Find Software and Service Providers on ALL EC Ecommerce Exchange
Welcome Guest | Sign In
ECommerceTimes.com
Cyberthieves Train Their Sights on US Mobile Phone Customers
August 29, 2017
A relatively new form of cybercrime recently has been plaguing American consumers. Thieves have been hijacking mobile phone account numbers and then transferring services to a different device. Further, hackers have begun using mobile numbers to raid digital wallets and similar accounts. This type of theft has been successful even against the most sophisticated of consumers.
Google Connects Mobile Searchers to Depression Assessment Tool
August 25, 2017
The National Alliance on Mental Illness on Wednesday announced that Google on mobile now provides people who search for the term "clinical depression" with a direct link to the PHQ-9 questionnaire used by medical professionals in the United States to evaluate patients for the disorder. People can conduct a self-assessment by filling in the questionnaire online.
The Smart Home Appliance and You
August 22, 2017
The recent rumor that iRobot had engaged in talks with Apple, Amazon and Google parent Alphabet to sell the data its Roomba vacuum cleaner gathers caused widespread privacy concerns. Roomba maps homes -- the spatial dimensions of rooms and distances between furniture and other objects -- and the data it collects would be valuable to any of the major players battling to control the smart home.
Consumers Gain More Power to Seek Data Breach Damages
August 21, 2017
There are no good outcomes of an electronic data system breach. At best, companies dealing with e-commerce technologies face the formidable task and the resulting cost of repairs. In addition having to fix information technology systems, companies suffering breaches may be increasingly vulnerable to legal action taken by customers whose personal data was affected.
The War Room: Experiential Security Planning
August 16, 2017
Ask any security practitioner about ransomware nowadays, and chances are good you'll get an earful. Recent outbreaks like Petya and WannaCry have left organizations around the world reeling, and statistics show that ransomware is on the rise. For example, 62 percent of participants surveyed for ISACA's recent "Global State of Cybersecurity" survey experienced a ransomware attack in 2016.
Is the Path to Secure Elections Paved With Open Source Code?
August 8, 2017
Increased use of open source software could fortify U.S. election system security, according to former CIA head R. James Woolsey and Bash creator Brian J. Fox. The two made their case for open source elections software after security researchers demonstrated how easy it was to crack some election machines at the recent DefCon hacking conference in Las Vegas.
It's a Whole New World With Alexa
August 7, 2017
Voice computing is replacing the graphical user interface, Shawn DuBravac, chief economist of the Consumer Technology Association, said early this year at CES. Digital assistants will be integrated into many household objects, he noted. About 5 million voice-activated digital voice products had been sold as of January, and Bravac estimated 5 million more would be sold this year.
WannaCry Hero Arrested on Kronos Malware Charges
August 5, 2017
In a stunning twist, U.S. authorities have arrested a British cyber-researcher credited with stopping the spread of the WannaCry ransomware virus on charges he helped develop and deploy the Kronos banking trojan that attacked financial institutions around the world in 2014. A federal grand jury in Wisconsin last month handed down a six-count indictment against Marcus Hutchins, a citizen of the UK.
HBO Cyberattack Driven By Mysterious Motives
August 3, 2017
HBO on Wednesday admitted that it had been targeted by a cyberattack, confirming an anonymous email the alleged hackers distributed to media outlets last weekend. Among the content that may have been compromised were upcoming episodes of the series Ballers, Barry and Room 104, along with script outlines of the channel's hit show Games of Thrones.
Comcast, Google Can Publish Users' Email Contents
August 2, 2017
Comcast's Terms of Service for its Xfinity Internet service gives it, its agents, suppliers and affiliates the right to "reproduce, publish, distribute and display" the content worldwide. It also lets third parties copy, republish or distribute material posted or transmitted using Xfinity Internet. This would include confidential information sent by a company employee or an independent contractor.
