OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
LinuxInsider.com
Yikes! Ransomware Could Take Over Your Hard Drive
January 5, 2015
Malware is running rampant on the Internet, affecting smartphones, tablets and PCs. Relatively new malware allows bad guys to encrypt devices until a ransom is paid. Usually the ransom is required in bitcoin, rather than U.S. currency, as it cannot be traced. What are the legal and other risks associated with ransomware? Ransomware is largely directed at personal devices and small businesses.
Hackers Give Touch ID the Finger
December 29, 2014
Hacker Jan Krissler, aka "Starbug," this weekend told attendees at the 31st Chaos Computer Club convention that he had replicated the fingerprints of German Defense Minister Ursula von der Leven using a standard photo camera and commercially available software. Krissler used a close-up of a photo of the minister's thumb and other pictures taken at different angles during a press event in October.
Misfortune Cookie Crumbles Millions of Security Systems
December 29, 2014
Check Point Software Technologies recently revealed a flaw in millions of routers that allows the devices to be controlled by hackers. The company detected 12 million Internet-connected devices that have the flaw. The vulnerability, which Check Point dubbed "Misfortune Cookie," can be found in the code of a commonly used embedded Web server, RomPager from AllegroSoft.
The Big Tech Stories of 2015
December 29, 2014
Last week, we looked back at the largely untold, or under told, stories of 2014. This week, let's look ahead to some of the stories that are coming in 2015. We'll have robots, self-driving cars, armed autonomous drones, the professional proliferation of head mounted cameras, some scandals, and some interesting political implications. I'll close with my product of the year, which even surprised me.
Boeing Picks BlackBerry to Brace Black's Security
December 22, 2014
Boeing has enlisted BlackBerry to help bolster the security of its Black smartphone by providing "secure mobile solutions for Android devices utilizing their BES-12 platform," said Boeing spokesperson Andrew Lee. BES 12 provides cross-platform enterprise mobile management that gives organizations strict control of devices, while letting users keep personal data private.
BlackBerry Bucks Up Its Loyal Base With Classic Comeback
December 17, 2014
BlackBerry has unveiled the BlackBerry Classic, a handset with a full QWERTY physical keyboard, physical navigation keys, and a design that can be best described as "retro," in that its appearance is virtually identical to the BlackBerry Bold. The Classic, which is smaller than the company's recently launched Passport smartphone, targets users who still long for the traditional BlackBerry handset.
FIDO Pursues Vision of a Password-Free World
December 17, 2014
A group of some 150 companies last week moved closer to eliminating the bane of many an online user: the ubiquitous password. The FIDO Alliance, which counts among its members Microsoft, PayPal, Google, Bank of America, Visa and MasterCard, released version 1.0 of its open specifications for strong authentication on the Internet without the use of passwords.
No Respite for Sony
December 12, 2014
Since the hacker group calling itself "Guardians of Peace" announced its attack on Sony Pictures Entertainment late last month, things have gone downhill for the company. After confidential documents were leaked to the Internet over several days, a denouement of sorts was reached last week, when a security company examining the stolen data discovered nearly 50,000 Social Security numbers.
FIDO Alliance Launches 'Password Killer' Spec
December 11, 2014
The Google-supported FIDO Alliance this week achieved a key milestone in its mission to end the use of passwords by releasing version 1.0 of its namesake open standard. "Today, we celebrate an achievement that will define the point at which the old world order of passwords and PINs started to wither and die," said Michael Barrett, president of the alliance. FIDO stands for "Fast IDentity Online."
Blackphone to Peddle a Few Good Apps
December 10, 2014
Blackphone plans to open an app store for privacy-focused applications to run on its secure smartphone. The store is expected to launch in January. The Blackphone runs PrivatOS, a modified version of Android 4.4.2 that comes bundled with tools that encrypt phone calls, texts, emails and Internet browsing. The app store will feature curated apps selected for their security and privacy chops.
Dashlane, LastPass Promise Easy Password Changing
December 10, 2014
Two password manager makers on Tuesday announced new features that allow their users to minimize the hassle of resetting passwords. One of the first things online users are advised to do after a data breach -- and there have been more than few of those lately -- is to change their passwords. Few users act on that advice, though, because password changing is too onerous.
Turla Trojan Unearthed on Linux
December 9, 2014
Turla, a Trojan that has infected hundreds of 32- and 64-bit Windows computers at government institutions, embassies, military installations, educational institutions, and research and pharmaceutical companies over the years, has been found on Linux systems, Kaspersky Lab reported. The company has discovered two variants of the malware running on Linux.
Sony's Cyber-Whodunit Is a Page-Turner
December 5, 2014
Who breached Sony Pictures' network and why continues to be a puzzle a week after news of the hack first emerged. Some speculate it was an inside job. A few have pointed fingers at North Korea, which returned its own one-finger salute in response. Others discount that possibility. In the meantime, the FBI has issued a warning stating destructive malware is on the loose.
