No One Can Afford an Attack - Find the best Cybersecurity Pros to Protect Your Business Data
Welcome Guest | Sign In
ECommerceTimes.com
Are Smart TV Designs Taking Home Security for Granted?
February 15, 2018
Millions of smart TVs from Samsung and some streaming devices from Roku recently were found to be vulnerable to cyberattacks, allowing intruders to take control and remotely change channels and volume settings, among other things, according to Consumer Reports research. Vulnerabilities were discovered not only in Samsung televisions, but also in TVs from TCL and other Roku-compatible brands.
Microsoft to Use Blockchain to Create Decentralized ID System
February 14, 2018
Microsoft has announced a plan to use blockchain technology to develop decentralized identities, or DIDs. Microsoft formally joined the ID2020 Alliance last month as a founding member. The Alliance aims to develop a blockchain-based identity system for vulnerable populations -- one that can operate across various blockchains, cloud providers, government agencies and other organizations.
Leak of Stale iOS Source Code Could Trigger Fresh Problems
February 9, 2018
Apple lawyers have sent a copyright violation notice to Github, following the publication of leaked iOS 9 source code on the site. Though iOS 9 is dated, it's possible that the leaked code could be used to jailbreak older devices or worse. Publication of the code violated Apple's rights under the DMCA, the attorneys wrote, demanding that the iBoot source code be removed.
Open Up the Source Code to Lock Down Your Data
February 8, 2018
Meaningful security is more than an app or an OS. It's a mindset. Linux security tools by themselves will not make you or anyone more secure. Security requires trade-offs in convenience, so the tools I'll highlight here are not recommended as "daily drivers." Only you can determine your ideal balance point. Perhaps the single greatest strength of Linux is that it is open source.
WiFi Routers Riddled With Holes: Report
February 6, 2018
Most WiFi router vendors have not patched numerous firmware vulnerabilities discovered more than two years ago, according to a new report. OEM firmware built into WiFi routers use open source components that contain numerous known security vulnerabilities that can be exploited by hackers. Insignary conducted comprehensive binary code scans for known security vulnerabilities in WiFi routers.
Intel Reports Progress on Patch-Related Performance Issues
January 25, 2018
Intel appears to have encountered some daylight in its struggle to fix performance issues related to the Meltdown and Spectre vulnerabilities. The company has identified the root cause on its older Broadwell and Haswell platforms, according to Navin Shenoy, general manager of Intel's data center group. Intel has begun rolling out a solution to its industry partners for testing, Shenoy said.
Ominous Processor Vulnerabilities Could Put Most Computers at Risk
January 4, 2018
Nearly a dozen cybersecurity researchers this week reported two potentially serious exploits of vulnerabilities that exist in most modern processors. Three teams independently discovered and reported the Meltdown exploit. Two teams independently discovered and reported the Spectre exploit. The Meltdown and Spectre exploits could used to capture sensitive information on devices.
Zealot Loads Cryptocurrency Miner on Linux, Windows Machines
December 22, 2017
A new Apache Struts campaign that researchers named "Zealot" has come to light in recent weeks. Zealot loads Windows or Linux-based machines by installing a miner for Monero, which has become one of the hottest cryptocurrencies used in recent malware attacks. Zealot uses NSA-linked EternalBlue and EternalSynergy exploits, according to the F5 Labs researchers who discovered the campaign.
What Amazon's Abuse of Power Foreshadows for 2018
December 18, 2017
Given how many big names have fallen over the last few weeks due to sexual misconduct, abuse and harassment, you'd think I'd name 2017 as the year of power abuse. However, while I know a lot of folks think the issue is dying down, I don't see that at all. There are entire industries that have yet to be hit by this, and Congress hasn't even finished cleaning house or putting in place rules to prevent this activity.
New Open Source Tools Test for VPN Leaks
December 13, 2017
ExpressVPN on Tuesday launched a suite of open source tools that let users test for vulnerabilities that can compromise privacy and security in virtual private networks. Released under an open source MIT License, they are the first-ever public tools to allow automated testing for leaks on VPNs, the company said. The tools are written primarily in Python, and available for download on Github.