EPIC Claims Google Violates Consumer Privacy in FTC Complaint
August 1, 2017
A new technology that Google uses to track billions of credit card transactions is unsafe, overly intrusive, and possibly in violation of federal law, according to a complaint EPIC filed Monday with the FTC. EPIC urged the FTC to investigate Google over its Store Sales Management program, criticizing it as unfair and deceptive to consumers, and lacking an easy way to opt out.
Russian Head of $4B Bitcoin Exchange Charged in Massive Money Laundering Scheme
July 28, 2017
A grand jury in the Northern District of California indicted a Russian man for running a massive money laundering operation through the BTC-e bitcoin exchange, a group of federal officials announced Wednesday. The exchange allegedly received up to $4 billion in proceeds from various criminal activities, including the 2014 hack of the Mt. Gox bitcoin exchange.
Microsoft Releases Long-Awaited Security Tool, Sets Linux Preview
July 25, 2017
Microsoft has released its long-awaited cloud-based bug detection tool, previously code-named "Project Springfield." The Windows version became generally available, and a new Linux version became available as a preview last week. The tool, Microsoft Security Risk Detection, uses artificial intelligence to hunt down security vulnerabilities in software that is about to be released.
Open Source Flaw 'Devil's Ivy' Puts Millions of IoT Devices at Risk
July 21, 2017
Millions of IoT devices are vulnerable to cybersecurity attacks due to a vulnerability initially discovered in remote security cameras. Senrio found the flaw in a security camera developed by Axis Communications, one of the world's biggest manufacturers of the devices. The Model 3004 security camera is used for security at the Los Angeles International Airport, according to Senrio.
V2V's Place in an Increasingly Connected World
July 21, 2017
You're probably tired of reading that the Internet of Things is the hottest thing going, and that IoT is a boon to technology and, simultaneously, a potential disaster for security and privacy. However, over the past few years, another IoT-related technology has been growing: vehicle to vehicle. V2V is a way for automobiles to communicate directly with other vehicles on the road.
Vendor Exposes Millions of Verizon Customers on Amazon Cloud
July 17, 2017
Verizon, the largest wireless carrier in the U.S., has confirmed that data belonging to about six million of its wireless customers was exposed after the information mistakenly was allowed to remain unprotected on an Amazon cloud server. The disclosure follows reports that an engineer at Nice Systems allowed the data of 14 million Verizon customers to reside on an Amazon Web Services S3 bucket.
Amazon's Echo Show: The Future Is Here
July 13, 2017
Amazon recently launched its Echo Show, which brings a visual screen to its smart speaker device. I wonder whether we're ready to start living in what seems like a futuristic Star Trek world. The Echo Show experience is sort of like having a laptop sitting on your table -- one that uses AI, allows you to speak to it, speaks back to you, and shows you relevant things on its screen.
Petya's Ransomware Cloaking Device
July 11, 2017
Recent ransomware threats have escalated into a global crisis, and cybersecurity experts and government authorities have redoubled their investigative efforts. Of grave concern is the possibility that the recent Petya attack had more sinister motives than typical ransomware operations, and that state actors were involved behind the scenes. The Petya attack actually used ransomware as a cover.
IoT Fuels Growth of Linux Malware
July 5, 2017
Malware targeting Linux systems is growing, largely due to a proliferation of devices created to connect to the Internet of Things. That is one of the findings in a report WatchGuard Technologies released last week. The report, which analyzes data gathered from more than 26,000 appliances worldwide, found three Linux malware programs in the top 10 for the first quarter of the year.
Google Gives Up Scanning Personal Gmail
June 30, 2017
Google recently announced the end of its policy of scanning user emails for targeted advertising purposes -- a controversial practice that riled privacy advocates and spurred legal challenges. Gmail is the world's most widely used email provider, with more than 1.2 billion users. Google attributed its decision to gains it has made in the enterprise.
