Explore Newsletters from ECT News Network » View Samples | Subscribe
Welcome Guest | Sign In
TechNewsWorld.com
Salesforce Industries Summit
Cybersecurity Conundrum: Who's Responsible for Securing IoT Networks?
September 24, 2020
Surely spurred by the work-from-home necessities of 2020, people have connected a multitude of non-business devices to their corporate networks, making it progressively difficult to implement cybersecurity because every device is a potential weak point. So, who will ultimately be responsible for cybersecurity of an IoT network?
Hucksters Rake In $500K With Android, iOS Adware Scam Apps
September 23, 2020
Seven scamware apps found in Google Play and Apple's App Store corralled more than half a million dollars for their developers, according to Avast. The company discovered the malicious apps after a 12-year-old girl flagged a suspicious app promoted on a TikTok profile through its "Be Safe Online" project.
Do's and Don'ts for SMB Cybersecurity Safety
September 17, 2020
The stampede from offices to working from home has strained IT security teams to their limits. As a result, SMBs find they need to get more bang for fewer bucks to fight off cybersecurity threats. However, even IT departments with limited resources can implement foundational strategies to address network security issues, and lay the groundwork for future investments.
How to Protect Mobile Apps Against Sneaker Bots
September 16, 2020
Automated purchasing bots, also known as "sneaker bots," "click bots," "Instacart bots" and other names, are ruining the online shopping and gig economy experience for both consumers and workers. These bots can cause considerable damage to a mobile business' reputation and bottom line. There are a number of measures that e-tailers should take a to protect their mobile apps from sneaker bots.
Tech Job Market Hot for the Near Future
September 15, 2020
Computer systems design and related services added 13,000 jobs, according to the U.S. Department of Labor's August jobs report. IT employment in July was up by more than 203,000 positions since the COVID-19 outbreak; and there were more than 235,000 job postings by U.S. employers, according to the Computing Technology Industry Association.
TikTok Enlists Oracle to Evade Trump's Executive Order
September 14, 2020
A proposal to avoid the banning of the popular social media app TikTok was submitted to the U.S. Treasury Department over the weekend. The plan submitted by ByteDance, which owns TikTok, calls for the company to enlist Oracle as a "trusted technology provider" in order to address national security concerns raised about the video-sharing software by the Trump administration.
The Perils of IT Security Hubris
September 10, 2020
Corporate cybersecurity has been increasingly compromised since organizations began implementing work-from-home policies in March as the pandemic continued its spread. In addition to the risks created by increased stress on personnel and depleted staff, IT leaders might be overconfident about the cybersecurity protocols and procedures they have in place.
Google's New Phone App Feature ID's Legit Business Calls
September 9, 2020
Google has taken a step toward controlling spam voice calls on Android devices with a new addition to its phone app. The "Verified Calls" feature will display a caller's name, logo, reason for calling and a verification symbol indicating a business has been verified by Google. The service will initially roll out in the United States, Mexico, Brazil, Spain and India, with more countries to follow.
Reported Data Breaches Decline in H1 2020
September 3, 2020
Data breaches were rampant in 2019, occurring at an unprecedented pace. However, the first half of this year has seen a reduction in the number of reported events. Reported being the operative word. In all, more than 15 billion records were exposed in nearly 7,100 data breaches last year. This year however, the number of publicly reported data breaches has decreased.
Software Piracy Spreading With the Virus
September 1, 2020
Software piracy involves much more than businesses and consumers using illegal copies of computer programs. What lurks within the pirated copies is often rogue code -- malware -- that can be just as deadly to computers and users' finances. Software companies are reporting that piracy has increased 20 to 30 percent due to COVID-19.
Credential Harvesting Attacks Take Aim at Video Meeting Apps
August 27, 2020
Users of video conference tools should be aware of the growing risk of impersonation attacks. Cybercriminals are capitalizing on the exponential increase of users turning to Zoom and other platforms to collaborate across work and friend networks. Researchers have identified attacks stemming from Australia, Germany, the U.S. and elsewhere.
Online Business Scams Decline as Consumer COVID Fraud Rises
August 26, 2020
Online bandits are decreasing their schemes against businesses but increasing COVID-19 scams aimed at consumers, according to a report released Tuesday by TransUnion. Suspected fraudulent digital transactions against businesses worldwide dropped nine percent from the lockdown phase of the pandemic to the reopening phase.
Pandemic Gooses Stolen Credentials Prices on Dark Web
August 25, 2020
After crashing in 2019, Dark Web markets for stolen credentials rebounded during the first half of 2020, largely due to major shifts in consumer behavior caused by the global pandemic. Hacked accounts for delivery services and physical fitness brands are some of the highest priced items on the market, according to a recent report.
How to Protect Data From Natural Disasters
August 19, 2020
With hurricane season in full bloom and the additional prospect of natural disasters, the importance for companies to have disaster data plans in place is paramount. TechNewsWorld discussed disaster preparedness with a panel of IT experts. Check out their recommendations -- and make sure that you have not forgotten that one key thing that many companies forget to protect but regret afterward.
Return of Remote Workers Brings New Challenges to IT Heads
August 18, 2020
For those business that got it right reopening their workplaces the first time around, they should be in pretty good shape for round two. But others that struggled to get a handle on operations will likely find themselves again in chaos -- especially where IT is concerned for the transplanted work-from-home employees.
Digital Security Is as Easy as PGP
August 17, 2020
To be sure, there are specialized circles that make regular explicit use of PGP. My aim in treating PGP here is twofold. The first is to shed some light on it for the uninitiated. The second, and more importantly, is to teach the daring among you how to wield this powerful tool.
