OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
LinuxInsider.com
5 IT Security Implementation Myths
May 19, 2015
There's a common perception that implementing comprehensive IT security to protect against today's sophisticated threats and attacks is a difficult and expensive task, and that the benefits of replacing current solutions (even if highly ineffective) are seldom worthwhile. This mindset has resulted in many businesses dealing with a virtual patchwork of disparate systems.
Researcher's Airplane-Hacking Claims May Not Fly
May 19, 2015
A security researcher who last month bragged he'd hacked into a passenger jet's internal computer systems while in flight appears to have performed the act more than a dozen times over a three-year period. Chris Roberts, founder and CTO of One World Labs, told FBI investigators earlier this year that he'd hacked into the flight systems of commercial passenger aircraft from 15-20 times.
FireEye, Microsoft Outsmart Clever Chinese Malware
May 15, 2015
FireEye and Microsoft have scotched a scheme by a group of cybercriminals based in China to use an IT pro forum to hide malicious activity, according to a report released Thursday. The Chinese gang known as "APT17" devised the scheme, which uses forum pages and profiles on Microsoft's TechNet, to cover traffic from machines infected with the group's Black Coffee malware.
Feds Value - but Don't Always Use - Big Data Tools for Cybersecurity
May 13, 2015
U.S. government agencies can significantly improve their ability to deal with cybersecurity problems by utilizing big data analytics. However, agencies are finding it difficult to fully benefit from these advanced analytical tools for a variety of reasons -- including dealing with the sheer volume of data. Cyberthreats hide in plain sight, suggests a recent report from MeriTalk.
Big Data Analytics Fights Insider Threats
May 13, 2015
Cyberdefenders for years have adopted Fort Apache strategies to protect their networks. Strong perimeters could prevent attackers from reaching precious data, they reasoned. As technology marched on, however, the idea of an impermeable wall became as quaint as the Maginot Line on the eve of World War II. Firewalls alone no longer were strong enough to keep data safe.
FAA's Next-Generation Air Transportation System Falters
May 11, 2015
The United States Federal Aviation Administration last week came under fire once again for problems with the implementation of its troubled Next Generation Air Transportation System. The NextGen program to overhaul the U.S. national air traffic control system, estimated to cost $29 billion between 2013 and 2030, long has been the target of congressional wrath.
Federal Appeals Court Rules NSA's Phone Data-Vacuuming Illegal
May 7, 2015
A U.S. Court of Appeals has ruled, in essence, that the NSA's collection of metadata concerning Americans' communications is illegal. The court vacated U.S. District Judge William Pauley's December 2013 ruling in ACLU v. Clapper, and remanded the case to the lower court. "The Second Circuit found the government incorrect in many of its arguments," said ACLU Staff Attorney Patrick Toomey.
Report: Top Endpoint Security Packages Perfectly Foil Drive-By Attacks
May 5, 2015
Drive-by attacks on the Internet are a particularly pernicious form of online threat, especially for individual Web surfers. On the corporate level, though, a company with good endpoint protection software can foil the malicious practice. A drive-by occurs when an infected website automatically downloads malware onto a Net traveler's computer. Endpoint solutions can thwart those kinds of attacks.
Our Bodies, Our Security: Biometrics vs. Passwords
May 4, 2015
Text-based usernames and password pairs should be replaced with biometric credentialing, such as vein recognition and ingestible security tokens, suggests Johnathan LeBlanc, PayPal's global head of developer evangelism. Celebrities have been mortified, Sony Pictures Entertainment brought to its knees, and Home Depot sent scrambling to EuroPay Mastercard Visa's chip and pin earlier than mandated.
Apple Watch Could Be a Password Alternative
April 30, 2015
With password tolerance levels at an all time low, alternatives to the pesky and insecure authenticators are beginning to abound. One of those alternatives could be the Apple Watch. Even before Apple's latest gadget began shipping last week, MicroStrategy announced it was extending its Usher enterprise security solution to the Apple Watch. Usher on the Apple Watch allows it to act as a digital key.
IoT: Why Security Pros Need to Prepare Now
April 29, 2015
Have you ever heard of the Cullinan diamond? If you haven't, it was the largest diamond ever discovered: a 3106 carat diamond found in 1905 in South Africa. What's interesting about the Cullinan diamond isn't so much the discovery of the stone itself but what happened afterward: specifically, the cutting of the diamond. The Cullinan diamond was split into a number of smaller pieces.
Other Shoe Drops in White House Security Breach
April 28, 2015
Last year's breach of unclassified White House computer systems reportedly was far more intrusive than initially thought and included the theft of some presidential correspondence. No classified systems were compromised, including the servers that control message traffic from the president's BlackBerry. However, much of the information the unclassified servers handle is considered sensitive.
