Content Marketers » Publish Your Business Blog, Videos and Events on ALL EC » Save 25% Today!
Welcome Guest | Sign In
TechNewsWorld.com
Wireless Carriers Caught Playing Fast and Loose With Location Data
February 8, 2019
AT&T, T-Mobile and Sprint have sold access to subscribers' real-time location data to aggregators, which in turn have sold it to about 250 bounty hunters and related businesses, according to a report. In some cases, the data allowed users to track individuals to their specific locations inside a building. Some companies made thousands of location requests to data brokers.
E-Ticketing Flaw Exposes Airline Passenger Data to Hackers
February 7, 2019
The e-ticketing systems of eight airlines, including Southwest Airlines and Dutch carrier KLM, have a vulnerability that can expose passengers' personal data, mobile security vendor Wandera has reported. They use unencrypted links that hackers can intercept easily. The hackers then can view and, in some cases, even change the victim's flight booking details, or print their boarding passes.
Zuckerberg's Take on Facebook's History Raises Eyebrows
February 6, 2019
Musing about Facebook's first 15 years, CEO Mark Zuckerberg positioned it as a David confronting a Goliath composed of hierarchical institutions. Facebook gives the masses a voice, he wrote. It brings communities together and provides businesses with low-cost outreach. Progress has been made in addressing the new social and ethical issues raised, including protection of privacy, he said.
Apple to Raise Barrier Against VR, AR Websites
February 6, 2019
The next upgrade of Apple's mobile operating system will come with an annoying surprise for VR and AR developers. It reportedly will block Web access to the accelerometer and gyroscope in Apple mobile devices by default. That means users will have to grant permission to any Web apps or sites that need those components to function, including those with VR and AR components.
Apple Banishes Facebook Data Reaper From iPhones
January 31, 2019
Apple has blocked a Facebook app that paid users for total access to all network data. The controversy over use of the Facebook Research app erupted earlier this week, with a report that revealed Facebook was paying users $20 a month for root network access to their phones. Facebook was on-boarding users of the program, which included teenagers, through Apple's Enterprise system.
What's Wrong With the Social Media Model
January 31, 2019
The social media model has come under increased scrutiny following revelations of data misuse and news of executives reneging on some security commitments. People expecting to change the situation will need to address how social media works. This means changing not just the business model, which describes how a social media business makes money, but the fundamental technology model too.
Crypto Support in Samsung Galaxy S10 Could Fall Flat
January 30, 2019
The Samsung Galaxy S10, scheduled for launch on Feb. 20, likely will incorporate a cryptocurrency wallet. "Samsung has a long history of throwing everything it can think of, technology-wise, into its flagship Galaxy S series smartphones," remarked Ken Hyers, research director at Strategy Analytics. Most users aren't fully aware of their Galaxy S phone capabilities, he noted.
Apple Squashes FaceTime Eavesdropping Bug
January 30, 2019
Apple has suspended its Group FaceTime application following reports that a bug in the software allowed callers to eavesdrop on the people they were calling. The flaw let a person making a FaceTime call listen through the phone of the person called before the call was accepted or rejected. It reportedly also allowed access to the front-facing camera in an iPhone.
Dutch Doc Wins 'Forget My Suspension' Case
January 23, 2019
Google must remove search results about medical regulators' conditional suspension of a Dutch physician in the first "right to be forgotten" case of its kind in the European Union. After Google and Dutch data privacy watchdog Autoriteit Persoonsgegevens rebuffed the doctor's initial attempts to get disciplinary actions purged from online search results, a district court in Amsterdam sided with the surgeon.
4 Techniques for Validating Enterprise Blockchain
January 21, 2019
There's been a lot of hype about blockchain over the past few years. Nowadays though, there are signs that we may be on the cusp of moving from the "blockchain will solve all your problems" segment of the hype cycle into the "blockchain may be useful for a few targeted applications" segment. Utility-based Darwinism is at work -- we're starting to see the less likely applications fall away.
