Welcome Guest | Sign In
ECommerceTimes.com
Microsoft Inches Toward a World Without Passwords
April 20, 2017
Microsoft has announced the general availability of its phone sign-in for customers with Microsoft accounts -- a system that could be the beginning of the end for passwords. The new system requires that customers add their accounts to the Microsoft Authenticator app, which comes in both iOS and Android versions, noted Alex Simons, director of program management of the Microsoft Identity Division.
Microsoft's Timely Response to Shadow Brokers Threat Raises Questions
April 18, 2017
Just as the Shadow Brokers hacker group started crowing about a dump of never-seen-before flaws in Windows, Microsoft announced it already had fixed most of the exploits. "Today, Microsoft triaged a large release of exploits made publicly available by Shadow Brokers," said Microsoft Principal Security Group Manager Phillip Misner. "Most of the exploits are already patched."
Burger King Ad Creates Whopper of a Mess for Google Home
April 13, 2017
Burger King in essence hijacked the voice-activated Google Home speakers in some consumers' homes. In a 15-second television ad, the camera zooms in on a young man wearing the company uniform who says, "OK Google, what is the Whopper burger?" The trigger phrase for Google's AI Assistant activated Home speakers situated nearby, prompting them to read Wikipedia's description of the Whopper.
Samsung's Tizen OS Riddled With Security Holes
April 4, 2017
There are more than three dozen previously unknown flaws that pose a potential threat to consumers using some Samsung TVs, watches and phones, a security researcher has reported. Hackers could exploit the vulnerabilities found in Samsung's Tizen operating system to gain remote access and control of a variety of the company's products, according to Amihai Neiderman, head of research at Equus Software.
Why Are Health Records So Valuable to Cybercriminals?
March 29, 2017
Protecting the data in electronic health records did not start with the advent of HIPAA, as many people think. Protecting health records has been a critical requirement in the healthcare space since the computers became a fixture in hospitals. However, HIPAA added public reports of fines issued for covered entities' failure to properly protect data contained within EHRs.
UK Home Secretary: Apps Shouldn't Serve as Terrorist Hiding Places
March 27, 2017
UK Home Secretary Amber Rudd on Sunday called for greater government access to encrypted content on mobile apps. Apps with end-to-end encryption, like Facebook's WhatsApp, should not be allowed to conceal terrorists' communications from law enforcement, Rudd said in a television interview. "There should be no place for terrorists to hide," she said.
Don't Let the Next Catastrophic Phishing Scandal End Your Career
March 27, 2017
What I think is amazing about all of the massive data breaches we hear about is that we know most are not reported. For every email, customer record, or financial theft in the news, there likely are hundreds that remain in the shadows. Yet another incident came to light last week. A clever Lithuanian individual was able to pull a whopping $100 million from a bunch of unnamed Internet companies.
Group Demands Apple Pay Ransom for iCloud Credentials
March 24, 2017
Apple has received a ransom threat from a hacking group claiming to have access to data for up to 800 million iCloud accounts. The hackers, said to be a group called the "Turkish Crime Family," have threatened to reset passwords and remotely wipe the iPhones of millions of iCloud users if Apple fails to hand over a total of $700,000. They have given the company an ultimatum to respond by April 7.
WikiLeaks Exposes CIA's Device Surveillance Tricks
March 23, 2017
WikiLeaks has released more Vault 7 documentation online, including details about several CIA projects to infect Apple's Mac computer firmware and operating system. The site unloaded its first batch of stolen Vault 7 data earlier this month. The CIA's Embedded Development Branch developed malware that could persist even if the targeted computer were reformatted and its OS were reinstalled.
Crafty Phishing Technique Can Trick Even Tech-Savvy Gmail Users
March 17, 2017
Gmail users recently have been targeted by a sophisticated series of phishing attacks that use emails from a known contact. The emails contain an image of an attachment that appears to be legitimate, according to Wordfence. The sophisticated attack displays "accounts.gmail.com" in the browser's location bar and leads users to what appears to be a legitimate Google sign-in page.
