No One Can Afford an Attack - Find the best Cybersecurity Pros to Protect Your Business Data
Welcome Guest | Sign In
ECommerceTimes.com
Snapchat May Risk Connecting Apps, Despite Facebook Uproar
March 31, 2018
Snapchat soon may have a Connected Apps feature that is similar to the functionality at the heart of the Cambridge Analytica brouhaha, which has sparked congressional scrutiny and consumer backlash. The latest beta features a new tab within the setting page. The page displays the following text: "These apps are connected to your Snapchat account. Choose an app to control what it has access to."
Atlanta Works to Break Ransomware Hold
March 30, 2018
Nearly a week after it became the target of one of the largest ransomware attacks to date, the City of Atlanta has made progress toward recovery, but it is still far from business as usual. Hackers encrypted many of the city government's vital data and computer systems. Mayor Keisha Lance Bottoms characterized the ransomware attack as "a hostage situation."
Facebook Takes Baby Steps Toward Rebuilding Trust
March 29, 2018
Facebook has introduced a set of changes designed to empower members to protect their account information. The company has been at the center of an unrelenting firestorm following revelations that it allowed Cambridge Analytica to mine private data belonging to 50 million of its users without permission, which Cambridge Analytica then leveraged for political purposes.
FTC Signals Tougher Stance on Mobile Privacy Protection
March 29, 2018
Mobile device makers and telecom service providers need to make significant privacy protection improvements for their customers, says the FTC. Its recent report could become the basis for agency enforcement actions -- not only for smartphones, but also for other mobile devices. "The report is a clear signal to the industry to focus on this issue," said Gerard Stegmaier, a partner at Reed Smith.
New Firefox Extension Builds a Wall Around Facebook
March 28, 2018
Mozilla has announced Facebook Container, a Firefox browser extension that is designed to segregate users' activity on Facebook from their other Web activity, limiting Facebook's ability to track them and gather personal data. The extension is the culmination of more than two years of research into developing a more private browsing experience, Mozilla said.
US Charges 9 Iranians in Massive Academic Research Theft
March 27, 2018
The DoJ has charged nine Iranian nationals for engaging in a massive phishing campaign on behalf of the Iranian Revolutionary Guard. The allegations include the theft of $3.4 billion in research and intellectual property from 320 colleges and universities in the U.S. and abroad, as well as from 47 foreign and domestic companies, plus several federal agencies, state governments, and the UN.
Facebook Phone-Scraping Takes Users by Surprise
March 27, 2018
Facebook on Sunday confirmed that its Messenger and Lite apps for Android smartphones routinely collect call and text histories. The call and text history logging are opt-in features for people using Messenger or Facebook Lite on Android devices, the company said in a post. The feature is designed to help users stay connected, and it improves the Facebook experience, according to the company.
Brit Lawmakers Want Cambridge Analytica's Nix to Explain a Few Things
March 23, 2018
British lawmakers want Alexander Nix, the suspended chief executive of Cambridge Analytica, to return to Parliament for additional questioning in its fake news inquiry. The Parliament's probe led to disclosures that Facebook had allowed Cambridge Analytica unauthorized access to up to 50 million user records, igniting a firestorm over user data privacy and possible U.S. voter manipulation.
Researcher Cracks 'Hacker-Proof' Crypto Wallet
March 22, 2018
A virtual currency hardware wallet with millions of users has been compromised. Saleem Rashid explained how he cracked the firmware on the wallet produced by Ledger using what's known as a "supply chain" attack. That means a targeted device is compromised before any users get their hands on it. The attack on Ledger's $100 Nano S wallet creates a backdoor on the device.
#DeleteFacebook Movement Gathers Steam
March 21, 2018
Many Facebook members reportedly have shuttered their accounts following reports that Cambridge Analytica, a voter profiling company working for Donald Trump's presidential campaign, harvested data from 50 million users, unbeknownst to them. Indignation over Facebook's role in the data leak has mushroomed, and some users have taken to Twitter to announce their liberation from the social network.
