Search and compare Web Designers and Developers to build, improve or rebrand your website.
Welcome Guest | Sign In
ECommerceTimes.com
BlackBerry: The Most Important Mobile Company of the Future?
November 20, 2017
If you are like many, when you saw this headline you likely were surprised BlackBerry was still around. As BlackBerry phones left the market, the company fell out of sight. However, behind the scenes it has been moving into industries like automotive. Also, it remains the leading vendor providing mobile security to our politicians, military personnel and major corporations.
Eavesdropper Vulnerability Exposes Hundreds of Mobile Apps
November 10, 2017
Appthority has warned that up to 700 apps in the enterprise mobile environment, including more than 170 that were live in official app stores, could be at risk to due to the Eavesdropper vulnerability. Affected Android apps already may have been downloaded up to 180 million times, the firm said. The vulnerability has resulted in large-scale data exposure.
Microsoft Partners Up to Boost Windows Defender Threat Detection
November 9, 2017
Microsoft has partnered to integrate threat detection products from Bitdefender, Lookout and Ziften into Windows Defender, extending security to macOS, iOS, Linux and Android devices. No additional infrastructure will be required, Microsoft said. Once the integration is set, new events from onboard macOS, iOS, Android and Linux devices will begin surfacing on the Windows Defender ATP console.
5 Ways Etailers Can Make Online Shoppers Feel Safe
November 8, 2017
At least 145 million Americans were impacted by a data breach at Equifax that netted thieves personal information such as names, addresses, birthdates, Social Security Numbers and driver's license numbers. That pales in comparison to the earlier Yahoo breaches, which affected more than 1 billion accounts. However, those incidents may be just the tip of a very large iceberg.
WPA2 Flaw Could Blow WiFi Systems Wide Open
October 17, 2017
A security flaw in WPA2, the security protocol for most modern WiFi systems, could allow an attacker to steal sensitive data including emails, credit card numbers and passwords, Researchers at Belgian university KU Leuven reported Monday. Depending on the network configuration, the flaw also could allow an attacker to inject or manipulate information in the system.
LogicHub CPO Monica Jain: Focus on Results
October 11, 2017
"I was always interested in analyzing the data," said LogicHub Chief Product Officer Monica Jain. "I was introduced to a company that was a pioneer in the market, and that's where my career in security started. I fell in love with security because it's all about finding and analyzing the data, and about crunching the data. That's how I started with security. I've never left it since then."
OpenWorld 2017
October 10, 2017
I spent last week at Oracle's OpenWorld 2017 in San Francisco. When I wasn't drinking from an information fire hose, it was alternately fascinating and exhausting. There were major announcements in database, blockchain, artificial intelligence, cybersecurity, and other stuff I'm associated with only tangentially. For instance, my eyes glaze over when they start talking about bare metal servers.
Small Companies Often in the Dark About Cyberattacks
October 10, 2017
Nearly 60 percent of small businesses have been the victims of a cyberattack over the past year, but the vast majority didn't realize that they had been attacked, according to Nationwide's third annual survey of 1,069 businesses with fewer than 299 employees. Initially, only 13 percent of the participating companies said they had been victims of a cyberattack.
Android Devs May Follow Apple's Face ID Lead
October 9, 2017
Apple's use of facial recognition to unlock its iPhone X may open the gates for developers champing at the bit to bring the technology to the Android world. Face ID, which will replace fingerprint scanning in Apple's new iPhone X, uses Apple's TrueDepth 3D camera to verify the owner of a phone. Android developers have been working on similar systems, said Sensible Vision CEO George Brostoff.
HPE Gave Russia Deep Dive Into Security Software Used by Pentagon
October 6, 2017
Hewlett Packard Enterprise has allowed experts working with Russia to review the source code of cybersecurity software that is used by the U.S. Defense Department. The Pentagon uses HPE's ArcSight software to protect sensitive computer networks. The review of its code was conducted by Russian firm Echelon on behalf of a Russian defense agency that deals with cybersecurity issues.
