
Researchers Use Lasers to Hack Smart Speakers
November 6, 2019
University researchers have discovered a way to issue unauthorized commands to digital assistants like Alexa, Google Assistant, Facebook Portal and Siri via laser beams. The microphones in devices like smart speakers, mobile phones and tablets convert sound into electrical signals, but what the researchers found was that the mics react to light aimed directly at them, too.
Smart Speaker Apps Caught Snooping Around Homes
October 22, 2019
Flaws in Amazon and Google smart speakers can expose users to eavesdropping and voice phishing. Researchers at Security Research Labs discovered that developers could create malicious apps for the Amazon and Google platforms to turn the smart speakers into smart spies. Using the standard development interfaces for the platforms, the researchers found a way to request and collect personal data.
Adopt a Maintenance Mindset: Protect IT
October 18, 2019
As part of National Cyber Security Awareness Month, the National Cyber Security Alliance is advising all computer users to "Protect IT" by taking precautions such as updating to the latest security software, Web browser and OS. The nonprofit public-private partnership, which works with DHS and private sector sponsors, advised computer users on ways to protect their personal data.
'Serious' Linux Sudo Bug's Damage Potential Actually May Be Small
October 16, 2019
Developers have patched a vulnerability in Sudo, a core command utility for Linux, that could allow a user to execute commands as a root user even if that root access was specifically disallowed. The patch prevents potential serious consequences within Linux systems. However, the Sudo vulnerability posed a threat only to a narrow segment of the Linux user base, according to Todd Miller, a maintainer of the open source Sudo project.
Security First: The Double-Edged Sword of Collaboration
October 14, 2019
Online tech support scams have been on the rise for the past decade, as hackers found new ways to trick consumers into providing remote access to their computers in order to steal information. This tried-and-true scam currently relies on sophisticated social engineering, fueled by detailed user information that creates enough credibility to dupe even the most savvy and skeptical users.
Setting Up Roadblocks to Social Engineering
October 11, 2019
Since the dawn of the Internet age, criminals have looked for ways to profit on unsuspecting people while they browse the Web. Viruses, malware and other schemes were invented to infect and infiltrate systems, both at the enterprise and consumer levels. One of the most successful forms of cybercrime is social engineering, also known as the con man of the Internet.
Stop Cyberattacks in Their Tracks: Secure IT
October 10, 2019
Stopping cyberattacks requires diligent behavior. One of the themes of this year's National Cyber Security Awareness Month, or NCSAM, is that all computer users should take steps to Secure IT. That means shaking up the passphrase protocol by using not just strong passwords but strong and unique passphrases. Everyone should double login protection through multifactor authentication.
Tackling Economic Security Governance
October 8, 2019
If you've ever played chess, you know that each move you make has to be the best move. At one level, this is painfully obvious -- after all, who would choose to make a terrible move instead of a better one? -- but it's illustrative of an important concept. Specifically, the core reason it's true is that each individual move in a game like chess comes with an associated "opportunity cost."
Get Serious About Cybersecurity: Take Ownership of Your Personal Data
October 4, 2019
October is National Cyber Security Awareness Month, and one of the prongs in the three-part theme is for all computer users to "Own IT." This means staying safe on social media, updating privacy settings, and keeping tabs on apps. Simply put, users need to take better ownership of their data and their online presence as part of daily safe cyber practices.
eGobbler Malvertising Attack Infects More Than a Billion Ads
October 2, 2019
Two eGobbler malvertising exploits impacted 1.16 billion programmatic ads between Aug. 1 and Sept. 23, according to Confiant, which has been tracking the threat. The first targeted versions of Chrome prior to Chrome 75 on iOS. The flaw was fixed in the Chrome 75 rollout June 4. he second exploit impacted WebKit-based browsers. Confiant reported it to the Chrome and Apple security teams Aug. 7.
Congress Eyes Google's Chrome Encryption Plans
October 1, 2019
Google's plans to test an encrypted Internet DNS protocol reportedly have spurred some members of Congress to consider opening an antitrust investigation. They are concerned that the new technology could give Google an edge over competitors by making it harder for them to access consumer data. Google is experimenting with new ways to enhance online privacy.
Spotlight on Cybersecurity Awareness: Own IT, Secure IT, Protect IT
September 27, 2019
Cybersecurity should be a concern for all businesses -- large and small. Cybersecurity also should be a concern for consumers, government agencies, and basically anyone who relies on the Internet in our increasingly connected world. Among efforts to focus attention on the threatscape is designating October as National Cyber Security Awareness Month.