Iran Raises Its Cyberfist to the World
December 4, 2014
Iran, which for decades has locked horns with the United States, is emerging as a cyberwarfare power that's threatening the world, Cylance warned in its Operation Cleaver report, released Tuesday. Cylance has been tracking one team of roughly 20 hackers called "Tarh Andishan," which means "thinkers" or "innovators" in Farsi. The group is suspected to be Iranian.
Cybersecurity Threats 2015: More Espionage, More Apple Malware
December 3, 2014
Cyberspies will flourish and hackers will target Apple devices more often in 2015. Until now, Russia, China and the United States have dominated the cyberespionage scene, but their success will start to attract new players to the practice. "We can expect some of the developing economies ... to engage in these activities to protect their growth status," said Websense's Carl Leonard.
Did North Korea Get the Last Laugh Against Sony?
December 2, 2014
Upwards of 1.2 million people reportedly have used pirate sites to download Brad Pitt's unreleased World War II drama Fury. That was one of five films hackers leaked onto the Web following an attack on Sony Pictures' network last week. Sony has called in the FBI and other law enforcement agencies. It's rumored that the hack was launched by North Korea.
Wristband Heads Off Password Headaches
November 25, 2014
Has software glut got you down? Do you reuse passwords because creating unique ones for all your online accounts would cause a memory overload? If so, you may be interested in a bit of jewelry called the "Everykey," by a startup with the same name. Everykey is a wristband that removes the need to remember the countless log-in credentials we use every day.
EFF Spearheads Safer Web Initiative
November 24, 2014
The Electronic Frontier Foundation has announced a nonprofit organization that will aim to secure the entire Web. Let's Encrypt, starting in summer 2015, will offer free server certificates to help websites transition from HTTP to the more secure HTTPS protocol. EFF is partnering with Akamai, Mozilla, Cisco, iDenTrust and University of Michigan researchers.
NotCompatible Mobile Malware Gets Badder
November 21, 2014
A new version of the NotCompatible malware, which first appeared in 2012, is bigger, badder and pretty much indestructible, Lookout Security reported. And it can compromise corporate networks, thanks to the BYOD trend. The malware, called "NotCompatible C," focuses on Android devices. The NotCompatible Trojan is used to spread spam campaigns, among other nefarious activities.
Citadel Trojan Adds Keylogging to Arsenal
November 21, 2014
Cybercriminals are using a new version of the dangerous Citadel Trojan, which has been employed to attack the financial and petrochemical industries, to compromise password and authentication solutions, IBM Trusteer has reported. The new version begins capturing keystrokes, or keylogging, when some processes are running. It was discovered on a server that already had been infected.
BitTorrent Sync Goes Pro
November 20, 2014
BitTorrent on Wednesday announced new plans for its Sync service, including a premium subscription option, along with other new paid products. Sync, which was released in beta in July, is billed as a cloud-free file-sharing solution. Currently in version 1.4, Sync soon will graduate to version 2.0, with both an improved free version and a Pro version offered by subscription for $39.99 per year.
IBM Begins New Email Chapter With Intelligent Verse
November 19, 2014
IBM on Tuesday introduced Verse, its entry into the reinventing email derby. Verse, which will be available in both an enterprise and freemium edition, integrates the many ways people communicate with each other every day -- email, meetings, calendars, file sharing, instant messaging, social media, video chats and more -- into a single collaboration environment.
China Suspected in Attacks on USPS, NOAA
November 19, 2014
The U.S. Postal Service and National Oceanic and Atmospheric Administration last week confirmed that their computer systems were targeted in months-long cyberattacks that appear to have originated in China. The attack on USPS compromised information of an estimated 800,000 employees. Data at risk includes names, date of birth, Social Security numbers, addresses and dates of employment.
USPS Employees, Retirees, Customers Exposed in Hack Attack
November 11, 2014
Hackers siphoned off data from United States Postal Service servers for more than eight months before being detected, the USPS said. The personal data -- including names, dates of birth, Social Security numbers, addresses, beginning and end dates of employment and emergency contact information -- of more than 800,000 employees and some retirees has been exposed.

See More Articles in Enterprise Security Section >>
Facebook Twitter LinkedIn Google+ RSS
Is native advertising good for journalism?
Yes -- It's a reasonable source of additional revenue for media outlets to support their traditional editorial efforts.
Yes -- Paid-for articles can contain useful information, but readers might bypass them if they look too much like ads.
Maybe -- But only if it's clearly labeled as paid-for content.
No -- I don't trust any information from media outlets that cloak paid-for content as objective journalism.
No -- Native advertising is confusing and devious, and it threatens the fabric of traditional journalism.
I Don't Know -- I don't understand what native advertising is.
PENN STATE ONLINE Information Technology Degrees and Certificates