VCs Cough Up $100M for Cybersecurity Startup Illumio
April 23, 2015
Illumio, a 2-year-old cybersecurity startup, last week announced it had raised $100 million in a Series C round of financing, bringing its total funding over the past 27 months to more than $142 million. Illumio will use the fresh funds to meet demand for its Adaptive Security Platform software, to invest in R&D, to grow sales and marketing efforts, and to fuel international expansion.
Breach Outbreaks Fuel Encryption Adoption
April 22, 2015
As data breaches make headlines around the world, more companies are turning to encryption to protect their information jewels. That is one of the findings in a study released Monday, conducted by the Ponemon Institute and sponsored by Thales E-Security. "Mega breaches and cyber attacks have increased companies' urgency to improve their security posture," says the report.
Government Surveillance: What to Do, What to Do?
April 21, 2015
The CIA has been trying to hack into iOS for years. British and American agencies reportedly have collaborated to create a map of the Internet and Web users. The United States National Security Agency has, together with the UK's GCHQ, reportedly stolen SIM card encryption keys from Gemalto. The FBI is frothing at the mouth over Google's and Apple's encryption of their mobile OSes.
US Navy Gears Up for Cyberwarfare
April 20, 2015
The U.S. Fleet Cyber Command, part of the U.S. 10th Fleet, reportedly is developing a strategy for modernizing its cyberoperations and transforming the Navy's network into a cyberwarfare platform. The need for a stronger cybersecurity approach has been underlined by the penetration of U.S. government networks by hackers, the most recent of which was an attack on unsecured White House computers.
Your Lawyer Is Vulnerable to Cyberattacks
April 20, 2015
Lawyers help their clients as they negotiate confidential business transactions, hold intellectual property, manage funds and litigate disputes, among many other business activities. In the ordinary course of business, lawyers also maintain numerous confidential documents and data of and about their clients. Lawyers therefore have a big bull's-eye drawn on their backs, visible to cybercriminals.
China's Great Cannon Could Point Anywhere When Next Fuse Is Lit
April 16, 2015
China, which censors the Internet with its Great Firewall aka the "Golden Shield," has a new censorship tool that is causing alarm. It's known as the "Great Cannon." The University of Toronto's Citizen Lab identified the tool in a report released last week. The Great Cannon was first used in March, to launch a large-scale DDoS attack on GitHub and GreatFire.org, Citizen Lab said.
Opening Windows Source Code Could Improve Security
April 16, 2015
Microsoft Technical Fellow Mark Russinovich raised a few eyebrows at ChefCon earlier this month, when he aired the possibility of Windows becoming an open source program. Sure, Microsoft's attitude toward the open source movement has mellowed over the years, but the prospect of the company rubbing elbows with the likes of Linux overloads the imagination.
Heartbleed Threat Won't Fade Away
April 9, 2015
This week marks the first anniversary of the Heartbleed vulnerability that caused a panic across the Internet last year. While the flaw appears to have faded from the recollections of Net denizens, it still poses danger at many sites in cyberspace. Heartbleed was discovered in April 2014 in an open source library, OpenSSL, used by the SSL protocol.
John Oliver Tackles Surveillance in Surprise Snowden Scoop
April 6, 2015
Comedy talk show host John Oliver boldly went where few journalists from the mainstream media have dared to tread, grilling whistle-blower Edward Snowden about his leaking of thousands of NSA documents to the press. He raked Snowden over the coals for not having read every one of the documents, insisting there's a difference between understanding what's in documents and reading them.
Obama Draws Cyber Line in Sand
April 2, 2015
President Barack Obama on Wednesday signed an executive order that gives the Secretary of Treasury the authority to impose sanctions on entities found responsible for or complicit in carrying out a cyberattack harmful to U.S. interests. The Secretary of Treasury will have to consult with the Secretary of State and the Attorney General before enacting the powers granted under the order.
Proposed Amendments to US Cybersecurity Laws Under Scrutiny
March 31, 2015
The White House in January proposed updates to the Computer Fraud and Abuse Act that have stirred controversy within the cybersecurity industry. "If the proposed legislation were to be enacted, it would certainly have a chilling effect on cybersecurity research," said Chris Doggett, managing director at Kaspersky Lab North America.
GitHub Defenses Hold in 4-Days-and-Counting Battle
March 30, 2015
After battling a DDoS attack for four days, GitHub has restored normal service levels. The primary target of the assault is GreatFire.org, which is hosted on GitHub. GreatFire has attracted the ire of the Chinese government for offering anticensorship tools. "Very clearly, the Cyberspace Administration of China is behind both of the recent DDoS attacks," said GreatFire Co-founder Charles Smith.

See More Articles in Cybersecurity Section >>
Facebook Twitter LinkedIn Google+ RSS
Is Microsoft starting to get cool again?
Yes - thanks to Satya Nadella's vision.
Yes - but only in certain areas, like AI and VR.
Maybe - it doesn't seem as stodgy as before.
No - it never was.