OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
LinuxInsider.com
FTC Issues Regulatory Warning on Big Data Use
January 20, 2016
The Federal Trade Commission is extending its regulatory reach to the e-commerce impact of big data. For years, the FTC has asserted vigorously its authority to apply existing consumer protection laws to emerging developments in the IT realm. Now it is signaling that it will apply that same vigor to big data under the regulatory authority it possesses through the FTC Act and other laws.
Cook Slams Door on Backdoor Discussions
January 19, 2016
Privacy advocates from around the globe have taken heart from reports that Apple CEO Tim Cook pushed hard against the Obama administration's efforts to reach a compromise on encryption during a recent Silicon Valley meeting. Cook reportedly lashed out at administration officials who were calling for a way to grant law enforcement officials limited, backdoor access to computer systems.
Microsoft Prods Skylake Users to Take the Windows 10 Plunge
January 18, 2016
Microsoft last week announced that within the next 18 months, it will end support for Windows 7 and Windows 8.1 on machines equipped with Intel's 6th generation Core processors, also known as "Skylake." As of mid-July next year, Windows 10 will be the only supported Windows platform on Skylake systems, and only the most critical security fixes will be released for earlier versions of Windows.
Privacy as a Service Advocates Promise Better Data Protection
January 14, 2016
There's been a lot of wailing and gnashing of teeth about the Sisyphean task of protecting privacy in the Digital Age, but that hasn't stopped innovators from searching for ways to preserve it. One of the latest ideas to emerge in the field is Privacy as a Service. As with many emerging technologies, the definition of "PaaS" (not to be confused with Platform as a Service) is in flux.
Black Duck Intros Container Scanning
January 13, 2016
Black Duck Software on Tuesday announced it has added to its Hub software container-scanning capabilities that let users map open source security flaws for applications, Linux distros, and other software in Docker and other Linux containers. Adding a containerized scanner to a Docker host enables automatic identification of known open source vulnerabilities in all layers of containers on the host.
US Army Marches to the Cloud
January 13, 2016
The U.S. Army may be in the walking phase of its plan to shift major portions of its information technology resources to the cloud, but a recent contracting initiative could move the service up to a jogging pace by the end of the year. The Army's progress in migrating much of its IT capabilities to the cloud was characterized as a crawl during 2015.
Microsoft Puts Legacy IE Browsers Out to Pasture
January 12, 2016
Microsoft has ended technical support for the older versions of its legacy Internet Explorer browser, placing at risk millions of users who -- despite extensive warnings -- have not upgraded to the latest version of Internet Explorer or the free install of Windows 10. The support expiration means that customers using IE 8, 9 and 10 no longer will receive technical support and security updates.
Iranian Cyberattack on American Dam Viewed As Rarity
January 7, 2016
Just days before Christmas, a rare event occurred: the report of a successful intrusion into America's infrastructure by overseas hackers. The event -- penetration of the control system of a dam 20 miles from New York City -- happened more than two years ago but wasn't made until last month. Cloaking such incidents in secrecy is standard operating procedure for industries that use control systems.
FTC Debates Cybersecurity Injury Standard
January 5, 2016
The U.S. Federal Trade Commission is engaged in an internal struggle over how it should assess the effect on consumers when businesses fail to provide proper e-commerce security. The outcome of the debate will have a significant impact on the FTC's ability to initiate cybersecurity violation cases. The legal issue could spill over to federal courts or even Congress for resolution.
Security Execs Sweat Insider Threats
December 31, 2015
Insider threats are becoming increasingly worrisome to corporate security executives. That is one of the findings in a survey of C-level businesspeople Nuix released last week. "The insider threat seems to be a bigger concern this year than it was in previous years," said Nuix's Keith Lowry. "People are recognizing that it is a significant weakness that has yet to be fully addressed."
