Attention B2B Marketers: Access 30 Million IT Decision Makers with a Custom Lead Generation Program Click to Learn More!
Welcome Guest | Sign In
TechNewsWorld.com
Facebook Faces Multiple Government Probes in Massive Data Scandal
March 20, 2018
EU, UK and U.S. officials have ratcheted up the pressure on Facebook over a user data scandal that threatens to engulf the company. The president of the European Parliament, Antonio Tajani, summed up the stakes in a tweet on Tuesday: "Facebook needs to clarify before the representatives of 500 million Europeans that personal data is not being used to manipulate democracy."
German Court's Privacy Ruling Against Facebook Will Have Far-Reaching Effects
March 14, 2018
Facebook has millions of users in the European Union, and a German court recently ruled against the company in a case involving its Privacy Policy. Few ever read privacy policies except judges, who must examine them when challenges arise. The new EU General Data Protection Regulations, which go into effect on May 25, will make things even more complicated. If you have any customers who are EU residents, the new GDPR will impact you.
Data Storage, Privacy and Metaphysics: SC Weighs Arguments in MS Case
March 13, 2018
How far does the long arm of U.S. law enforcement extend when government agencies seek electronically processed information? The U.S. Supreme Court recently addressed that issue in an intriguing session covering global electronic connectivity, the law, and the significance of national borders. The discussion came during last month's oral arguments in U.S. v. Microsoft.
Russians Pose as Americans to Steal Data on Social Media
March 8, 2018
Americans have been targeted on social media by Russian agents on a mission to harvest personal information. The agents pretended to work for organizations promoting African-American businesses as a ruse to obtain personal information from black business owners during the 2016 presidential election campaign. Using names like "BlackMattersUS," the agents set up hundreds of social media accounts.
Where Blockchain Tech Offers the Most Promise
March 7, 2018
"Blockchain" is on everyone's lips in the tech industry, with vendors pushing it for everything from banking and finance to retail and apparel. "We're going to continue to see tech vendors trying to push blockchain as the solution to problems that may exist," said Rebecca Wettemann, VP of research at Nucleus Research. However, it may not be "a privacy-effective or cost-effective solution."
NICE Alliance Aims to Get Smart Cameras to Play Well Together
March 6, 2018
Sony Semiconductor Solutions, Nikon, Foxconn, Scenera and Wistron have formed an alliance to create standards that allow surveillance and IP cameras to play well with each other. The NICE Alliance, unveiled Monday, aims to create a new smart camera ecosystem, along the lines of the mobile ecosystems that have become so familiar. The "NICE" acronym stands for "Network of Intelligent Camera Ecosystem."
Fileless Malware: Why You Should Care
March 2, 2018
It's a truism that just like organizations adapt, so too do criminals. Anyone who has ever seen a Wells Fargo commercial knows that there was a time when stagecoaches were a normative method for transporting cash and valuables. But what modern criminals in their right mind would attempt robbing a Brink's truck on horseback? That strategy might have worked well in the days of the Pony Express.
SC Justices to Hear Arguments in Microsoft, DoJ Data Privacy Face-Off
February 27, 2018
The U.S. Supreme Court on Tuesday will hear oral arguments in a landmark case over whether federal law enforcement can force Microsoft to hand over email stored in an overseas data center as evidence in a drug-trafficking case. The case, United States of America v. Microsoft Corporation, which dates back to 2013, is viewed as a potentially groundbreaking showdown over data privacy.
AI's Malicious Potential Front and Center in New Report
February 22, 2018
As beneficial as AI can be, it has its dark side, too. That dark side is the focus of a new 100-page report. AI will be used by threat actors to expand the scale and efficiency of their attacks, it predicts. They will employ it to compromise physical systems and to broaden their privacy invasion and social manipulation capabilities. Novel attacks are to be expected.
3 Cybersecurity Threats SMB Etailers Should Not Ignore
February 16, 2018
Some small e-commerce website operators may think their relative obscurity offers protection, but the fact is that SMBs are especially vulnerable to cyberattacks and malware. "Very often small businesses don't feel vulnerable to cyberthreats because they assume cybercriminals prefer to launch attacks on large companies," said Stephanie Weagle, VP of Corero.