Wi-Fi 6 Is Ready for Prime Time
September 17, 2019
The Wi-Fi Alliance has released certification standards for Wi-Fi 6 devices, signaling that the technology is ready for prime time. The certification program assures buyers that products carrying the Wi-Fi Certified 6 label will deliver the best user experience with devices supporting IEEE 802.11ax. Wi-Fi 6 includes innovations to create faster network performance.
Multi-Cloud Strategy May Pose Higher Security Risk: Study
September 6, 2019
Users of a multi-cloud storage strategy may be twice as likely to face a security breach as those that use hybrid or single clouds, suggests a report from UK-based security specialist Nominet. Fifty-two percent of survey respondents who adopted a multi-cloud approach suffered a data breach over the past 12 months, compared to 24 percent of hybrid cloud users, and 24 percent of single-cloud users.
Amazon Trying Out Hand-Scanning Payment System: Report
September 5, 2019
Amazon is testing scanners that can identify a human hand to use as a payment method for in-store purchases. The company plans to introduce "Orville" to some Whole Foods stores by the beginning of 2020, and later expand it to all locations in the United States. Employees at Amazon's New York offices are said to be using the technology to buy items from specially equipped vending machines.
Report: Chinese Hackers Eye US Cancer Research
August 27, 2019
Hackers affiliated with the Chinese government have been making a concerted effort to steal medical research, particularly cancer research, from U.S. institutions. The step-up in medical research theft by Chinese APT hacker groups appears to be linked to China's growing concern over cancer mortality rates and increasing healthcare costs. Cancer in the leading cause of death in China.
Security Pros: Be on High Alert for Certificate Changes
August 22, 2019
They say that the key to good security is constant vigilance. As a practical matter, this means that it's important for security and network pros to pay attention to two things: changes in the threat landscape, so they can be on the alert for how their systems might be attacked; and changes and developments in the technologies they employ. These consequences matter quite a bit.
Major Browsers Block Kazakhstan Government's Fake Safety Cert
August 22, 2019
Google, Mozilla and Apple have blocked a fake root certificate issued by Kazakhstan's government to spy on its citizens' online activities. The government provided separate installation instructions for Android, iOS, Chrome, Firefox, and IE Web browsers. When those who installed the certificate attempt to access website using Chrome, Firefox or Safari, they now will see an error message.
Fighting Cybercrime: Cybersecurity and Digital Forensics Are the New A-Team
August 21, 2019
Cybersecurity and digital forensics are instrumental in creating effective defense, analysis and investigation of cybercrime. While both focus on the protection of digital assets, they come at it from two different angles. Digital forensics deals with the aftermath of the incident in an investigatory role, whereas, cybersecurity is more focused on the prevention and detection of attacks.
Yubico Offers Dual Lightning, USB-C Dongle to Secure Devices
August 21, 2019
Owners of iPhones looking for an extra measure of protection when using applications and logging into websites can get it with a new dongle from Yubico. Its new YubiKey 5Ci, which retails for $70, supports both USB-C and Apple's Lightning connectors on a single device. The dual connectors can give security-conscious consumers and enterprise users strong hardware-backed authentication.
Faulty Driver Coding Exposes Microsoft Windows to Malware Risks
August 15, 2019
Numerous driver design flaws by 20 different hardware vendors expose Microsoft Windows users to widespread security compromises that can cause persistent malware attacks. A report titled "Screwed Drivers," which Eclypsium security researchers presented at DEF CON, urges Microsoft to support solutions to better protect against this class of vulnerabilities.
28M Records Exposed in Biometric Security Data Breach
August 15, 2019
Researchers associated with vpnMentor, which provides virtual private network reviews, discovered a data breach involving nearly 28 million records in a BioStar 2 biometric security database belonging to Suprema. "BioStar 2's database was left open, unprotected and unencrypted," vpnMentor said. "After we reached out to them, they were able to close the leak."
The Future of Entertainment Services Authentication
August 12, 2019
New personal identification and authentication technologies have the potential to transform the way entertainment services are delivered, accessed and experienced. These technologies offer a high level of security, often incorporating biometrics such as voice, fingerprint, iris or retinal features, and facial characteristics. Each type of authentication bears its own advantages and disadvantages.
See More Articles in Cybersecurity Section >>
Amazon Advertising: Strategies to Drive Success
How do you feel about your use of the Internet?
I spend a lot of time online and it's mostly high value.
I spend a lot of time online and much of it is wasted.
I'd like to experience more immersive online activities, like VR.
I'd like to spend more time in the real world.
I'd like to be always connected, perhaps with eyewear.
It's important to disconnect from the Web at regular intervals.
I go online as little as possible and I intend to keep it that way.
Get the ICMI Agent Experience Toolkit