Explore Technology Certificate Programs That Fit Your Needs /// Click here to learn more.
Welcome Guest | Sign In
NIST Seeks Review of Email Safety Doc
November 11, 2015
Email systems have become so routine that consumers and workers often regard them as simply part of the furniture. However, the technology is more complex than most users appreciate -- and that complexity makes it vulnerable to cyberthreats. Increased use of email has resulted in a corresponding increase in criminal and nuisance threats, NIST said in a recent advisory on email security.
Deep Learning App Targets Malware
November 10, 2015
Here's the problem with most programs aimed at killing malicious software: They need someone to tell them something's malicious. What if, however, the programs had the smarts to identify bad code on their own? That's what a company called Deep Instinct says its security solution, launched last week, can do. The offering works its magic with a technology called "deep learning."
NSA Keeps Some Security Bugs Under Its Hat
November 10, 2015
The U.S. National Security Agency is getting a collective side-eye after posting what it characterized as proactive information: the fact that it discloses 91 percent of security vulnerabilities that pass through its internal review process. While the agency appears pleased with its newfound transparency, it's being called out en masse for the things it's not reporting.
BlackBerry's Priv Puzzles the Tech World
November 9, 2015
BlackBerry on Friday released its Priv smartphone, its first Android-based device. The Android 5.1.1 Lollipop slider is driven by a Qualcomm Snapdragon 808 hexa-core processor and an Adreno 418 GPU. It's stocked with 3 GB of low-power RAM and 32 GB of storage. There's an 18-MP shooter on its backside and a 2-MP chat cam on its face.
No Time to Respond to Email? Let Google Do It
November 6, 2015
Google this week unveiled Smart Reply for Gmail on iOS and Android. It uses machine intelligence and neural networks to suggest up to three possible responses for incoming email, based on the content of those emails. The system learns from users' responses to suggestions to fine-tune its offerings. Smart Reply will be available in English in Google Play and Apple's App Store.
Film Industry Claims Victory in Shutdown of Major Piracy Sites
November 4, 2015
The Motion Picture Association of America ran a victory lap after announcing the shutdown of movie and television torrent sites Popcorn Time and YTS. The shutdowns resulted from major legal wins in Canada and New Zealand. The MPAA last month obtained injunctions against the sites in those countries, effectively blocking them from further operation.
Mobile Malware's Growth Slows, Nastiness Grows
November 4, 2015
The good news about mobile malware in 2015 is that growth has slowed down. The bad news is that the malware entering the market is more virulent than ever. While there hasn't been a sharp rise in the volume of mobile malware this year, the increasingly malicious nature of the types of malware and attacks is alarming, Blue Coat Systems said last week in its 2015 Mobile Malware Report.
NIST Seeks Business Partners to Boost Email Security
November 3, 2015
The controversy over the management of email systems by former Secretary of State Hillary Clinton has been in the spotlight since March. More recently, the CIA director acknowledged that his personal email had been hacked. Both situations highlight the vulnerability of email. That's why NIST has launched an initiative to help both public and private organizations improve email security.
BackBox Takes Its Security Tools Seriously
October 30, 2015
BackBox Linux 4.4 is a great Linux distro for IT and other techies who want to do their own penetration tests and security assessments. The latest version, released this month, is an Ubuntu 14.04.3-based distribution that's speedy and simple to use. It's a fully functional Linux distro that comes well stocked with standard software and runs a desktop environment based on the Xfce window manager.
CISA Passes Senate Despite Privacy Advocates' Fear and Loathing
October 28, 2015
The U.S. Senate on Tuesday voted 74-21 to pass the Cybersecurity Information Sharing Act, or CISA, in the face of strong opposition from legal and cybersecurity experts, the high-tech industry, privacy and civil liberties organizations, and members of the public. The Act calls for several federal agencies to share cyberthreat indicators between the public and private sectors.