Are Smart TV Designs Taking Home Security for Granted?
February 15, 2018
Millions of smart TVs from Samsung and some streaming devices from Roku recently were found to be vulnerable to cyberattacks, allowing intruders to take control and remotely change channels and volume settings, among other things, according to Consumer Reports research. Vulnerabilities were discovered not only in Samsung televisions, but also in TVs from TCL and other Roku-compatible brands.
SentinelOne Debuts Unified OS Threat Protection
February 15, 2018
SentinelOne this week announced a partnership with Microsoft to bolster threat protection for mixed platform users, making computing safer for Linux machines in a multiplatform workplace. SentinelOne will integrate its Endpoint Protection Platform with Microsoft's Windows Defender Advanced Threat Protection service to cover Mac and Linux device platforms.
Leak of Stale iOS Source Code Could Trigger Fresh Problems
February 9, 2018
Apple lawyers have sent a copyright violation notice to Github, following the publication of leaked iOS 9 source code on the site. Though iOS 9 is dated, it's possible that the leaked code could be used to jailbreak older devices or worse. Publication of the code violated Apple's rights under the DMCA, the attorneys wrote, demanding that the iBoot source code be removed.
Open Up the Source Code to Lock Down Your Data
February 8, 2018
Meaningful security is more than an app or an OS. It's a mindset. Linux security tools by themselves will not make you or anyone more secure. Security requires trade-offs in convenience, so the tools I'll highlight here are not recommended as "daily drivers." Only you can determine your ideal balance point. Perhaps the single greatest strength of Linux is that it is open source.
Critics Love HomePod's Sound but Rap Its Smarts
February 7, 2018
Critics have begun weighing in on Apple's HomePod smart speaker, and they're loving the device's sound but don't have much affection for its smarts. The HomePod's sound outclassed top-shelf competitor SonosOne, according to Matthew Panzarino. "The HomePod was the 'best' sounding. It's nuanced and subtle with great separation and clarity across all kinds of music," he wrote.
WiFi Routers Riddled With Holes: Report
February 6, 2018
Most WiFi router vendors have not patched numerous firmware vulnerabilities discovered more than two years ago, according to a new report. OEM firmware built into WiFi routers use open source components that contain numerous known security vulnerabilities that can be exploited by hackers. Insignary conducted comprehensive binary code scans for known security vulnerabilities in WiFi routers.
Privacy-Minded Smart Speaker May Struggle to Get to Know You
January 31, 2018
Mycroft AI earlier this week announced that its Mark II smart speaker achieved full funding on Kickstarter in just 6.5 hours. As of Wednesday, pledges reached more than three times its $50K goal -- with 23 days remaining in the campaign. The Mark II is positioned as an open source alternative to the dominant Amazon Echo line of smart speakers and its main challenger, the Google Home device.
Alphabet's New Chronicle Promises to Speed Threat Data Analysis
January 30, 2018
Alphabet has launched Chronicle, a new cybersecurity venture, following two years of development at the Alphabet X research lab. Chronicle will include VirusTotal, a Google-owned cybersecurity and intelligence platform and malware intelligence service. The idea behind Chronicle stems from the fact that many companies receive many more security alerts per day than they can handle.
Don't Pay the Hackers
January 30, 2018
If you follow security news, you may have noticed a disturbing trend. Last year, we learned that Uber paid attackers $100,000 to keep under wraps their stealth of the personal information of 50 million Uber riders. More recently, we learned that Hancock Health paid approximately $55,000 in bitcoin to bring hospital systems back online. The payment of ransoms could be more common than it appears.
Free Linux Tool Monitors Systems for Meltdown Attacks
January 27, 2018
SentinelOne has released Blacksmith, a free Linux tool that can detect Meltdown vulnerability exploitation attempts. The company has been working on a similar tool to detect Spectre vulnerability attacks. Though free, Blacksmith is not open source. SentinelOne decided to expedite its development in-house to save time, said Raj Rajamani, vice president of product management.
