Our Full-Service B2B Marketing Program Delivers Sales-Ready Leads Click to Learn More!
Welcome Guest | Sign In
ECommerceTimes.com
New Firefox Extension Builds a Wall Around Facebook
March 28, 2018
Mozilla has announced Facebook Container, a Firefox browser extension that is designed to segregate users' activity on Facebook from their other Web activity, limiting Facebook's ability to track them and gather personal data. The extension is the culmination of more than two years of research into developing a more private browsing experience, Mozilla said.
US Charges 9 Iranians in Massive Academic Research Theft
March 27, 2018
The DoJ has charged nine Iranian nationals for engaging in a massive phishing campaign on behalf of the Iranian Revolutionary Guard. The allegations include the theft of $3.4 billion in research and intellectual property from 320 colleges and universities in the U.S. and abroad, as well as from 47 foreign and domestic companies, plus several federal agencies, state governments, and the UN.
Facebook Phone-Scraping Takes Users by Surprise
March 27, 2018
Facebook on Sunday confirmed that its Messenger and Lite apps for Android smartphones routinely collect call and text histories. The call and text history logging are opt-in features for people using Messenger or Facebook Lite on Android devices, the company said in a post. The feature is designed to help users stay connected, and it improves the Facebook experience, according to the company.
Brit Lawmakers Want Cambridge Analytica's Nix to Explain a Few Things
March 23, 2018
British lawmakers want Alexander Nix, the suspended chief executive of Cambridge Analytica, to return to Parliament for additional questioning in its fake news inquiry. The Parliament's probe led to disclosures that Facebook had allowed Cambridge Analytica unauthorized access to up to 50 million user records, igniting a firestorm over user data privacy and possible U.S. voter manipulation.
Researcher Cracks 'Hacker-Proof' Crypto Wallet
March 22, 2018
A virtual currency hardware wallet with millions of users has been compromised. Saleem Rashid explained how he cracked the firmware on the wallet produced by Ledger using what's known as a "supply chain" attack. That means a targeted device is compromised before any users get their hands on it. The attack on Ledger's $100 Nano S wallet creates a backdoor on the device.
#DeleteFacebook Movement Gathers Steam
March 21, 2018
Many Facebook members reportedly have shuttered their accounts following reports that Cambridge Analytica, a voter profiling company working for Donald Trump's presidential campaign, harvested data from 50 million users, unbeknownst to them. Indignation over Facebook's role in the data leak has mushroomed, and some users have taken to Twitter to announce their liberation from the social network.
Nest Builds More Security, Flexibility Into Smart Home Products
March 20, 2018
The Nest Hello video doorbell and the Nest x Yale Lock are now available, along with a new Nest Temperature Sensor -- the latest addition to the company's smart home lineup. Owners of the Hello video doorbell can use the Nest app for iOS or Android to see and converse with people without opening their door. The x Yale Lock -- a tamper-proof, key-free deadbolt -- also connects with the Nest app.
Facebook Faces Multiple Government Probes in Massive Data Scandal
March 20, 2018
EU, UK and U.S. officials have ratcheted up the pressure on Facebook over a user data scandal that threatens to engulf the company. The president of the European Parliament, Antonio Tajani, summed up the stakes in a tweet on Tuesday: "Facebook needs to clarify before the representatives of 500 million Europeans that personal data is not being used to manipulate democracy."
German Court's Privacy Ruling Against Facebook Will Have Far-Reaching Effects
March 14, 2018
Facebook has millions of users in the European Union, and a German court recently ruled against the company in a case involving its Privacy Policy. Few ever read privacy policies except judges, who must examine them when challenges arise. The new EU General Data Protection Regulations, which go into effect on May 25, will make things even more complicated. If you have any customers who are EU residents, the new GDPR will impact you.
Data Storage, Privacy and Metaphysics: SC Weighs Arguments in MS Case
March 13, 2018
How far does the long arm of U.S. law enforcement extend when government agencies seek electronically processed information? The U.S. Supreme Court recently addressed that issue in an intriguing session covering global electronic connectivity, the law, and the significance of national borders. The discussion came during last month's oral arguments in U.S. v. Microsoft.
