Get the ECT News Network Editor's Pick Newsletter » View Sample | Subscribe
Welcome Guest | Sign In
TechNewsWorld.com
Cloud Security Practices Playing Into Hands of Attackers
January 7, 2021
More than 80 percent of 650 cybersecurity and IT professionals surveyed by Check Point Software Technologies in July said their traditional security solutions either do not work at all, or only provide limited functions in the cloud. This indicates that organizations' cloud migrations and deployments are racing ahead of their security teams' abilities to defend against attacks and breaches.
FTC's Zoom Deal Signals Commitment to Security Enforcement
December 29, 2020
The U.S. Federal Trade Commission is making good on a resolution to strengthen its enforcement of security deficiencies occurring in e-commerce transactions. The agency's recent action involving allegations of improper activities by teleconferencing provider Zoom Video Communications is a notable example.
FTC Demands Social Media Firms' User Data, Harvesting Tactics
December 16, 2020
The Federal Trade Commission seeks to obtain information on how many users certain social media companies have, how active the users are, what the companies know about them, how they got that information, and what steps the companies take to continue to engage users. The FTC also is gathering information on the companies' business models and how they target children and families.
Get No-Fuss File-Level Crypto With Fscrypt
December 16, 2020
This piece is a demonstration of one means of setting up file-level encryption which is widely available for Linux desktop users. To offer a similar encryption scheme to as many users as possible, we'll walk through how to use fscrypt to create an encrypted filesystem. While simple, fscrypt offers multiple configuration modes.
Microsoft, Nintendo, Sony Issue Safe Gaming Manifesto
December 15, 2020
The Big Three makers of video gaming hardware have announced a united front to make online gaming safe for all their players. "We can accomplish more when we work toward the same goal, and so we will each continue investing in, evolving, and amplifying our approaches to user safety," stated Dave McCarthy, Microsoft's corporate vice president for Xbox operations.
Cyberthreat Hunter FireEye Hacked by Nation-State Attackers
December 9, 2020
Cybersecurity firm FireEye, which has been prominent in the fight against nation-state cyberthreats, has been itself attacked by "a highly sophisticated threat actor, one whose discipline, operational security, and techniques," company CEO Kevin Mandia announced Tuesday. This indicates the attack is likely state-sponsored, by a nation "with top-tier offensive capabilities."
'Scalper' Bots Hoarding Hottest Products from Consumers
December 9, 2020
During any holiday season, consumers have a tough time wrestling with each other for best-selling products, but now times have become even tougher, thanks to the proliferation of online "scalper" bots. These robot shoppers, unleashed by cybercriminals, emulate the activity of ticket scalpers in the real world.
'Tis the Season for Online Counterfeits
November 25, 2020
It should be prime time for shopping, but the pandemic has forced many consumers to tighten their purse strings. To help consumers -- and give e-tailers a heads up about better security -- the E-Commerce Times discussed holiday shopping issues with a panel of cybersecurity experts. They offered advice on how consumers can avoid buying counterfeit products; and analyses of how fake goods affect the broader retail market.
New Internet Protocol Aims to Give Users Control of Their Digital Identities
November 18, 2020
The @ Company wants to give you a more secure and human-centric Internet built on providing you with true ownership and control of your personal data. To that end, the company has launched an app built on its new privacy protocol. This new standard will attempt to change how online vendors and companies wheel and deal with the personal information of billions of Internet users.
DevSecOps: Solving the Add-On Software Security Dilemma
November 17, 2020
A report by open source security and license management company WhiteSource explores various factors contributing to the siloed software development culture and what steps are needed to achieve agile, mature, DevSecOps practices. TechNewsWorld discussed with David Habusha, vice president of product at WhiteSource, the state of DevSecOps in light of the report.
Zoom Beefs Up User Security With End-To-End Encryption
October 28, 2020
Zoom gave its users a big security upgrade Monday when it rolled out end-to-end encryption for its online meetings network. E2EE puts control of the keys for scrambling data in the hands of meeting organizers. Before the E2EE rollout, encryption was done on Zoom's servers, where someone with access to those servers could intercept the data. When used correctly, E2EE can make it difficult for even the best-resourced intelligence agencies to eavesdrop on communication.
Social Media Companies Top Data Grabber List
October 27, 2020
When it comes to an appetite for data, social media outfits are the most voracious, according to a recent study released by cybersecurity company Clario Tech. The analysis of nearly 50 of the world's biggest brands found that Facebook collects more than 70 percent of all the data it can collect legally about someone using its service.
The Trials and Tribulations of Paying Ransomware Hackers
October 23, 2020
There's no question that hackers are getting increasingly ambitious -- the average ransom demand increased from about $29,000 in 2018 to more than $302,000 in 2019. U.S. law doesn't prohibit paying ransom per se; but when victims pay monies to people or organizations who have been sanctioned by the U.S. government...they get into more trouble.
Whom Can We Trust to Safeguard Healthcare Data?
October 20, 2020
Healthcare records were digitized to help prevent medical errors such as misdiagnoses and mistakes with medication, but electronic health records have made it easier for bad actors to steal patients' highly personal information. Cybercriminals are further motivated by the fact that patient medical records are worth up to 10 times more than credit card numbers on the Dark Web.
Microsoft Squelches Trickbot Ransomware Network
October 13, 2020
An outlaw online network that's been used to infect millions of computers with ransomware has been disrupted by Microsoft. The company announced Monday that, together with telecommunications providers around the world, it was able to cut off the infrastructure used by the Trickbot botnet so it could no longer be used to initiate new infections or activate ransomware already planted on computer systems.