RoboCyberWall Aims to Block Linux Server Hacks
October 4, 2017
RoboCyberWall has launched its proprietary precision firewall solution bearing the same name. RoboCyberWall is designed to protect HTTP and HTTPS ports on Linux-based Apache2 and NGINX Web servers. The patent-pending firewall blocks all known exploits and zero-day attacks on Apache2 and NGINX Web servers, according to the developer. The Linux server firewall solution targets small and mid-sized business users.
'Invisible' Technologies: What You Can't See Can Hurt You
October 3, 2017
There are times when it seems like technology can work almost too well. Now, if working too well sounds to you like an impossibility, reflect that there's more to a technology than end-user experience. In addition to the experience of using the technology, there are other considerations that play a role: things like maintenance, operations and ongoing support.
Malware Embedded in CCleaner Tool Puts Millions at Risk
September 19, 2017
Malicious code has been discovered in two versions of Piniform's CCleaner housekeeping utility, the company disclosed on Monday. Piniform is owned by Avast, whose security products are used by more than 400 million people. The malware infecting CCleaner could give hackers control over the devices of more than 2 million users. CCleaner is designed to rid computers and mobile phones of junk.
FTC Confirms Probe Into Equifax Data Breach
September 15, 2017
In a rare move, the U.S. Federal Trade Commission on Thursday confirmed that it has opened an investigation into the data breach at Equifax that compromised the sensitive personal information of 143 million U.S. consumers. The FTC announcement came less than a week after Equifax revealed that an unknown party had gained access to names, addresses, Social Security Numbers and other data belonging to nearly half the U.S. population.
Apache Mounts Strong Defense, Equifax Retreats
September 12, 2017
The Apache Software Foundation has responded to accusations that the massive data breach Equifax disclosed last week resulted from a flaw in Apache's open source code. One of the largest financial data breaches in U.S. history, it exposed names, addresses, Social Security Numbers, birth dates, driver's license numbers and other sensitive information belonging to 143 million U.S. consumers.
Credit Agency Equifax Cracked, 143 Million Consumers Exposed
September 8, 2017
Consumer credit reporting agency Equifax suffered a major criminal data breach that exposed personal information of as many as 143 million consumers in the U.S. between mid-May and July of this year. The attack exposed a range of sensitive personal data, including names, addresses, Social Security Numbers, dates of birth, and in some cases driver's license numbers, Equifax said.
Global Cyberattack on Energy Sector Stokes Deep Fears
September 7, 2017
The hacker group known as "Dragonfly" is behind sophisticated wave of recent cyberattacks on the energy sectors of Europe and North America, Symantec reported. The attacks could provide the group with the means to severely disrupt energy operations on both continents. Dragonfly launched a simililar campaign from 2011 to 2014, but it entered a quiet period in 2014 after its activities were exposed.
Consumers Gain More Power to Seek Data Breach Damages
August 21, 2017
There are no good outcomes of an electronic data system breach. At best, companies dealing with e-commerce technologies face the formidable task and the resulting cost of repairs. In addition having to fix information technology systems, companies suffering breaches may be increasingly vulnerable to legal action taken by customers whose personal data was affected.
The War Room: Experiential Security Planning
August 16, 2017
Ask any security practitioner about ransomware nowadays, and chances are good you'll get an earful. Recent outbreaks like Petya and WannaCry have left organizations around the world reeling, and statistics show that ransomware is on the rise. For example, 62 percent of participants surveyed for ISACA's recent "Global State of Cybersecurity" survey experienced a ransomware attack in 2016.
HBO Cyberattack Driven By Mysterious Motives
August 3, 2017
HBO on Wednesday admitted that it had been targeted by a cyberattack, confirming an anonymous email the alleged hackers distributed to media outlets last weekend. Among the content that may have been compromised were upcoming episodes of the series Ballers, Barry and Room 104, along with script outlines of the channel's hit show Games of Thrones.
Open Source Flaw 'Devil's Ivy' Puts Millions of IoT Devices at Risk
July 21, 2017
Millions of IoT devices are vulnerable to cybersecurity attacks due to a vulnerability initially discovered in remote security cameras. Senrio found the flaw in a security camera developed by Axis Communications, one of the world's biggest manufacturers of the devices. The Model 3004 security camera is used for security at the Los Angeles International Airport, according to Senrio.
