No One Can Afford an Attack - Find the best Cybersecurity Pros to Protect Your Business Data
Welcome Guest | Sign In
TechNewsWorld.com
Can Hackers Crack the Ivory Towers?
June 19, 2018
Academics have been hard at work studying information security. Most fields aren't as replete with hackers as information security, though, and their contributions are felt much more strongly in the private sector than in academia. The differing motives and professional cultures of the two groups act as barriers to direct collaboration, noted CypherCon presenter Anita Nikolich.
Upcoming iOS Access Restrictions Could Stymie Law Enforcement
June 16, 2018
Apple plans to equip iOS 12 with USB Restricted Mode, which requires users to unlock their iPhone with their passcode before USB accessories can connect if the phone last was unlocked more than an hour earlier. The company included this feature in the developer versions of iOS 11.4.1 and iOS 12. Apple will release USB Restricted Mode publicly in a future software update, it confirmed this week.
Breach Litigation: A Growing Risk for E-Commerce Businesses
June 15, 2018
The expanding world of Internet commerce likely will generate a corresponding expansion of data breaches, resulting in more e-commerce businesses becoming the targets of consumer class action lawsuits. Breach litigation has become more prevalent as a result of a perceptible legal trend favoring consumers. Courts have tended to allow lawsuits based on a lower threshold for establishing injury.
The CLOUD Act's Dramatic Impact on International Privacy Laws
June 7, 2018
Just when the European Union's General Data Protection Regulation, or GDPR, was about to go into effect, the United States Congress created the CLOUD Act. Without any public hearings, review or public comment, Congress passed the legislation as part of the $1.3 trillion government spending bill. The CLOUD Act changed the privacy provisions that previously were in effect.
The Cloud's Hazy Security
May 31, 2018
A significant percentage of IT systems are cloud-based, according to a recent survey. The cloud is a key enabler for emerging technology, suggests the CompTIA poll, which was conducted last month. Cloud computing was one of four trends respondents expected to feature heavily in IT conversations over the next 12 to 18 months, the survey found. Others were AI, the IoT and cybersecurity.
DevOps: Plenty of Devs, Not Enough Ops
May 29, 2018
In spite of all the high-profile breaches that seem to sweep the headlines with greater frequency, companies slowly but surely have been getting a handle on internal security practices. At this point, it's hard to imagine any employee, in or out of the tech sector, who hasn't been run through antiphishing training. However, security is only as strong as its weakest link.
Realistic 'Zero Trust' for Your Cybersecurity Program
May 29, 2018
If you're a cybersecurity practitioner, chances are good that you've heard the term "zero trust" over the past few months. If you attend trade shows, keep current with the trade media headlines, or network with peers and other security pros, you've probably at least heard the term. Depending on whom you're talking to, you'll get a different answer about what it is and why it might be useful.
Benioff Endorses GDPR for US
May 27, 2018
Salesforce CEO Marc Benioff described Facebook as the "new cigarettes" in a recent appearance on the TV show CBS This Morning and called for the U.S. to adopt a national privacy law like the GDPR, which just went into effect in Europe. "Maybe this is a time where the government has to step in and regulate not just that product but really our industry," Benioff said, referring to Facebook.
FBI Declaws Russian Fancy Bear Botnet
May 25, 2018
The FBI has disrupted a network of half a million routers compromised by the group of Russian hackers believed to have penetrated the DNC and the Hillary Clinton campaign during the 2016 elections, according to reports. The hacker group, known as "Fancy Bear," has been using a malware program called "VPN Filter" to compromise home and small office routers.
Okta Offers Devs Free Tool to Set Up Multifactor Authentication
May 24, 2018
Okta has announced the Okta API Products One App, which lets engineering teams and developers implement multifactor authentication for any single website or application. Developers can use API Products for One App free if they display "Identity by Okta" on the login page of their app. Among Okta API Products for One App's features are authentication and directory services for Web or mobile apps.
