OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
LinuxInsider.com
Connected Cloud Summit
China Calls for Increased Testing of IT Products
May 23, 2014
The ever-testy cyberstandoff between the U.S. and China got a new twist when Beijing announced that it would start "cybersecurity vetting of major IT products and services" used for national security and public interests. The vetting is designed to prevent suppliers from using their products to control, disrupt or shut down clients' systems, or from using the systems to scoop up information.
Google's EU Migraine Rears Up
May 21, 2014
Yeah, about that breakthrough between Google and European antitrust regulators... The European Union's antitrust chief might pursue a tougher stance on Google than the one outlined in a February agreement, which was believed to have end -- finally -- the legal circus between the two sides. Google had agreed to display rivals' links more prominently in its search results, a chief concern.
Hackers Paint Bull's-eyes on Cybercurrencies
May 19, 2014
Another digital currency was brought to its knees last week when the administrators of Doge Vault had to suspend operations after they discovered their online wallet service had been attacked by hackers. Following an investigation of the incident and the reconstruction of some of their damaged information from a backup, the administrators contacted users.
Russian Rocket, Satellite Don't Quite Make It
May 19, 2014
A space-bound satellite designed to provide Internet access to remote regions in Russia and neighboring states was destroyed when its ride blew apart mid-flight. The Proton-M rocket, affixed with a European-built Express AM4R satellite, seemed to be doing just fine until nine minutes into the flight, when it exploded some 93 miles above Earth. The exact cause of the crash apparently was not known.
Vendors Quibble With US Procurement Cybersecurity Plan
May 16, 2014
Protecting supply lines is essential to military success. But the U.S. government has now launched an initiative designed to protect the supply chain of both civilian and military agencies from potential cyberattacks. The effort will be especially important in the e-commerce procurement process. The initiative is being managed jointly by the GSA and the DoD.
Fallout Begins Following EU Google Decision
May 15, 2014
This week's European high court decision against Google was "astonishing," according to Wikipedia founder Jimmy Wales, who called it "one of the most wide-sweeping Internet censorship rulings I've ever seen." Wales, like anyone who read the ruling, noticed that the parameters for judging whether content be removed were exceptionally ambiguous. This puts Google in dilly of a pickle, Wales said.
No, Bot! UN Ponders Regulations for Killer Robots
May 14, 2014
In a move that could complicate the creation of any more Terminator movies, United Nations diplomats on Tuesday discussed international laws to govern, or simply ban, the use of killer robots. This was the first time that a UN meeting was devoted entirely to the topic, which makes sense given that the robots in question don't yet exist. That said, the UN wants to be proactive.
Psychologist: Search Results Could Sway Elections
May 13, 2014
Search engines could have a profound influence on voters, according to psychologist Robert Epstein, whose recent study chronicles the impact of what he dubbed the "search engine manipulation effect." Epstein has not produced any evidence that search engines intentionally manipulate elections. Even so, he claims the phenomenon is legit. This is not a new topic for Epstein.
John McAfee Makes Dubious Tech Comeback With Chadder Privacy App
May 07, 2014
Future Tense Central and Etransfr have debuted Chadder, an app that sends private encrypted messages. The app is one of a growing number of security products built around encryption technology and touted as secure that hit the market following Edward Snowden's massive data dump revealing the extent of the U.S. government's reach into consumers' digital lives.
The Tangled Web of IoT Security
May 06, 2014
The Internet of Things, or IoT, consists of "uniquely identifiable objects and their virtual representations in an Internet-like structure," according to Wikipedia. The IoT is "the network of physical objects accessed through the Internet," according to Cisco Systems. In addition to there being no clear definition of the IoT, estimates vary widely about the number of unique devices it includes.
Security Pros Struggle With Cyberthreat Angst
May 05, 2014
As the volume and sophistication of cyberattacks increase, system defenders in the trenches are losing confidence in their ability to protect their organizations' information assets, suggests a survey released last week. The survey of almost 5,000 global IT security pros found that 57 percent felt their organizations were unprotected from sophisticated cyberattacks.
Feds Weigh In on Cybersharing Antitrust Issues
May 01, 2014
The use and scope of information technology has grown dramatically since 2000 -- and along with that growth have come ever greater cybersecurity threats to businesses, government agencies and consumers. The need to counter actual threats, as well as to prevent potential cybersecurity problems, calls for sharing information among vulnerable parties.
Verizon Dabbles in Security Reporting
April 23, 2014
Ninety-two percent of more than 100,000 incidents reported by 50 companies over the past 10 years fall into nine basic patterns, according to Verizon's 2014 data breach investigations report. An advance copy was released to the media Tuesday. Point-of-sale intrusions, Web app attacks, cyberespionage and card skimmers cause the most concern for data disclosure, it says.
Popular UK Sports File-Sharing Site Shuttered
April 22, 2014
The Sports Torrent Network, a brazenly named file-sharing site, shut down after UK police threatened to put its operators behind bars for up to 10 years. TSTN was a hotbed for illicit broadcasts of European soccer, the National Hockey League, Formula 1 races and more. The site reportedly had about 20,000 members, making it "possibly the largest site of its type."
Heartbleed and Heartache in FOSS Town
April 21, 2014
Well it's been a wild few weeks here in the Linux blogosphere, thanks not just to XP's demise but also the long-overdue discovery of the all-pervasive Heartbleed bug. That the bug is "catastrophic" appears to be beyond dispute; in fact, "some might argue that it is the worst vulnerability found ... since commercial traffic began to flow on the Internet," as at least one commentator suggested.
Banking Trojan Enters Mobiles via Facebook
April 21, 2014
Purveyors of a notorious mobile banking Trojan have started targeting Facebook users to infect Android smartphones. The Net predators use a desktop Trojan to leverage a Facebook socializer to install banking malware on their phone, ESET malware researcher Jean-Ian Boutin discovered last week. The desktop bad app, Win32/Qadars, waits for an infected machine to open a Facebook page.
Heartbleed's Never-Ending Drip, Drip, Drip
April 21, 2014
The Heartbleed vulnerability in OpenSSL has sent just about everyone who uses the Web for fun or profit gibbering madly in search of a solution, creating fertile ground for spammers, scammers and marketing types. Canada is in an uproar following a disclosure by the Canada Revenue Agency that a hacker had exploited Heartbleed to steal about 900 social insurance numbers from it over a six-hour span.
German Media Mogul Rips Google in Open Letter
April 18, 2014
The head of one of Germany's biggest media companies penned an open letter criticizing Google, saying that his company is afraid of Google and its ever-swelling power. The letter, written by Mathias Dopfner, the chief executive of media giant Axel Springer, opines that Google's technology platforms spread more quickly and more efficiently than anything in the world -- save "biological viruses."
Internet Leeches Drawn to Heartbleed
April 14, 2014
It's been more than a week since news of the Heartbleed flaw launched a frantic scramble on the Web, but security professionals' palpitations haven't subsided. The OpenSSL Software Foundation has issued a fix, and Google, Cisco, and hordes of other companies have begun patching their products. Predictably, scammers and spammers have climbed onto the Heartbleed solution bandwagon.
White Hats Use Heartbleed to Steal Keys
April 14, 2014
The tech industry reeled last week when security researchers discovered a flaw in a key security technology in the Internet's infrastructure. The bug, ghoulishly named "Heartbleed," was found in an open source library, OpenSSL, used by the protocol, SSL, used to encrypt data in transit on the Net. By exploiting the flaw with a specially crafted packet, hackers can extract data from a server's memory in 64K chunks.

See More Articles in Cybersecurity Section >>
Facebook Twitter LinkedIn Google+ RSS