Newest RoboLinux 11 Update Goes Far Beyond Typical Linux
October 11, 2020
RoboLinux is one of the most advanced desktop Linux distributions you can find. The latest release is even better, making it potentially THE best Linux variety available today for desktop users. The Oct. 9 release of RoboLinux 11.13 is an upgraded build of the project's Ubuntu-based distribution. But wait, there is a whole lot more to RoboLinux than just another Ubuntu-based retread.
Controversial Plan Urges DoD to Recruit Tech Pros to WFH
October 2, 2020
The United States Defense Innovation Board has recommended that the Pentagon hire civilians to work from home who can handle classified information as a way of attracting people with technology expertise. The individuals sought "will have technical degrees and/or highly specialized skills in digital technologies and innovation needed across the U.S. Department of Defense," which is undergoing digital transformation.
Cybersecurity Assessment and the Zero Trust Model
October 1, 2020
Instead of legacy security models that differentiate a "trusted" interior from an untrusted external one, zero trust instead assumes that all networks and hosts are equally untrustworthy. Once this fundamental shift in assumptions is made, you start to make different decisions about what, who, and when to trust, and acceptable validation methods to confirm a request or transaction is allowed.
The Risks and Consequences of Lax Patch Management
September 29, 2020
Earlier this month, a woman with a life-threatening condition passed away after hackers crashed the IT systems of a major hospital in the city of Dusseldorf. Incidents like this raise the question of why corporations do not patch vulnerabilities as soon as software manufacturers issue a fix.
Cybersecurity Conundrum: Who's Responsible for Securing IoT Networks?
September 24, 2020
Surely spurred by the work-from-home necessities of 2020, people have connected a multitude of non-business devices to their corporate networks, making it progressively difficult to implement cybersecurity because every device is a potential weak point. So, who will ultimately be responsible for cybersecurity of an IoT network?
Hucksters Rake In $500K With Android, iOS Adware Scam Apps
September 23, 2020
Seven scamware apps found in Google Play and Apple's App Store corralled more than half a million dollars for their developers, according to Avast. The company discovered the malicious apps after a 12-year-old girl flagged a suspicious app promoted on a TikTok profile through its "Be Safe Online" project.
Do's and Don'ts for SMB Cybersecurity Safety
September 17, 2020
The stampede from offices to working from home has strained IT security teams to their limits. As a result, SMBs find they need to get more bang for fewer bucks to fight off cybersecurity threats. However, even IT departments with limited resources can implement foundational strategies to address network security issues, and lay the groundwork for future investments.
How to Protect Mobile Apps Against Sneaker Bots
September 16, 2020
Automated purchasing bots, also known as "sneaker bots," "click bots," "Instacart bots" and other names, are ruining the online shopping and gig economy experience for both consumers and workers. These bots can cause considerable damage to a mobile business' reputation and bottom line. There are a number of measures that e-tailers should take a to protect their mobile apps from sneaker bots.
Tech Job Market Hot for the Near Future
September 15, 2020
Computer systems design and related services added 13,000 jobs, according to the U.S. Department of Labor's August jobs report. IT employment in July was up by more than 203,000 positions since the COVID-19 outbreak; and there were more than 235,000 job postings by U.S. employers, according to the Computing Technology Industry Association.
TikTok Enlists Oracle to Evade Trump's Executive Order
September 14, 2020
A proposal to avoid the banning of the popular social media app TikTok was submitted to the U.S. Treasury Department over the weekend. The plan submitted by ByteDance, which owns TikTok, calls for the company to enlist Oracle as a "trusted technology provider" in order to address national security concerns raised about the video-sharing software by the Trump administration.
The Perils of IT Security Hubris
September 10, 2020
Corporate cybersecurity has been increasingly compromised since organizations began implementing work-from-home policies in March as the pandemic continued its spread. In addition to the risks created by increased stress on personnel and depleted staff, IT leaders might be overconfident about the cybersecurity protocols and procedures they have in place.
Google's New Phone App Feature ID's Legit Business Calls
September 9, 2020
Google has taken a step toward controlling spam voice calls on Android devices with a new addition to its phone app. The "Verified Calls" feature will display a caller's name, logo, reason for calling and a verification symbol indicating a business has been verified by Google. The service will initially roll out in the United States, Mexico, Brazil, Spain and India, with more countries to follow.
Reported Data Breaches Decline in H1 2020
September 3, 2020
Data breaches were rampant in 2019, occurring at an unprecedented pace. However, the first half of this year has seen a reduction in the number of reported events. Reported being the operative word. In all, more than 15 billion records were exposed in nearly 7,100 data breaches last year. This year however, the number of publicly reported data breaches has decreased.
Software Piracy Spreading With the Virus
September 1, 2020
Software piracy involves much more than businesses and consumers using illegal copies of computer programs. What lurks within the pirated copies is often rogue code -- malware -- that can be just as deadly to computers and users' finances. Software companies are reporting that piracy has increased 20 to 30 percent due to COVID-19.
Credential Harvesting Attacks Take Aim at Video Meeting Apps
August 27, 2020
Users of video conference tools should be aware of the growing risk of impersonation attacks. Cybercriminals are capitalizing on the exponential increase of users turning to Zoom and other platforms to collaborate across work and friend networks. Researchers have identified attacks stemming from Australia, Germany, the U.S. and elsewhere.
See More Articles in Security Section >>
Digital River - Sell Like a Local
Which of these topics being featured at CES 2021 interest you most?
5G & Internet of Things
Advertising, Entertainment & Content
Automotive Technologies
Blockchain / Cryptocurrency
Esports / Sports Tech
Health & Wellness
Home & Family
Immersive Entertainment & Gaming
Product Design & Manufacturing
Robotics & Machine Intelligence