Nest Builds More Security, Flexibility Into Smart Home Products
March 20, 2018
The Nest Hello video doorbell and the Nest x Yale Lock are now available, along with a new Nest Temperature Sensor -- the latest addition to the company's smart home lineup. Owners of the Hello video doorbell can use the Nest app for iOS or Android to see and converse with people without opening their door. The x Yale Lock -- a tamper-proof, key-free deadbolt -- also connects with the Nest app.
Facebook Faces Multiple Government Probes in Massive Data Scandal
March 20, 2018
EU, UK and U.S. officials have ratcheted up the pressure on Facebook over a user data scandal that threatens to engulf the company. The president of the European Parliament, Antonio Tajani, summed up the stakes in a tweet on Tuesday: "Facebook needs to clarify before the representatives of 500 million Europeans that personal data is not being used to manipulate democracy."
German Court's Privacy Ruling Against Facebook Will Have Far-Reaching Effects
March 14, 2018
Facebook has millions of users in the European Union, and a German court recently ruled against the company in a case involving its Privacy Policy. Few ever read privacy policies except judges, who must examine them when challenges arise. The new EU General Data Protection Regulations, which go into effect on May 25, will make things even more complicated. If you have any customers who are EU residents, the new GDPR will impact you.
Data Storage, Privacy and Metaphysics: SC Weighs Arguments in MS Case
March 13, 2018
How far does the long arm of U.S. law enforcement extend when government agencies seek electronically processed information? The U.S. Supreme Court recently addressed that issue in an intriguing session covering global electronic connectivity, the law, and the significance of national borders. The discussion came during last month's oral arguments in U.S. v. Microsoft.
Russians Pose as Americans to Steal Data on Social Media
March 8, 2018
Americans have been targeted on social media by Russian agents on a mission to harvest personal information. The agents pretended to work for organizations promoting African-American businesses as a ruse to obtain personal information from black business owners during the 2016 presidential election campaign. Using names like "BlackMattersUS," the agents set up hundreds of social media accounts.
Kali Linux Security App Lands in Microsoft Store
March 6, 2018
Kali Linux, a penetration testing app from Offensive Security, has become available in the Microsoft Store. Windows 10 users can download and install the Kali Linux app onto the Windows Subsystem for Linux. Microsoft last summer announced that WSL, which makes it possible to run operating systems like Ubuntu, would become a fully supported part of the Windows 10 Fall Creators Update.
Amazon Buys Ring to Make Homes, Deliveries More Secure
March 2, 2018
Amazon has agreed to buy Ring for $1 billion, the companies have disclosed. Ring users already could use the Echo Show to see and hear visitors at the front door. The deal means Ring can further its "mission to reduce crime in neighborhoods by providing effective yet affordable home security tools to our neighbors that make a positive impact on our homes, our communities and the world," Ring said.
Fileless Malware: Why You Should Care
March 2, 2018
It's a truism that just like organizations adapt, so too do criminals. Anyone who has ever seen a Wells Fargo commercial knows that there was a time when stagecoaches were a normative method for transporting cash and valuables. But what modern criminals in their right mind would attempt robbing a Brink's truck on horseback? That strategy might have worked well in the days of the Pony Express.
SC Justices to Hear Arguments in Microsoft, DoJ Data Privacy Face-Off
February 27, 2018
The U.S. Supreme Court on Tuesday will hear oral arguments in a landmark case over whether federal law enforcement can force Microsoft to hand over email stored in an overseas data center as evidence in a drug-trafficking case. The case, United States of America v. Microsoft Corporation, which dates back to 2013, is viewed as a potentially groundbreaking showdown over data privacy.
5 Effective Ways SMB Etailers Can Battle Fraud
February 26, 2018
Fraud is a major concern for 72 percent of businesses, according to Experian's Global Fraud and Identity Report. More than 5,500 consumers and 500 business executives in 11 markets around the world participated in the survey. The situation has not been improving, as six out of 10 businesses experienced the same losses to fraud as they did a year ago -- or more.