Oops... Some HP Laptops Shipped With Hidden Keylogger
December 12, 2017
Some HP laptops users came with a preinstalled program to capture the keystrokes of users, a security researcher recently discovered. The researcher, Michael Myng aka "ZwClose," discovered the keylogger software while trying to solve a keyboard problem for a friend. The software is turned off by default. After Myng contacted HP about the program, it quickly released a patch to get rid of it.
MacOS High Sierra Flaw Creates High Anxiety
November 29, 2017
Apple has released a security update to fix a serious flaw revealed via Twitter. The patch is available for macOS High Sierra 10.13.1. macOS 10.12.6 and earlier versions aren't affected. "This morning, as of 8 a.m., the update is available for download, and, starting later today, it will be immediately automatically installed on all systems running MacOS High Sierra 10.13.1," Apple said.
Risky Scripts Pose Threat to Web Surfers, Say Researchers
November 28, 2017
A popular technique used by website operators to observe the keystrokes, mouse movements and scrolling behavior of visitors on Web pages is fraught with risk. The technique offered by a number of service providers uses scripts to capture the activity of a visitor on a Web page, store it on the provider's servers, and play it back on demand for a website's operators.
BlackBerry: The Most Important Mobile Company of the Future?
November 20, 2017
If you are like many, when you saw this headline you likely were surprised BlackBerry was still around. As BlackBerry phones left the market, the company fell out of sight. However, behind the scenes it has been moving into industries like automotive. Also, it remains the leading vendor providing mobile security to our politicians, military personnel and major corporations.
Newly Revealed Flaw Could Subject IoT Devices to Airborne Attacks
November 17, 2017
Billions of voice-activated IoT devices may be subject to external attack due to BlueBorne vulnerabilities, Armis revealed. Hackers could exploit BlueBorne to mount an airborne attack, using Bluetooth to spread malware and access critical data, including sensitive personal information. More than 20 million Amazon Echo and Google Home smart speakers could have been impacted by the flaws.
Eavesdropper Vulnerability Exposes Hundreds of Mobile Apps
November 10, 2017
Appthority has warned that up to 700 apps in the enterprise mobile environment, including more than 170 that were live in official app stores, could be at risk to due to the Eavesdropper vulnerability. Affected Android apps already may have been downloaded up to 180 million times, the firm said. The vulnerability has resulted in large-scale data exposure.
Microsoft Partners Up to Boost Windows Defender Threat Detection
November 9, 2017
Microsoft has partnered to integrate threat detection products from Bitdefender, Lookout and Ziften into Windows Defender, extending security to macOS, iOS, Linux and Android devices. No additional infrastructure will be required, Microsoft said. Once the integration is set, new events from onboard macOS, iOS, Android and Linux devices will begin surfacing on the Windows Defender ATP console.
Amazon Cloud Cam Joins Burgeoning Smart-Home Ecosystem
November 9, 2017
Amazon has begun shipping its latest smart home product, a security camera that works with its Alexa personal assistant and Echo speakers. The Amazon Cloud Cam allows customers to live-stream activity inside their home 24/7. It features 1080p full HD resolution, two-way audio for communicating with family members or pets, night vision technology, and sophisticated identification algorithms.
5 Ways Etailers Can Make Online Shoppers Feel Safe
November 8, 2017
At least 145 million Americans were impacted by a data breach at Equifax that netted thieves personal information such as names, addresses, birthdates, Social Security Numbers and driver's license numbers. That pales in comparison to the earlier Yahoo breaches, which affected more than 1 billion accounts. However, those incidents may be just the tip of a very large iceberg.
Marcher Malware Poses Triple Threat to Android Users
November 7, 2017
A three-pronged banking malware campaign has been infecting Android phones since the beginning of this year, according to Proofpoint. Attackers have been stealing credentials, planting the Marcher banking Trojan on phones, and nicking credit card information. So far, they have targeted customers of BankAustria, Raiffeisen Meine Bank and Sparkasse, but the campaign could spread beyond Vienna.
iPhone X Delivers on Apple's Promises and That's Plenty, Say Reviewers
November 1, 2017
Reviews of Apple's next generation iPhone X have started appearing online, and for the most part, critics have showered praise on the product. "The iPhone X is clearly the best iPhone ever made," wrote Nilay Patel. "It's thin, it's powerful, it has ambitious ideas about what cameras on phones can be used for, and it pushes the design language of phones into a strange new place."