Russians Pose as Americans to Steal Data on Social Media
March 8, 2018
Americans have been targeted on social media by Russian agents on a mission to harvest personal information. The agents pretended to work for organizations promoting African-American businesses as a ruse to obtain personal information from black business owners during the 2016 presidential election campaign. Using names like "BlackMattersUS," the agents set up hundreds of social media accounts.
Kali Linux Security App Lands in Microsoft Store
March 6, 2018
Kali Linux, a penetration testing app from Offensive Security, has become available in the Microsoft Store. Windows 10 users can download and install the Kali Linux app onto the Windows Subsystem for Linux. Microsoft last summer announced that WSL, which makes it possible to run operating systems like Ubuntu, would become a fully supported part of the Windows 10 Fall Creators Update.
Amazon Buys Ring to Make Homes, Deliveries More Secure
March 2, 2018
Amazon has agreed to buy Ring for $1 billion, the companies have disclosed. Ring users already could use the Echo Show to see and hear visitors at the front door. The deal means Ring can further its "mission to reduce crime in neighborhoods by providing effective yet affordable home security tools to our neighbors that make a positive impact on our homes, our communities and the world," Ring said.
Fileless Malware: Why You Should Care
March 2, 2018
It's a truism that just like organizations adapt, so too do criminals. Anyone who has ever seen a Wells Fargo commercial knows that there was a time when stagecoaches were a normative method for transporting cash and valuables. But what modern criminals in their right mind would attempt robbing a Brink's truck on horseback? That strategy might have worked well in the days of the Pony Express.
SC Justices to Hear Arguments in Microsoft, DoJ Data Privacy Face-Off
February 27, 2018
The U.S. Supreme Court on Tuesday will hear oral arguments in a landmark case over whether federal law enforcement can force Microsoft to hand over email stored in an overseas data center as evidence in a drug-trafficking case. The case, United States of America v. Microsoft Corporation, which dates back to 2013, is viewed as a potentially groundbreaking showdown over data privacy.
5 Effective Ways SMB Etailers Can Battle Fraud
February 26, 2018
Fraud is a major concern for 72 percent of businesses, according to Experian's Global Fraud and Identity Report. More than 5,500 consumers and 500 business executives in 11 markets around the world participated in the survey. The situation has not been improving, as six out of 10 businesses experienced the same losses to fraud as they did a year ago -- or more.
AI's Malicious Potential Front and Center in New Report
February 22, 2018
As beneficial as AI can be, it has its dark side, too. That dark side is the focus of a new 100-page report. AI will be used by threat actors to expand the scale and efficiency of their attacks, it predicts. They will employ it to compromise physical systems and to broaden their privacy invasion and social manipulation capabilities. Novel attacks are to be expected.
3 Cybersecurity Threats SMB Etailers Should Not Ignore
February 16, 2018
Some small e-commerce website operators may think their relative obscurity offers protection, but the fact is that SMBs are especially vulnerable to cyberattacks and malware. "Very often small businesses don't feel vulnerable to cyberthreats because they assume cybercriminals prefer to launch attacks on large companies," said Stephanie Weagle, VP of Corero.
Are Smart TV Designs Taking Home Security for Granted?
February 15, 2018
Millions of smart TVs from Samsung and some streaming devices from Roku recently were found to be vulnerable to cyberattacks, allowing intruders to take control and remotely change channels and volume settings, among other things, according to Consumer Reports research. Vulnerabilities were discovered not only in Samsung televisions, but also in TVs from TCL and other Roku-compatible brands.
SentinelOne Debuts Unified OS Threat Protection
February 15, 2018
SentinelOne this week announced a partnership with Microsoft to bolster threat protection for mixed platform users, making computing safer for Linux machines in a multiplatform workplace. SentinelOne will integrate its Endpoint Protection Platform with Microsoft's Windows Defender Advanced Threat Protection service to cover Mac and Linux device platforms.