AI's Malicious Potential Front and Center in New Report
February 22, 2018
As beneficial as AI can be, it has its dark side, too. That dark side is the focus of a new 100-page report. AI will be used by threat actors to expand the scale and efficiency of their attacks, it predicts. They will employ it to compromise physical systems and to broaden their privacy invasion and social manipulation capabilities. Novel attacks are to be expected.
3 Cybersecurity Threats SMB Etailers Should Not Ignore
February 16, 2018
Some small e-commerce website operators may think their relative obscurity offers protection, but the fact is that SMBs are especially vulnerable to cyberattacks and malware. "Very often small businesses don't feel vulnerable to cyberthreats because they assume cybercriminals prefer to launch attacks on large companies," said Stephanie Weagle, VP of Corero.
Are Smart TV Designs Taking Home Security for Granted?
February 15, 2018
Millions of smart TVs from Samsung and some streaming devices from Roku recently were found to be vulnerable to cyberattacks, allowing intruders to take control and remotely change channels and volume settings, among other things, according to Consumer Reports research. Vulnerabilities were discovered not only in Samsung televisions, but also in TVs from TCL and other Roku-compatible brands.
SentinelOne Debuts Unified OS Threat Protection
February 15, 2018
SentinelOne this week announced a partnership with Microsoft to bolster threat protection for mixed platform users, making computing safer for Linux machines in a multiplatform workplace. SentinelOne will integrate its Endpoint Protection Platform with Microsoft's Windows Defender Advanced Threat Protection service to cover Mac and Linux device platforms.
Microsoft to Use Blockchain to Create Decentralized ID System
February 14, 2018
Microsoft has announced a plan to use blockchain technology to develop decentralized identities, or DIDs. Microsoft formally joined the ID2020 Alliance last month as a founding member. The Alliance aims to develop a blockchain-based identity system for vulnerable populations -- one that can operate across various blockchains, cloud providers, government agencies and other organizations.
Leak of Stale iOS Source Code Could Trigger Fresh Problems
February 9, 2018
Apple lawyers have sent a copyright violation notice to Github, following the publication of leaked iOS 9 source code on the site. Though iOS 9 is dated, it's possible that the leaked code could be used to jailbreak older devices or worse. Publication of the code violated Apple's rights under the DMCA, the attorneys wrote, demanding that the iBoot source code be removed.
Open Up the Source Code to Lock Down Your Data
February 8, 2018
Meaningful security is more than an app or an OS. It's a mindset. Linux security tools by themselves will not make you or anyone more secure. Security requires trade-offs in convenience, so the tools I'll highlight here are not recommended as "daily drivers." Only you can determine your ideal balance point. Perhaps the single greatest strength of Linux is that it is open source.
WiFi Routers Riddled With Holes: Report
February 6, 2018
Most WiFi router vendors have not patched numerous firmware vulnerabilities discovered more than two years ago, according to a new report. OEM firmware built into WiFi routers use open source components that contain numerous known security vulnerabilities that can be exploited by hackers. Insignary conducted comprehensive binary code scans for known security vulnerabilities in WiFi routers.
Alphabet's New Chronicle Promises to Speed Threat Data Analysis
January 30, 2018
Alphabet has launched Chronicle, a new cybersecurity venture, following two years of development at the Alphabet X research lab. Chronicle will include VirusTotal, a Google-owned cybersecurity and intelligence platform and malware intelligence service. The idea behind Chronicle stems from the fact that many companies receive many more security alerts per day than they can handle.
Don't Pay the Hackers
January 30, 2018
If you follow security news, you may have noticed a disturbing trend. Last year, we learned that Uber paid attackers $100,000 to keep under wraps their stealth of the personal information of 50 million Uber riders. More recently, we learned that Hancock Health paid approximately $55,000 in bitcoin to bring hospital systems back online. The payment of ransoms could be more common than it appears.
See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS
How does the tech industry compare to other industries when it comes to diversity?
Tech firms have been working much harder than others to achieve diversity.
Tech is rife with sexism, racism, homophobia and other forms of discrimination.
The tech industry would be more inclusive if there were more qualified applicants.
Tech firms have made superficial efforts but they're mainly for show.
The push for diversity is a cultural fad, and there is no real problem.