Cloud Health Services, Part 2: Privacy and Security
May 23, 2018
Health services vendors have been partnering with various organizations to gain a foothold in the cloud and to test out their solutions. One of the cloud's major selling points is security -- but it is not as safe as it's made out to be. Google Cloud "recently announced a significant expansion in HIPAA compliance across our portfolio of cloud products," noted Google Cloud's Joe Corkery.
Rhino-Saving Tech Also Could Protect Kids and Borders
May 21, 2018
Cisco has reduced the poaching of endangered rhinos in Africa by a whopping 96 percent. This success comes at a time when kids appear to be increasingly at risk from rogue school shooters and the United States government seems deadlocked on gun control. The focus of Cisco's tech is on catching the poachers who kill around 1,000 endangered rhinos a year, rather than on taking away their guns.
Cloud Providers Look for Legal Loopholes to Protect Customer Data
May 17, 2018
U.S.-based providers of e-commerce resources, including cloud services, must release foreign-held customer information to law enforcement agencies under a new law. Providers have strongly objected to releasing customer information residing outside the U.S. for fear of violating the privacy laws of other countries. The providers noted a potential "staggering" loss of international customers.
Reining In Data-Crazed Tech Companies, Part 2
May 15, 2018
Several countries -- including the United States, France and Germany -- have pointed a finger at Russia for meddling in their elections. Russia used social media as a big part of that effort. Facebook has been scrambling to win back the public's trust since the Russia and Cambridge Analytica scandal. However, it's not clear what exactly hostile nation states have been up to on social media.
Highly Sensitive Encrypted Email at Risk of Exposure
May 15, 2018
A newfound flaw in email clients that use PGP and S/MIME to encrypt messages can be exploited to expose the plain text of the missives, according to a new paper. By injecting malicious snippets of text into encrypted messages, attackers can use the flaw to make the email client exfiltrate decrypted copies of the emails, explained the authors, a team of researchers from three European universities.
Circadence VP Keenan Skelly: Changing the Cybersecurity Paradigm
May 9, 2018
"It's only a few times in the history of the U.S. and in specific domains do you have the opportunity to make decisions and have a lasting effect on that domain," said Circadence VP Keenan Skelly. "In terms of information cybersecurity, we're right in the middle of it right now. We're just figuring out what global norms should be."
Microsoft Invites Everyone Onto Its Azure Cloud
May 8, 2018
Microsoft CEO Satya Nadella has sounded a call for computing to empower everyone. "The world is becoming a computer," Nadella said in the opening keynote address at Build 2018, the company's premiere event for developers in Seattle. "Computing is getting embedded in every person, place and thing. That's the opportunity that we have. It's in some sense endless," he added.
Facebook's Clear History Privacy Option: Boon or Sop?
May 3, 2018
Facebook plans to offer members a tool that to prevent tracking of their online activity outside the network. The Clear History feature will allow users to see which websites and applications send Facebook information when they use them, delete the data and prevent Facebook from collecting and storing it in the future. It will take a few months to build the tool, Facebook said.
Fitbit's Health Alliance With Google Could Be a Risky Experiment
May 2, 2018
Fitbit and Google on Monday announced a new partnership on healthcare. Fitbit will develop consumer and enterprise health solutions that will use Google's new Cloud Healthcare application programming interface. Fitbit also will move to the Google Cloud Platform to innovate and advance its products and services. Fitbit will leverage Google Cloud's infrastructure and security features.
Could BlackBerry Displace Apple?
April 30, 2018
I spent a day with BlackBerry last week and it brought back memories of how Apple displaced the company around a decade ago. I, like a lot of folks, thought what Apple was attempting was impossible. However, after the fact, it didn't even look difficult. BlackBerry largely has completed its pivot to software and services, but a wave of new phones from its partners suggests new possibilities.
Researchers Create Hack to Unlock Millions of Hotel Room Doors
April 26, 2018
A flaw in certain electronic hotel door locks could allow hackers to access guest rooms and other secure locations at millions of properties around the world, F-Secure researchers have discovered. Software updates were issued to fix the flaw in the smart locks after F-Secure notified and worked with the manufacturer over the past year. The researchers had found a way to make a master key.