All Security Pros Want for Christmas: Smarter Users, Decoy Networks
December 24, 2015
People like to see gifts from their wish lists under the Christmas tree, and security pros are no exception. Here are things some cyberwarriors would like old St. Nick to deliver to them. "It's probably never going to happen, but it would be fantastic to get smarter users who are less susceptible to social engineering," said Proofpoint's Ryan Kalember.
Apple's Cook Goes to the Barricades on Encryption
December 22, 2015
Apple CEO Tim Cook brought the encryption battle between the high-tech industry and the nation's law enforcement authorities to prime time TV Sunday in an interview on the CBS news program 60 Minutes. During the interview, Charlie Rose asked Cook about the need for law enforcement agencies to access data that has been encrypted on Apple phones. There's all kinds of sensitive information on smartphones today, Cook noted.
Juniper Networks Shortens ScreenOS Threat List
December 21, 2015
Juniper Networks on Sunday informed customers that recent security threats to its ScreenOS were not as widespread as initially believed. The company last week issued an alert following its discovery in ScreenOS of unauthorized code that could allow an attacker to gain administrative control of devices using Netscreen or to decrypt a VPN. The two issues are unrelated to each other.
Ready or Not, Enterprise Appification Is Here
December 21, 2015
Portfolios of task-oriented mobile apps for employees, contractors and business partners have been transforming the way enterprises conduct business, Apperian reported last week. Companies that have launched mobility initiatives have customized and deployed one or more apps that have streamlined business operations, according to the firm's analysis of 2 million app deployments.
MacKeeper Loses Control of User Data
December 17, 2015
Kromtech this week revealed a vulnerability in the data storage system of its MacKeeper software. Security researcher Chris Vickery, who alerted the company to the problem with its server, pegged the number of MacKeeper users affected at about 13 million. Kromtech posted a security alert about the breach on MacKeeper's website. The company fixed the error within hours of its discovery, it said.
Three Charged in Hacking Case That Spammed 60M
December 17, 2015
Federal prosecutors in New Jersey on Tuesday charged three men in a $2 million identity theft scheme to hack corporate computer systems and blast spam messages to more than 60 million people. The defendants face up to 20 years in prison and $250,000 in fines on wire fraud charges, and up to five years in prison and $250,000 in fines on email and computer conspiracy charges.
Creating Rules of War for Cyberspace
December 17, 2015
The idea of a "Cyber Geneva Convention" has gained steam in the last five years. Based on the original Geneva Convention, it would ensure that certain types of attacks and specific targets would remain off-limits in a cyberwar. The concept of rules dictating what shouldn't be allowed in war came about after Henry Dunant visited wounded soldiers during the Second Italian War of Unification.
Hot Hacker Targets in 2016: Fantasy Sports, Professional Services
December 15, 2015
As 2016 approaches, it's time to get the crystal ball out and predict next year's cybersecurity trends. Here are some predictions from security pros TechNewsWorld interviewed. Fantasy sports sites in 2015 caught the attention of states' attorneys general, who wanted to treat the outfits as gambling enterprises. In 2016, the sites will get attention from another quarter: hackers.
VTech Hires Mandiant to Shore Up Security for Kids
December 4, 2015
VTech on Thursday revealed it has hired FireEye's Mandiant to help improve security after reaction from parents around the world over news that its servers were hacked. It also is cooperating with law enforcement agencies worldwide to investigate the incident and has temporarily shut down several websites, its Learning Lodge app store, and its Kids Connect service.
Forces That Will Reshape the IT Landscape in 2016
December 4, 2015
There may be no better way to capture the state of the technology industry than to borrow Charles Dickens' famous opening from A Tale of Two Cities: "It was the best of times, it was the worst of times..." It never has been a better time to launch offerings via the cloud, but the availability of low-cost computing power and open source software have created unprecedented competitive challenges.
'Tis the Season for Online Predators
December 3, 2015
While visions of holiday shoppers dance in retailers' heads, those visions are also on the minds of online marauders. Net predators are sticking to scams that have made them money throughout the year. "Over the last 12 months, we've seen a return to attachments with innocuous macros in them," said Kevin Epstein, vice president of advanced security and governance at Proofpoint.