Intel Reports Progress on Patch-Related Performance Issues
January 25, 2018
Intel appears to have encountered some daylight in its struggle to fix performance issues related to the Meltdown and Spectre vulnerabilities. The company has identified the root cause on its older Broadwell and Haswell platforms, according to Navin Shenoy, general manager of Intel's data center group. Intel has begun rolling out a solution to its industry partners for testing, Shenoy said.
Namogoo CEO Chemi Katz: Malware Can Ruin the Customer Journey
January 12, 2018
When all goes well, the customer journey "ends with buying a product," said Chemi Katz, CEO of Namogoo. "Hijacking interferes with the customer's journey. It can be a pop-up that the company didn't put there, or something that will lead a customer out of the website. It's any interference that doesn't come from the e-commerce business itself, but from a third party."
Intel, Microsoft, Google Scramble for Solutions as Patches Slow Systems
January 12, 2018
Major tech companies, including Intel, Microsoft and Google, scrambled to calm the mood this week after a large number of computer users reported performance problems linked to security updates for the Spectre and Meltdown vulnerabilities. A firestorm of criticism has erupted over the response to the chip flaws, which researchers at Google's Project Zero discovered in 2016.
New Open Source Mobile OS Puts Privacy Front and Center
January 5, 2018
A renowned Linux innovator has developed a new mobile operating system, called "Project eelo," in an effort to provide a level of data privacy that traditional Android and iOS devices fail to offer. The new eelo system will allow mobile phone users to regain control over their personal information at a price they can afford, said Gael Duval, who created Mandrake Linux back in 1998.
Ominous Processor Vulnerabilities Could Put Most Computers at Risk
January 4, 2018
Nearly a dozen cybersecurity researchers this week reported two potentially serious exploits of vulnerabilities that exist in most modern processors. Three teams independently discovered and reported the Meltdown exploit. Two teams independently discovered and reported the Spectre exploit. The Meltdown and Spectre exploits could used to capture sensitive information on devices.
Consumers Win Some, Lose Some in Privacy Legal Tussles
January 3, 2018
The Walt Disney Company's recent decision to purchase major assets of 21st Century Fox in a transaction valued at $52 billion underscores the huge potential for distributing information and entertainment via the Internet. The deal will allow the company to improve its direct-to-consumer offerings, Disney said when it disclosed the transaction early last month.
2017 in Tech: The Year of Foreshadowing Big Things to Come
December 29, 2017
2017 may be the year that developments in the tech world truly were overshadowed by other world events: deepening divisions in the United States and the looming threat of war with North Korea; numerous sexual misconduct scandals; terrorist attacks in Europe; and another royal wedding. With all of that going on, it would be easy to overlook Apple's latest iPhone or Nintendo's comeback.
Zealot Loads Cryptocurrency Miner on Linux, Windows Machines
December 22, 2017
A new Apache Struts campaign that researchers named "Zealot" has come to light in recent weeks. Zealot loads Windows or Linux-based machines by installing a miner for Monero, which has become one of the hottest cryptocurrencies used in recent malware attacks. Zealot uses NSA-linked EternalBlue and EternalSynergy exploits, according to the F5 Labs researchers who discovered the campaign.
Full Disclosure Applies to Internal Security Too
December 21, 2017
If you've been keeping up with the news, you've probably noticed a few recent reports about companies that may have been a little less than candid about security issues. For example, we recently learned that Uber experienced a breach in 2016. As we've also learned from subsequent press reports, the company may have paid the attacker to remain silent about that breach instead of acknowledging it publicly and openly.
US Fingers North Korea for WannaCry Epidemic
December 20, 2017
The United States on Tuesday accused North Korea of responsibility for a global ransomware attack that locked down more than 300,000 computers in 150 countries earlier this year. The U.S. now has enough evidence to support its assertion that Pyongyang was behind the WannaCry attack in May, Homeland Security Advisor Tom Bossert told reporters at a White House press briefing.
See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS
Which capabilities in a home robot might induce you to consider buying one?
Help with daily housecleaning chores
Companionship for elderly or disabled family member
Entertaining and educating children
Monitoring security all through the house
Keeping inventory and restocking items when needed
Nothing would persuade me to consider getting a home robot.