Gmail Privacy and Security Get Ruggedized
April 26, 2018
Google has rolled out a number of new features designed to make its G Suite collaboration and productivity apps more efficient and safer to use. G Suite currently has more than 4 million paying business customers. The updates include a new design, enhanced security and AI components, and better integration of G Suite apps -- including Gmail, which is getting a brand new look.
'Holy Grail' Exploit Puts Nintendo Switch Consoles at Risk
April 25, 2018
Devices built on Nvidia's Tegra X-1 mobile processor are at risk of attack from a flaw security researchers have revealed. The exploit chain discovered by Katherine Temkin and others affects any device running the chip, including the Nintendo Switch gaming console. Called "Fusée Gelée," the vulnerability allows anyone to run code on the chip by overloading a critical buffer when a system boots.
A Home Robot Could Be Amazon's Next Gamble
April 24, 2018
Amazon could bring a home robot to market as early as 2019. Codenamed "Vesta," after the Roman goddess of home and family, the project is several years old, but hiring for it recently has ramped up with an eye toward placing prototypes in employees' homes this year. The robot could be a mobile smart speaker. Some versions of the product apparently have cameras and computer vision software.
Facebook Rolls Out European-Style Privacy Protections
April 19, 2018
Facebook has unveiled a comprehensive series of privacy enhancements designed to extend protections required by the European Union's GDPR to all of the social media company's users around the world. The updates, which include major changes to the company's terms and data policies, fulfill promises CEO Mark Zuckerberg made to House and Senate members in Washington D.C., Facebook officials said.
Vulnerabilities Abound in Popular Android Apps: Report
April 18, 2018
About 20 percent of the most popular Android Apps available through the Google Play Store contain open source components with known security vulnerabilities that can be exploited by hackers, according to a report Insignary will release next week. The findings are the result of the company's recent comprehensive binary code scan of the 700 most popular Android Apps on the Google Play Store.
Microsoft, Facebook, Oracle Among 34 Firms to Join Cybersecurity Tech Accord
April 18, 2018
Microsoft, Oracle and Facebook, along with 31 other companies, have signed the Cybersecurity Tech Accord, an agreement aimed at defending against cyberattacks, whether coming from rogue hackers or nation-states. The 34 tech firms committed to stronger defenses, no offensive attacks, capacity building and collective action. Security remains a major issue in the tech world.
Closing the Enterprise Security Skills Gap
April 18, 2018
The security skills gap has become a topic of acute interest among practitioners responsible for building security teams for their organizations -- and keeping them running smoothly. It impacts everything from how they staff, how they cultivate and develop their workforces, and how they train, to the operational controls they put in place, and potentially numerous other things.
Facebook and Google Could Be Nationalized in 5-10 Years
April 16, 2018
After I considered Facebook CEO Mark Zuckerberg's testimony before Senate and House committee hearings last week, it became very clear to me -- and I expect many in Congress -- that social media companies need to be regulated. However, I think this is only a step in the path that governments -- and I do mean more than the U.S. -- will take to ensure their effectiveness and protect their people.
The Internet Is Facing a Health Scare, Suggests Mozilla Report
April 14, 2018
Mozilla has launched the first full edition of its Internet Health Report. The report is "an open source effort to explore the state of human life on the Internet," said Mozilla Executive Director Mark Surman. It consists of research and analysis about the Internet compiled by researchers, engineers, data scientists, policy analysts and artists in Mozilla's extended community.
See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS
Freshsales - Don't fall prey to Excel sheets
What do you think of commercial spaceflight?
It's the best hope for advancing space exploration.
It's little more than a hobby for billionaires.
It will result in highly profitable new industries, like space mining.
It will dramatically increase space junk and pollution.
It will offer the opportunity to establish a new way of life in space colonies.
It should be heavily regulated by governments.