Fake News: Amazon Wants a Key to Your House
October 30, 2017
I'm getting tired of headlines that present something you might want to do as something you'd have to be crazy to do. Last week was a case in point: Headline after headline shouted out that Amazon wanted to get a key to your house. The initial reaction was hell no -- but the reality is far more nuanced. You see, there are a lot of folks who live in places where their front entrance isn't secure.
Amazon to Let Delivery Drivers Open Your Front Door
October 26, 2017
Amazon has announced a new service that will allow Prime members to receive in-home delivery of packages with the help of high-tech smart locks that allow drivers to open their front doors. Amazon Key will launch officially on Nov. 8 in 37 U.S. cities and surrounding communities, with additional locations to be added over time. The service will be available at no extra cost to Prime members.
Apple May Have Fudged iPhone X's Face ID
October 25, 2017
Apple reportedly has reduced the accuracy of the iPhone X Face ID feature to speed up production. It's not clear how much the new specs will reduce Face ID's efficacy, but if the reporting is accurate, there could be problems recognizing changes in facial hair, glasses and other ancillary features, suggested Gerrit Schneemann, senior analyst at IHS Markit. "That would be a real problem."
Google Aims to Turbocharge Online Checkout
October 24, 2017
Google on Monday rolled out an online payment service that's designed to accelerate the online checkout process. While the new offering isn't quite Amazon One-Click, it will eliminate many of the annoying steps that can slow down the online purchase process and often result in abandoned shopping carts. Pay with Google uses address and credit or debit card information users provide to Google to speed them through checkout.
WPA2 Flaw Could Blow WiFi Systems Wide Open
October 17, 2017
A security flaw in WPA2, the security protocol for most modern WiFi systems, could allow an attacker to steal sensitive data including emails, credit card numbers and passwords, Researchers at Belgian university KU Leuven reported Monday. Depending on the network configuration, the flaw also could allow an attacker to inject or manipulate information in the system.
Android Devs May Follow Apple's Face ID Lead
October 9, 2017
Apple's use of facial recognition to unlock its iPhone X may open the gates for developers champing at the bit to bring the technology to the Android world. Face ID, which will replace fingerprint scanning in Apple's new iPhone X, uses Apple's TrueDepth 3D camera to verify the owner of a phone. Android developers have been working on similar systems, said Sensible Vision CEO George Brostoff.
Malware Embedded in CCleaner Tool Puts Millions at Risk
September 19, 2017
Malicious code has been discovered in two versions of Piniform's CCleaner housekeeping utility, the company disclosed on Monday. Piniform is owned by Avast, whose security products are used by more than 400 million people. The malware infecting CCleaner could give hackers control over the devices of more than 2 million users. CCleaner is designed to rid computers and mobile phones of junk.
FTC Confirms Probe Into Equifax Data Breach
September 15, 2017
In a rare move, the U.S. Federal Trade Commission on Thursday confirmed that it has opened an investigation into the data breach at Equifax that compromised the sensitive personal information of 143 million U.S. consumers. The FTC announcement came less than a week after Equifax revealed that an unknown party had gained access to names, addresses, Social Security Numbers and other data belonging to nearly half the U.S. population.
How Many Ways Might iPhone X's Face ID Go Wrong?
September 14, 2017
When Apple unveiled its iPhone X on Tuesday, officials highlighted the device's advanced functionality, including what truly could be a game changing feature, its facial recognition technology. The new handset allows users to unlock it simply by looking at it. The 10th anniversary edition of Apple's flagship mobile device is the first Apple handset to utilize Face ID.
See More Articles in Consumer Security Section >>
Facebook Twitter LinkedIn Google+ RSS
If the FAA approved the use of autonomous drones as passenger "air taxis" for short commutes, how interested would you be in riding in them?
Very -- too much of my life is wasted in clogged traffic.
Not interested -- even if they were safe, they would be ridiculously expensive.
I'm looking forward to them -- smart machines will save human lives.
I'm skeptical -- but if they proved reasonably safe, I'd get on board.
I'd use them -- human pilots could take over remotely if necessary.
No way -- I would want a human on board to take over in an emergency.
Content Marketing on ALL EC