Petya's Ransomware Cloaking Device
July 11, 2017
Recent ransomware threats have escalated into a global crisis, and cybersecurity experts and government authorities have redoubled their investigative efforts. Of grave concern is the possibility that the recent Petya attack had more sinister motives than typical ransomware operations, and that state actors were involved behind the scenes. The Petya attack actually used ransomware as a cover.
Petya Ransomware Sinks Global Businesses Into Chaos
June 28, 2017
A new ransomware exploit dubbed "Petya" struck major companies and infrastructure sites this week, following last month's WannaCry ransomware attack, which struck more than 300,000 computers worldwide. Petya is believed to be linked to the same set of hacking tools as WannaCry. Petya already has impacted a Ukrainian international airport and shut down radiation monitoring systems at Chernobyl.
Cyberattackers Kick Down a Few Parliament Email Doors
June 27, 2017
The United Kingdom's Parliament on Monday reported a cyberattack on its email system over the weekend, when hackers attempted to access user accounts without authorization. Due to the "robust measures" in place to protect the legislative body's accounts and networks, fewer than 1 percent of the 9,000 accounts on the network were compromised, officials said. Accounts that were compromised reportedly had weak passwords.
Sudo or Sudo Not, There Is No (4th) Try
June 24, 2017
If you're a Linux user, at some point in some tutorial or troubleshooting guide you've more than likely encountered Linux's magic word: "sudo". A casual observer probably can tell you that it's used to access restricted functions on your computer, but there is much more to it than that. My hope is that by taking a moment to learn about the power of "sudo", you will be better equipped to use it.
3 WannaCry Talking Points to Win Security Buy-In
June 21, 2017
By this point, most technology practitioners -- and nearly all security practitioners -- know about WannaCry. In fact, you might be sick of people analyzing it, rehashing it, sharing "lessons learned" about it, and otherwise laying out suggestions -- in some cases, contradictory -- about what you might do differently in the future. The level of unsolicited advice can border on the annoying.
Microsoft Buys Hexadite to Toughen Windows Security
June 9, 2017
Microsoft on Thursday said it has agreed to buy a Hexadite, which incorporates artificial intelligence in its automated responses to cyberthreats. The acquisition will help bolster the company's efforts to help commercial Windows 10 customers deal with advanced attacks on their networks, Microsoft said. The acquisition will include Hexadite's endpoint security automated remediation.
Hacking and Linux Go Together Like 2 Keys in a Key Pair
May 31, 2017
Ever since taking an interest Linux, with the specific aim of better understanding and enhancing my personal digital security, I have been fascinated by hacker conferences. As soon as I learned of their existence, I made a point of keeping tabs on the major conferences so I could browse through the latest videos in their archive once each one wraps up. I thought that was the closest I would get.
Crate.io Packs New Features, Services Into DB Upgrade
May 17, 2017
Crate.io on Tuesday announced an upgrade to its open source CrateDB, and introduced a commercial version. The database now is available as a managed service as well. CrateDB 2.0 features clustering enhancements and SQL improvements. The enterprise edition adds authentication and authorization features for enhanced security, which are not provided in the open source version.
Massive Ransomware Attack Reaps Meager Profits
May 17, 2017
The WannaCry ransom attack that quickly circled the globe last week is not yet fully contained. So far, it has impacted more than 300,000 computers in 150 countries. However, one of the remarkable things about it is that only a trifling $100,000 in ransom, give or take, apparently has been paid. That represents a surprisingly low response from an attack generally considered the biggest ever.
See More Articles in Enterprise Security Section >>
Facebook Twitter LinkedIn Google+ RSS
What effect is social media having on the current discussion of sexual misconduct?
It's enabling many more people to engage in serious discussions.
It's functioning mostly as an echo chamber.
It's giving everyone a voice.
It's creating much more divisiveness.
It's enabling a cultural re-education.
It's making my news feed so unpleasant I'm staying away.