Pro-Turkey Hackers Hit Prominent Twitter Accounts
March 16, 2017
Hundreds, if not thousands, of Twitter users, many of them high-profile, were hacked Tuesday by someone who appeared to support Turkey in its diplomatic row with the Netherlands. Their accounts displayed a Swastika -- reversed to face to the right -- as well as the Turkish flag and hashtags to the Nazialmanya and Nazihollanda accounts, which displayed comments on the attack.
US Charges 2 Russian Intel Agents, 2 Hackers in Yahoo Case
March 16, 2017
The Justice Department has announced charges against four individuals, including two officers of Russia's FSB, for carrying out a massive cyberbreach that affected about 500 million Yahoo account holders. A federal grand jury in Northern California charged the defendants -- the FSB officials and two Russian cybercriminals -- with using stolen data to gain illegal access to numerous accounts.
Malware Found Preinstalled on Dozens of Android Phones
March 13, 2017
Malware has been discovered preinstalled on 36 Android phones belonging to two companies, security software maker Check Point reported. "In all instances, the malware was not downloaded to the device as a result of the users' use -- it arrived with it," noted Oren Koriat, a member of Check Point's Mobile Research Team. The malicious apps were added somewhere along the supply chain.
Donald Trump Should Channel Steve Jobs on Security
March 13, 2017
We saw yet another government breach last week, and more secrets went out to WikiLeaks. I'm of a mixed mind on this one, because the CIA tools disclosed likely were emulated by others, and WikiLeaks is helping consumer technology companies ensure they no longer work. I don't know about you, but I really don't want any organization spying on me -- not even my own government.
Tech Companies Weigh Responses to WikiLeaks Exposure
March 11, 2017
Following WikiLeaks' publication earlier this week of classified documents stolen from the CIA, major technology companies, including Apple, Samsung, Microsoft and Cisco, have been scrambling to assess the risks posed to their customers by the revelations. The so-called "Vault 7" leak includes information about methods and tools the CIA crafted to hack into products produced by those companies.
Online Trust Alliance Launches IoT Security Campaign
March 8, 2017
The Online Trust Alliance is calling on businesses, consumers and government to share responsibility for ensuring that Internet of Things devices are not weaponized, outlining actions that businesses, consumers and government can take to ensure the security and privacy of IoT devices. It calls for a campaign to have retailers and consumers reject IoT products that pose a security threat.
IBM's Quantum Leap Could Redefine 'Magic'
March 6, 2017
No, I'm not talking about that Quantum Leap. IBM just made a really interesting announcement in that it is enhancing its online quantum computer systems with a new API and improving its simulator so it can handle 20 qubits. Listening to the prebriefing was a bit like pretending I was Penny trying to understand Sheldon Cooper on Big Bang Theory.
Google Invites Open Source Devs to Give E2EMail Encryption a Go
March 4, 2017
Google has released its E2EMail encryption code to open source as a way of pushing development of the technology. "Google has been criticized over the amount of time and seeming lack of progress it has made in E2EMail encryption, so open sourcing the code could help the project proceed more quickly," said Charles King, principal analyst at Pund-IT. That will not stop critics, though, he added.
Time to Get Serious About IoT Cybersecurity
March 2, 2017
Both companies and individuals will have incredible opportunities ahead with the Internet of Things. IoT is starting to combine with AI, cloud-based services, and many other new segments, creating a very fertile growing field. However, it also poses a growing threat for security. A secure IoT framework does not yet exist. That's where the new IoT Cybersecurity Alliance comes into play.
Cloudflare Nips Cloudbleed Bug in the Bud
March 1, 2017
Cloudflare has fixed the Cloudbleed software bug responsible for a buffer overrun problem that caused its edge servers to return private information in response to some HTTP requests. That private information included HTTP cookies, authentication tokens and HTTP POST bodies. However, SSL private keys weren't leaked, said Cloudflare CTO John Graham-Cumming in an online post.
Google Cracks Key Security Code, Calls for New Standard
February 24, 2017
Google on Thursday announced that its two years of collaboration with CWI resulted in the launch of a successful attack against the SHA-1 cryptographic algorithm, a widely used standard protocol used to protect sensitive data in millions of computers. The breakthrough research hows that the industry needs to send the SHA-1 standard into retirement, Google said.