More Consumers Buying Into Digital Payments
August 17, 2020
As consumers get more acquainted with shopping and banking digitally, it seems logical that more people would be inclined to pay their bills online. A recent survey of more than 3,000 adult consumers shows that nearly 70 percent prefer digital payment options, such as website and mobile app channels, to pay their one-time bills.
5G Rollout Includes Challenges to Supply Chain, WFH Value
August 13, 2020
The growing work-from-home movement amid the coronavirus and its likely continuing challenges has created the need for additional broadband capacity in more places. Mobile telco and other service providers are rallying around 5G wireless as the most promising solution for reliably faster Internet connectivity. But the path to rolling out 5G has been rocky and spotty.
California's Early Warning Quake Alerts to Be Standard on Android Phones
August 12, 2020
Earthquake alerts are being incorporated into Android, Google's mobile operating system. The feature will be included in a refresh of Google Mobile Services, so a full operating system upgrade won't be necessary. That means the new addition will be available to most Android users -- except those in China, which doesn't use GMS.
New Open Source Initiative Consolidates Security Goals
August 5, 2020
The Linux Foundation on Monday announced the formation of the Open Source Security Foundation as the latest initiative to improve software security. This cross-industry collaboration brings together industry leaders to improve the security of open-source software by building a broader community with targeted initiatives and best practices.
Congress vs. Big Tech: Breaking Up Is Hard (and Stupid) to Do
August 3, 2020
Like a lot of you, last week I watched the congressional testimony from the CEOs of Amazon, Apple, Facebook and Google -- and there were a lot of apparent things that were problematic. One is that there are folks in Congress that likely shouldn't be in Congress, and another is that each company has some serious issues they haven't dealt with.
Digital Sales Boom Puts Spotlight on Fraud Control Systems
July 30, 2020
The move by retailers to online and mobile selling to survive the pandemic has resulted in a significant increase in digital fraud activity. The "2020 True Cost of Fraud Study: E-commerce/Retail Edition" by LexisNexis Risk Solutions found this to be partly because some fraud control systems are outdated, and partly because of increased transaction volume.
New Security Hole Puts Windows and Linux Users at Risk
July 29, 2020
If you are a Windows or Linux user, brace yourself for a long siege of vulnerability nightmares. The fix will be long and treacherous and could brick your computers. Eclypsium researchers have detailed a set of newly discovered vulnerabilities dubbed "BootHole" that opens up billions of Windows and Linux devices to attacks.
Garmin Confirms Services Upended by Ransomware Attack
July 28, 2020
Garmin on Monday confirmed that many of its online services have been disrupted by a cyberattack on its systems that occurred on July 23, 2020. Services disrupted by the attack, which encrypted data on the systems, included website functions, customer support, customer facing applications, and company communications.
The Case Against Full-Disk Encryption
July 27, 2020
The information security industry, with all its raging debates, has rallied around a small corpus of best practices. One of the highest on this list is full-disk encryption, which security experts regard as sacrosanct. This is the encryption that ensures that someone who snatches your device won't be able to know everything you've got saved on it. I'm here to make the case that most of you are better off not using it.
Beware of Counterfeit Network Equipment
July 24, 2020
Counterfeit hardware, especially in corporate settings, is a recurring problem that often goes unnoticed. Having such gear online poses serious financial, operational, and security risks. Cybersecurity company F-Secure has released an investigative report detailing counterfeit Cisco Catalyst 2960-X series switches. The report highlights challenges facing organizations that discover counterfeit devices in their IT infrastructure.
Rancher Labs and Fujitsu Form Kubernetes Partnership as Suse Readies Merger
July 21, 2020
Rancher Labs and Fujitsu on Tuesday announced an alliance to hasten the adoption of Kubernetes container orchestration technology industry-wide, starting within public sector institutions in the U.K. and Ireland. The alliance was forged partly in response to the growing requirement by the U.K.'s Government Digital Service for public organizations to embrace a 'cloud first' policy.
The Past, Present and Future of Attribute-Based Encryption
July 21, 2020
Encryption is an obscure but critical part of everyday life. That padlock in the address bar of the website you're visiting represents the 's' after 'http' -- which stands for the latest version of Transport Layer Security. Together with Secure Sockets Layer, which TLS replaced, these digital security technologies allow encrypted communication between two parties, such as web sites or servers, and web browsers.
Digital Fraud Flourishing During Pandemic: Report
July 9, 2020
If you conducted e-commerce transactions since the pandemic struck, you have probably been the target, or even a victim, of online fraud. A report from Sift titled "Q2 2020 Digital Trust & Safety Index" details a 109 percent increase in content abuse and growth of the fraud economy from January through May 2020.
John McAfee Emerges With Private Cell Phone Data Service
July 8, 2020
The Ghost Cell Phone Data Service is part of a larger ecosystem which includes McAfee's Ghost cryptocurrency and GhostX Exchange for private cryptocurrency exchange. "The Ghost brand will encompass a range of practical, real world tools for people to protect our rights and take back our privacy," McAfee said. "Privacy is a human right."
See More Articles in Security Section >>
Salesforce Industries Summit
When considering a new smartwatch, which feature set is most important to you?
Alerts and Notifications
Calls and Messaging
Clock and Time Tracking
Contactless Payments and Banking
Design and Personalization
GPS and Maps
Health and Fitness
Music and Video
Forrester names NICE inContact CXone a leader in cloud contact center software
Forrester names NICE inContact CXone a leader in cloud contact center software
Women in Tech