Court: Cops Can't Compel the Use of Body Parts to Unlock Phones
January 16, 2019
Authorities can't force people to unlock their biometrically secured phones or other devices, ruled a federal judge in California. "The Government may not compel or otherwise utilize fingers, thumbs, facial recognition, optical/iris, or any other biometric feature to unlock electronic devices," Magistrate Judge Kandis A. Westmore wrote. Passcodes already are protected by the Fifth Amendment.
The Biggest Cybercrime Threats of 2019
January 11, 2019
A new year means a fresh start, but it doesn't mean that old threats will go away. In fact, in the world of cybersecurity things could get far worse before they get better. Cybercrime continues to increase, as it allows nefarious actors to operate at a safe distance from victims -- and more importantly, law enforcement. Cybercrime often doesn't get the same attention as other types of crimes.
The Smartest Tech Products of 2018
December 31, 2018
Picking a product of the year is anything but trivial because the products I cover every week range from headphones to laptops to books, cars and more. So, I thought I'd try something different this year and pick six products that each deserve the title and then name a winner that stands out from the rest. This allows me to simplify the task and get around a bit of a writer's block I've been having on this subject.
BlackBerry Makes Autonomous Vehicle Play
December 13, 2018
BlackBerry this week introduced its new Security Credential Management System. SCMS -- a free service for the public and private sectors -- could encourage efforts to develop autonomous and connected vehicle pilot programs. BlackBerry undertook development of this technology to provide the critical infrastructure for vehicles and traffic lights to exchange information securely.
Supermicro: Our Motherboards Are Clean
December 12, 2018
Supermicro CEO Charles Liang has informed the company's customers that a leading third-party investigations company found "absolutely no evidence of malicious hardware" on its motherboards. The investigation was undertaken in response to a recent claim that bad actors had inserted spy chips in the firm's motherboards on behalf of the Chinese People's Liberation Army.
Pichai Puts Kibosh on Google Search Engine for China
December 12, 2018
Google is not working on a bespoke search engine that caters to China's totalitarian tastes, and it has no plans to develop one, CEO Sundar Pichai told lawmakers on Capitol Hill. "Right now, we have no plans to launch in China," he told members of the U.S. House Judiciary Committee at a public hearing on Google's data collection, use and filtering practices.
Location Data Selling Threatens Consumer Privacy
December 11, 2018
Selling location data collected by mobile phones has become a lucrative business, according to a report that noted location advertising sales are expected to reach $21 billion this year. At least 75 companies receive anonymous, precise location data from applications with the location services feature activated. Several of those outfits claim to track 200 million mobile devices in the U.S.
Google Hasn't Kept Promise to Stop Bubble-Wrapping Users: Report
December 6, 2018
Google hasn't released consumers from its filter bubble -- the package of personalized search results it delivers -- despite having promised to do so, according to study results from DuckDuckGo. Most participants saw results unique to them, the researchers found, which could not be explained by changes in location, time, by being logged into Google, or by Google testing algorithm changes.
Quora Looks for Answers in Wake of Massive Data Breach
December 5, 2018
The personal data of some 100 million people who have used Quora, a popular question and answer website, has been compromised, the company disclosed. "We recently discovered that some user data was compromised as a result of unauthorized access to one of our systems by a malicious third party," wrote Quora CEO Adam D'Angelo in an online post. "We are working rapidly to investigate the situation."
How to Use a VPN for Safer Online Shopping
December 4, 2018
With the holidays fast approaching, are you looking to buy presents online? The holiday season has become synonymous with online shopping. This isn't really surprising as physical stores usually attract crowds of deal hunters. This often conjures up images of throngs of people waiting in line outside the store, some even camping out. This activity is tolerable for some and even fun for others.
DoJ Takes Down Online Ad Fraud Ring, Indicts 8
November 29, 2018
The DoJ has revealed an unsealed indictment of eight defendants for crimes related to their involvement in widespread digital advertising fraud. The DoJ alleges the eight individuals were behind two global schemes, 3ve and Methbot, which stole tens of millions of dollars through a scam that used fake Web traffic and fake websites to reap ad view revenue from unwitting advertisers.