New Tech Targets Enterprise Ransomware
November 23, 2015
SentinelOne last week introduced an addition to its behavioral solution designed to address the problem of ransomware scrambling files on a computer. Ransomware has been a scourge not only for consumers, but for the enterprise, too. The malicious software can be particularly nettlesome for enterprises because they have to protect many endpoints -- phones, tablets, laptops, desktops and servers.
FBI, Carnegie Mellon Deny $1M Contract to Crack Tor
November 19, 2015
The FBI has denied allegations that it paid Carnegie Mellon University security researchers $1 million to crack a network designed to protect the anonymity of its users. The Tor Project, which operates the network, last week accused the FBI of cutting the CMU deal. The attack on Tor occurred from January to July 2014. The attackers discovered a way to strip the anonymity of Tor users.
Docker, Yubico Team Up to Secure App Development
November 19, 2015
Docker this week announced new security enhancements at DockerCon EU in Barcelona, Spain, including hardware signing of container images -- an industry first -- through a partnership with Yubico. Docker Content Trust offers hardware signing through support for Yubico's YubiKey. The YubiKey 4 lets Docker users digitally sign code during initial development and through subsequent updates.
Surveys Reveal Lax Mobile Security Among Federal Workers
November 18, 2015
The use of mobile devices provides significant benefits in convenience and workplace productivity. However, two recent reports indicate that U.S. government workers often ignore security protocols associated with mobile IT. The Office of Personnel Management hack revealed earlier this year drove an effort to address federal IT security. That effort largely has bypassed mobile device security.
Paris Attacks Deepen Encryption Debate
November 18, 2015
Encryption once again has come under fire in the wake of last week's terrorist attacks in Paris. Western intelligence agencies reportedly blamed the technology for enabling communications among the attackers, and some officials renewed their calls for technology companies to give them decryption keys. However, the terrorists may have communicated through private messages on the PlayStation 4.
Nadella: Microsoft to Be Stealth Operator for Cloud Security
November 17, 2015
CEO Satya Nadella on Monday made a bid to reintroduce Microsoft to professionals working in a brave new cyberworld of virtual, interconnected computing. Speaking at the Microsoft Government Cloud Forum in Washington, Nadella presented a broad new vision of a cloud- and mobile-first enterprise that promises to make personal and client security a central theme of its business.
Report: Botnets Help Bump Cyberattack Attempts by 20 Percent
November 17, 2015
ThreatMetrix last week reported that it had detected and prevented more than 90 million attempted cyberattacks in real time across industries from July to September. The attempted attacks covered fraudulent online payments, logins and new account registrations, and represented a 20 percent increase over the previous quarter, according to ThreatMetrix Cybercrime Report: Q3 2015.
Gmail to Warn Users of Unencrypted Email
November 16, 2015
Google last week announced that it is developing features for Gmail that will notify them when they get messages through a nonencrypted connection. Regions of the Internet are preventing message encryption by tampering with requests to initiate SSL connections, and malicious DNS servers are publishing fake routing information to email servers looking for Gmail, a study found.
Microsoft Hands Cloud Data Control to German Trustee
November 12, 2015
Microsoft announced it will offer its Azure, Office 365 and Dynamics CRM cloud services to business clients using two Germany-based data centers hosted by a subsidiary of Deutsche Telekom. The arrangement will protect the integrity and privacy of customer data, the company said. The data centers will be under the control of T-Systems, a unit of Deutsche Telekom, which will act as data trustee.
See More Articles in Enterprise Security Section >>
Facebook Twitter LinkedIn Google+ RSS
What best reflects your opinion on online privacy?
We need new laws to curb government spying.
It's dead -- Google, Facebook and others killed it.
Personalized advertising is the worst -- it's creepy.
It's achievable through encryption and other tech.
It's an overblown issue -- I have nothing to hide.