Russian Sub Activity Near Internet Cables Worries US
October 27, 2015
Russian spy ships and subs reportedly are hovering close to the routes of undersea communications cables. Military and intelligence officials apparently have observed increased Russian sub activity near cables located from the North Sea to Northeast Asia, as well as in waters close to American shores. The movements suggest Russia might decide to attack those cables in times of tension or conflict.
Google Pushes Transparency for SSL Certificates
October 27, 2015
The padlock on a browser's address bar is supposed to give Net travelers some security in insecure virtual space, but some dangerous flaws lurk behind the padlock. They can weaken the effectiveness of encrypted Internet connections and compromise TLS/SSL processes, including domain validation, end-to-end encryption, and the chains of trust certificate authorities have put in place, Google said.
TalkTalk Attacked, Hit With Ransom Demand
October 23, 2015
TalkTalk on Thursday announced that it received a ransom demand following a cyberattack that may have compromised the credit card and bank details of millions of customers. "TalkTalk constantly updates its systems to make sure they are as secure as possible against the rapidly evolving threat of cybercrime, impacting an increasing number of individuals and organizations," CEO Dido Harding said.
Researcher's Demo Sheds Doubt on Fitbit Security
October 23, 2015
Fortinet security researcher Axelle Apvrille demonstrated Wednesday in a presentation at the Hack.lu conference in Luxembourg. Apvrille showed how it was possible to access a Fitbit's Bluetooth connection and, in a mere 10 seconds, infect it with a malicious packet that later could be used to infect a PC, a feat she demoed earlier this month at a hacker conference in Budapest.
Global Attacks on Mobile Networks Jeopardize Privacy, Profits
October 21, 2015
Bad actors are exploiting an obscure technology found in telecommunications networks around the world to track mobile users and engage in fraud, and they could be costing carriers millions of dollars in lost revenues. Compromise of the technology, called "SS7," can cause significant damage to the reputation and finances of carriers around the world, AdaptiveMobile noted.
Healthcare Sector Security Woefully Weak, Survey Says
October 21, 2015
The healthcare industry has become the favorite playground for many cybercriminals, suggests a report Trustwave released earlier this month. Of the 398 full-time healthcare professionals surveyed, 91 percent of information technology respondents and 77 percent of nontechnical respondents believed criminals increasingly were targeting healthcare organizations.
Report: Cybersecurity Pact Fails to Deter Chinese Hackers
October 20, 2015
The cybersecurity pact the U.S. and China agreed to last month apparently has not stopped Chinese hackers from trying to steal intellectual property from U.S. companies. "Over the last three weeks, CrowdStrike Falcon platform has detected and prevented a number of intrusions into our customers' systems from actors we have affiliated with the Chinese government," said CTO Dmitri Alperovitch.
JPEG Committee Proposal Stirs Image-DRM Fears
October 19, 2015
The JPEG Committee last week met in Brussels to discuss a proposal to secure privacy information such as metadata for published pictures, including geographical information enabling identification of people who have given anonymous interviews to journalists, and pictures posted on social media intended only for a limited audience. The proposal also seeks to address intellectual property rights.
Boffins Demo Remote Control of Siri, Google Now
October 19, 2015
Siri and other smartphone digital assistants may do your bidding -- but they may do a hijacker's as well. That's what two researchers discovered when they began to tinker with the effects of radio waves on smartphones. They could use the waves to issue commands to any Android or iOS phone running Google Now or Siri. The researchers first aired their findings at a Paris conference this summer.
Gadget Ogling: Smarter Smartphone Gaming, Modular Watches, and Vampiric Charging Cables
October 17, 2015
I don't enjoy playing complex games on a smartphone. Using the screen as both input and output device makes matters complicated, so I tend to steer clear of any game that requires more than single taps or simple swipes. There are a number of game controllers around for smartphones, however, and the Satechi Wireless Gamepad, a Bluetooth device, is compatible with iOS, Android and Windows phones.
Yahoo's New Email App Dumps Passwords
October 16, 2015
Yahoo on Thursday announced a password-free Yahoo Mail app that can manage email accounts from Outlook.com, Hotmail and AOL Mail. There was no mention of syncing with Gmail or Apple's iCloud Mail. Yahoo has been working to improve email security in the wake of repeated hacks of the service over the years, the most prominent a password theft that occurred early last year.