Users Rate 'Creep Factor' in New Privacy-Security Product Guide
November 16, 2018
The Mozilla Foundation is expanding a campaign begun last year to help consumers buy safe, secure connected toys and mobile gadgets this holiday season. Mozilla's 2018 edition Privacy Not Included buyers' guide offers an assessment of the privacy and security qualities of 70 products, ranging from connected teddy bears and smart speakers to game consoles and smart home gadgets.
When Is the Time to Hire a Cyber Specialist?
November 14, 2018
Cybersecurity has been becoming a larger and larger concern for organizations. Nowadays, most organizations -- regardless of size, industry, location, or profit vs. nonprofit status -- find themselves directly or indirectly impacted by cybersecurity. Even though the topic itself is increasing in importance, many smaller organizations don't have specialized security expertise on staff.
Whether Intended or Accidental, Internet Traffic Rerouting Can Be Costly
November 14, 2018
An apparent prefix leak from an errant router misconfiguration caused Google to lose control of several million of its IP addresses for more than an hour on Monday. During the event, Internet traffic was misrouted to China and Russia from Nigeria. The incident initially sparked concerns that it might have been a hijacking. The mishap made Google services unavailable to many users intermittently.
Cryptohackers Breach StatCounter to Steal Bitcoins
November 8, 2018
Hackers planted malware on StatCounter to steal bitcoin revenue from Gate.io account holders, according to Eset researcher Matthieu Faou, who discovered the breach. The malicious code was added to StatCounter's site-tracking script last weekend, he reported. The malicious code hijacks any bitcoin transactions made through the Web interface of the Gate.io cryptocurrency exchange.
How to Protect Your Online Privacy: A Practical Guide
November 7, 2018
Do you take your online privacy seriously? Most people don't. They have an ideal scenario of just how private their online activities should be, but they rarely do anything to actually achieve it. The problem is that bad actors know and rely on this fact, and that's why there's been a steady rise in identity theft cases from 2013 to 2017, often resulting in loss of reputation or financial woes.
Mobile Phone Security: All You Need to Know
November 6, 2018
We rely on our phones to process and store reams of personal digital data. Our digital activities -- from checking bank balances to paying for a product with a tap of the screen, to sending friends and family messages over social media, to accessing work emails remotely -- have turned our phones into a goldmine of personal information. How secure is your mobile device?
It Is Well Past Time for Elections to Be Online
November 5, 2018
Tomorrow a minority of those who are eligible will take time off, drive through traffic, and wait in lines to take part in one of the most artificially annoying obligations of United States citizenship: voting. Many who make that inconvenient trek will treat the process like a multiple choice test they haven't studied for, either voting the party line or guessing at the right answers.
Former White House CIO Theresa Payton: 'There Are Grave Concerns About Election Interference'
October 26, 2018
Theresa Payton, CEO of Fortalice Solutions, is one of the most influential experts on cybersecurity and IT strategy in the United States. She is an authority on Internet security, data breaches and fraud mitigation. She served as the first female chief information officer at the White House, overseeing IT operations for President George W. Bush and his staff.
Will Oracle Roil the DB Market?
October 23, 2018
When we write the history of the IT era, the big factor that has played an important but not well recognized role will be hardware -- specifically, the Oracle Exadata appliance that puts databases into memory. All of the cloud software starting with the autonomous database on view this week at OpenWorld would be vastly different if the database was still running primarily on disk drives.
See More Articles in Security Section >>
Salesforce Commerce Solution Guide
Where do you most often get your news online?
High-profile blogs
Local newspaper websites
Major newspaper and magazine websites
News aggregator websites
Online-only news and magazine websites
Social networks
TV network/program websites
Salesforce Commerce Solution Guide
Salesforce Commerce Solution Guide