What a Linux Desktop Does Better
February 23, 2017
After I resolved to adopt Linux, my confidence grew slowly but surely. Security-oriented considerations were compelling enough to convince me to switch, but I soon discovered many more advantages to the Linux desktop. For those still unsure about making the transition, or those who have done so but may not know everything their system can do, I'll showcase here some of the Linux desktop's advantages.
Verizon Cuts Better Deal for Breach-Battered Yahoo
February 21, 2017
Verizon and Yahoo on Tuesday announced new terms for the acquisition deal they inked last summer. Verizon will pay $350 million less than the original contract price, which places the new value of the deal at $4.48 billion. Yahoo will be responsible for 50 percent of any breach-related cash liabilities incurred as a result of non-SEC government investigations and third-party litigation, under the new agreement.
Microsoft Seeks Global Cybersecurity Accord
February 18, 2017
Microsoft has called on governments around the world to create a "digital Geneva Convention" as a way to normalize international cybersecurity rules and protect civilian use of the Internet. President Brad Smith, who is also Microsoft's chief legal officer, addressed the issue at the annual RSA conference held earlier this week, saying that governments need to establish international rules.
Trump's Not the Only One With a Phone Security Problem
February 17, 2017
Is your Android phone secure? President Donald Trump's favorite smartphone reportedly is an older Android device. Security concerns flared recently, following indications that he sent some tweets from it. Of course, the president has been given a special secure device, but it's not clear whether he is using it. My question is, if the president is not secure using an ordinary phone for his primary wireless communications... are any of us?
FTC's Lawsuit Should Make You Feel Very Insecure About the IoT
February 14, 2017
Even though D-Link expressly promised that many of its wireless devices had the highest level of security available, the FTC last month filed a lawsuit that alleges otherwise. The FTC filing includes copies of online marketing materials and technical specifications for D-Link's products, and flatly declares that "thousands of Defendants' routers and cameras have been vulnerable to attacks."
Dozens of iOS Apps Vulnerable to WiFi Snooping
February 9, 2017
Dozens of applications for Apple's mobile devices are vulnerable to WiFi snoopers, according to Will Strafach, CEO of the Sudo Security Group. He identified 76 popular iOS apps available at Apple's App Store that were vulnerable to wireless eavesdroppers, even though the connections were supposed to be protected by encryption. There have been 18 million downloads of the vulnerable apps, he said.
Ode to Sprint: Somebody Calls You, You Answer Quite Slowly
February 7, 2017
As I write this, I'm listening to twangy guitar music that calls up vague images of big spiny cactus, dust, and a riderless swaybacked horse. Lots of dust. I've been listening to the same few bars for 43 minutes and counting. Every few seconds, the music is interrupted by this: "We apologize for the wait. We are currently experiencing higher than normal volumes and long hold times. ..."
Calling Facebook Customer Service? Beware of Fraudsters
February 2, 2017
Googling for a Facebook customer support phone number may connect users with fraudsters. A fraudulent number reportedly appeared not only as top result in a Google search, but also as a featured snippet -- that is, highlighted in a box at the top of the search results. An investigator who called the number, posing as a Facebook customer who had been locked out of his account.
Personalization, Simplicity Key to Smart Home Device Adoption
January 26, 2017
Continued innovation and messaging are crucial for smart safety and security device manufacturers that want to capitalize on new opportunities in the emerging Internet of Things. Early adopters of smart devices are often drawn to the innovative design and technological gadgetry. However, mass market adoption depends on clear and compelling value propositions that appeal to the masses.
See More Articles in Consumer Security Section >>
Facebook Twitter LinkedIn Google+ RSS
Assuming that your profession doesn't require it, how do you feel about viewing controversial online content?
It's wrong to view a murder or suicide.
It's wrong to view a rape or child porn.
Both No. 1 and No. 2.
It's wrong to view anything that violates someone's privacy.
It's OK to view anything if you have a good reason.
It's wrong to post certain things but never wrong to view them.