EU Court Decision Threatens US Cloud Dominance
October 16, 2015
Edward Snowden's legacy gained another chapter last week when the European Court of Justice rejected an agreement that created a Safe Harbor for U.S. companies handling personal data of overseas citizens. In essence, the agreement provided that a U.S. company's word that it had adequate privacy safeguards in place was all that was needed to permit overseas personal data transfers.
HP, 3M to Shield Laptop Screens From Visual Hacking
October 15, 2015
HP and 3M are collaborating on privacy screens to protect notebook PCs from visual hacking. "3M is developing an innovative light-enhancement film that can be incorporated into a system that enables light to be directed to other viewers when you want information sharing, and away from onlookers when you need private viewing," 3M spokesperson Jessica Walton said.
Mate Makes Robolinux Raptor Soar
October 14, 2015
Robolinux Mate Raptor v8.1 is a stunningly gorgeous and well-tuned operating system that soars with unmatched functionality. This release of the Robolinux line runs the newest iteration of the Gnome 2 fork desktop Mate. It is fast and slick. The integration of Mate as a modern desktop environment is growing on me -- especially the way it's paired with the really cool features in Robolinux.
Apple News Goes Dark in China
October 13, 2015
Apple recently disabled its Apple News app for users in China, according to multiple reports triggered by software developer Larry Salibra's alerts last week. Although Apple is mum on the subject, users based in China have begun complaining on the Internet about the News app being unavailable there. Salibra could not connect to the News app, and he couldn't read previously downloaded content.
Apple's App Yanking Switches On Data Monitoring Red Light
October 12, 2015
Apple last week revealed that it had removed from its App Store several apps with root certificates that could allow data monitoring. The monitoring could compromise SSL and TLS protocols, the company said. It suggested users delete the apps and their associated configuration profiles. However, it did not name the apps users should delete.
User Info Safe After LoopPay Attack, Says Samsung
October 9, 2015
Samsung has assured users that their information is safe following a computer intrusion of a key company linked to its mobile payment system. The intrusion may have occurred as early as March. Samsung purchased LoopPay for $250 million in February. Its technology allows mobile phones to perform payment card transactions with older POS terminals that recognize only cards with magnetic strips.
Verizon Supercookie to Let Advertisers Gorge on Customer Data
October 8, 2015
Verizon has announced it will begin sharing customer data with its AOL Advertising Network, triggering concerns about privacy and customer tracking. AOL will use Verizon's supercookie -- which is difficult to get rid of -- to track users. "This is a huge privacy problem, but carriers have never really cared that much about customer satisfaction," said tech analyst Rob Enderle.
Canonical Plays With Internet of Toys Idea
October 7, 2015
Canonical last week announced plans to launch the Internet of Toys, an open source initiative calling on toy makers, hackers, Internet of Things fans and innovators to build the next generation of Web-accessing toys. Participants will build the next generation of toys around open source tools such as Cylon JS, Gobot, Snappy Ubuntu Core, Snapcraft, ROS and Erle-Spider.
DDoS Attacks Create Smokescreens for Larceny
October 7, 2015
DDoS attacks have evolved from protest tool to criminal weapon. More than one in three DDoS attacks are used to plant malware or a virus on company systems, and 40 percent of them result in data theft, according to NeuStar's semiannual DDoS attack and protection report. "Until two years ago, DDoS attacks were really seen as just a disruption and annoyance tool," said NeuStar's Joe Loveless.
See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS
Should social media sites be held accountable for terrorists' communications?
Yes -- They are providing a platform to facilitate murder and mayhem.
Yes -- Everything must be done to protect society from danger.
Maybe -- I'm not sure they have the technological capability to stop them.
Maybe -- I'm not convinced terrorists are using them for serious plotting.
No -- Authorities should monitor social networks to gather intelligence.
No -- Social networks are no different than phone carriers or mail services.