Petya Ransomware Sinks Global Businesses Into Chaos
June 28, 2017
A new ransomware exploit dubbed "Petya" struck major companies and infrastructure sites this week, following last month's WannaCry ransomware attack, which struck more than 300,000 computers worldwide. Petya is believed to be linked to the same set of hacking tools as WannaCry. Petya already has impacted a Ukrainian international airport and shut down radiation monitoring systems at Chernobyl.
Cyberattackers Kick Down a Few Parliament Email Doors
June 27, 2017
The United Kingdom's Parliament on Monday reported a cyberattack on its email system over the weekend, when hackers attempted to access user accounts without authorization. Due to the "robust measures" in place to protect the legislative body's accounts and networks, fewer than 1 percent of the 9,000 accounts on the network were compromised, officials said. Accounts that were compromised reportedly had weak passwords.
Sudo or Sudo Not, There Is No (4th) Try
June 24, 2017
If you're a Linux user, at some point in some tutorial or troubleshooting guide you've more than likely encountered Linux's magic word: "sudo". A casual observer probably can tell you that it's used to access restricted functions on your computer, but there is much more to it than that. My hope is that by taking a moment to learn about the power of "sudo", you will be better equipped to use it.
OTA Report: Consumer Services Sites More Trustworthy Than .Gov Sites
June 22, 2017
The Online Trust Alliance on Tuesday released its 2017 Online Trust Audit & Honor Roll. Among its findings: Consumer services sites have the best combined security and privacy practices. FDIC 100 banks and U.S. government sites are the least trustworthy, according to the audit. The number of websites that qualified for the honor roll is at a nine-year high.
3 WannaCry Talking Points to Win Security Buy-In
June 21, 2017
By this point, most technology practitioners -- and nearly all security practitioners -- know about WannaCry. In fact, you might be sick of people analyzing it, rehashing it, sharing "lessons learned" about it, and otherwise laying out suggestions -- in some cases, contradictory -- about what you might do differently in the future. The level of unsolicited advice can border on the annoying.
Deep Root Analytics Downplays Giant Voter Data 'Oops'
June 20, 2017
A data contractor working on behalf of the Republican National Committee earlier this month allowed the personal data of 198 million voters to be exposed online, marking the largest ever leak of voter data in history. Deep Root Analytics exposed 1.1 terabytes of sensitive information -- including names, home addresses, dates of birth, phone numbers and voter registration information.
Apple Centers Health Data Strategy on iPhone
June 19, 2017
Apple quietly has been strategizing to expand its growing healthcare business to include the management of digital health records, with the iPhone operating as a central data hub. Apple reportedly has been in talks with numerous health industry groups that are involved in setting standards for the storage and sharing of electronic medical records, in a way that would give consumers more control.
The Art of Manipulation and Misdirection
June 19, 2017
Last week, I listened to an economist talk about Apple's complaints that Qualcomm had charged Apple too much for access to patents. What was fascinating was that Apple had folks focused on the 5 percent Qualcomm had charged it instead of on the massive profit that Apple made on each phone. The price of the iPhone 8 likely will be well over $1,000 -- but it could cost well under $500 to build.
Broader Scope of Russian Election Cyberattacks Revealed
June 15, 2017
Federal and state officials have confirmed that cyberattacks against state voting systems during the 2016 election were more widespread than previously disclosed to the public, but they said the heightened activity did not impact final vote tallies. The confirmations follow a report that attempts to influence the 2016 presidential election were much greater than previously disclosed.
Securing Your Linux System Bit by Bit
June 13, 2017
As daunting as securing your Linux system might seem, one thing to remember is that every extra step makes a difference. It's almost always better to make a modest stride than let uncertainty keep you from starting. Fortunately, there are a few basic techniques that greatly benefit users at all levels, and knowing how to securely wipe your hard drive in Linux is one of them.
See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS
Which of these tech companies has the greatest *positive* impact on society?
Amazon
Apple
Facebook
Google
IBM
Microsoft
Twitter