Microsoft to Use Blockchain to Create Decentralized ID System
February 14, 2018
Microsoft has announced a plan to use blockchain technology to develop decentralized identities, or DIDs. Microsoft formally joined the ID2020 Alliance last month as a founding member. The Alliance aims to develop a blockchain-based identity system for vulnerable populations -- one that can operate across various blockchains, cloud providers, government agencies and other organizations.
Leak of Stale iOS Source Code Could Trigger Fresh Problems
February 9, 2018
Apple lawyers have sent a copyright violation notice to Github, following the publication of leaked iOS 9 source code on the site. Though iOS 9 is dated, it's possible that the leaked code could be used to jailbreak older devices or worse. Publication of the code violated Apple's rights under the DMCA, the attorneys wrote, demanding that the iBoot source code be removed.
Open Up the Source Code to Lock Down Your Data
February 8, 2018
Meaningful security is more than an app or an OS. It's a mindset. Linux security tools by themselves will not make you or anyone more secure. Security requires trade-offs in convenience, so the tools I'll highlight here are not recommended as "daily drivers." Only you can determine your ideal balance point. Perhaps the single greatest strength of Linux is that it is open source.
WiFi Routers Riddled With Holes: Report
February 6, 2018
Most WiFi router vendors have not patched numerous firmware vulnerabilities discovered more than two years ago, according to a new report. OEM firmware built into WiFi routers use open source components that contain numerous known security vulnerabilities that can be exploited by hackers. Insignary conducted comprehensive binary code scans for known security vulnerabilities in WiFi routers.
Alphabet's New Chronicle Promises to Speed Threat Data Analysis
January 30, 2018
Alphabet has launched Chronicle, a new cybersecurity venture, following two years of development at the Alphabet X research lab. Chronicle will include VirusTotal, a Google-owned cybersecurity and intelligence platform and malware intelligence service. The idea behind Chronicle stems from the fact that many companies receive many more security alerts per day than they can handle.
Don't Pay the Hackers
January 30, 2018
If you follow security news, you may have noticed a disturbing trend. Last year, we learned that Uber paid attackers $100,000 to keep under wraps their stealth of the personal information of 50 million Uber riders. More recently, we learned that Hancock Health paid approximately $55,000 in bitcoin to bring hospital systems back online. The payment of ransoms could be more common than it appears.
Free Linux Tool Monitors Systems for Meltdown Attacks
January 27, 2018
SentinelOne has released Blacksmith, a free Linux tool that can detect Meltdown vulnerability exploitation attempts. The company has been working on a similar tool to detect Spectre vulnerability attacks. Though free, Blacksmith is not open source. SentinelOne decided to expedite its development in-house to save time, said Raj Rajamani, vice president of product management.
Intel Reports Progress on Patch-Related Performance Issues
January 25, 2018
Intel appears to have encountered some daylight in its struggle to fix performance issues related to the Meltdown and Spectre vulnerabilities. The company has identified the root cause on its older Broadwell and Haswell platforms, according to Navin Shenoy, general manager of Intel's data center group. Intel has begun rolling out a solution to its industry partners for testing, Shenoy said.
New Open Source Mobile OS Puts Privacy Front and Center
January 5, 2018
A renowned Linux innovator has developed a new mobile operating system, called "Project eelo," in an effort to provide a level of data privacy that traditional Android and iOS devices fail to offer. The new eelo system will allow mobile phone users to regain control over their personal information at a price they can afford, said Gael Duval, who created Mandrake Linux back in 1998.
Ominous Processor Vulnerabilities Could Put Most Computers at Risk
January 4, 2018
Nearly a dozen cybersecurity researchers this week reported two potentially serious exploits of vulnerabilities that exist in most modern processors. Three teams independently discovered and reported the Meltdown exploit. Two teams independently discovered and reported the Spectre exploit. The Meltdown and Spectre exploits could used to capture sensitive information on devices.
See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS
Freshsales - HiveXchange
What best describes your attitude toward social networks and politics?
The value of engaging in serious political discourse outweighs the negatives.
Most of the political conversations seem overheated and ignorant.
Social networks provide a lot of very good political information from reliable sources.
Almost every political post I see is skewed or totally fake.
Political interactions on social networks simply mirror those in the real world.
Social networks remove inhibitions, bringing out the worst in people and politics.