OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
Patched Android Lockscreen Still a Threat
September 21, 2015
Google recently issued a patch for Nexus mobile devices to fix an Android Lollipop vulnerability that lets hackers bypass the lockscreen and gain control of mobile devices. However, it could take weeks to months for manufacturers and service providers to roll out the patch for other Android devices. University of Texas security researcher John Gordon discovered the vulnerability.
Trust and Value Will Bring IoT Home
September 17, 2015
The connected car and smart home markets are at an early stage of development, but in many ways they have been growing in parallel. Both markets are enabled by the falling costs of sensors, networking technologies and data, as well as by expanded cloud services, the mass penetration of smartphones, and consumer demand for the connected lifestyle. These ecosystems now are beginning to converge.
Will the IoT Be Held for Ransom?
September 17, 2015
A perfect cybercrime storm is brewing, and two of the main ingredients are ransomware and the Internet of Things. Cybercrime has become an industry with all the operational trappings of any legitimate sector, McAfee Labs noted earlier this month. It has its own supply chain, market segments, service providers, and finance and trading systems. It has its own business models.
IoT Can Open Doors to Cybercriminals, FBI Warns
September 16, 2015
The FBI has warned businesses and consumers to be careful when deploying devices that connect to the Internet of Things. As more companies and consumers use IoT devices to improve efficiency and convenience, their connection to the Internet creates opportunities for cybercriminals, the FBI said. The "Internet of Things" is a broad term that encompasses myriad devices that connect via cyberspace.
Court Bolsters FTC's Authority to Regulate Cybersecurity
September 16, 2015
Companies that experience data security breaches have a lot to worry about -- but their problems encompass much more than responding to irate consumers. The business community also has to worry about the U.S. government, which can penalize e-commerce companies for failing to provide adequate protection for consumers' personal data. A recent federal court ruling could give the FTC more muscle.
Hackers Home in on Health, Education, Government Sectors
September 16, 2015
A New York healthcare provider, California's higher education system and the Department of Energy have become the latest targets of data bandits. The latest massive data breach at a healthcare provider reportedly took place at Excellus BlueCross BlueShield, which last week revealed that the personal data of more than 10 million people was at risk due to an attack that dates back to December 2013.
Netflix Move Prompts Premature Antivirus Software Obit
September 11, 2015
Netflix reportedly is in the process of dumping its antivirus software and placing all its faith in an alternative solution to protect its more than 60 million subscribers from online nastiness, a move that prompted one pundit to pronounce the death of antivirus software yet again. Such dire pronouncements have been made for years, and they're likely to be made for many years to come.
Samsung's IoT Products Make Themselves at Home
September 9, 2015
Samsung last week plunged into the Internet of Things for the home market, unveiling a new hub to control connected gadgets, home and sleep monitors, and a smart washing machine. The company made the announcements at IFA 2015. The SmartThings Hub for home devices is built around a powerful processor that enables video monitoring, and it includes a battery backup that lasts up to 10 hours.
Laser Pointer Hack Easily Dupes Driverless Cars
September 8, 2015
A simple off-the-shelf laser pointer could be combined with a very basic computer to disrupt the multithousand-dollar Lidar systems installed in most self-driving cars, a security researcher warned last week. A setup that costs about $60 could trick the system, which autonomous vehicles use to sense objects in the road, into responding as though there were obstacles ahead when there were none.
Linux Foundation Security Checklist: Have It Your Way
September 6, 2015
The Linux Foundation's recently published security checklist may draw more attention to best practices for protecting Linux workstations, even if IT pros do not embrace all of its recommendations. Konstantin Ryabitsev, the foundation's director of collaborative IT services, developed the list for the use of LF remote sysadmins, to harden their laptops against attacks.
An Insider Betrayed Ashley Madison - Go Figure
September 4, 2015
When the giant data breach at infidelity website Ashley Madison made headlines last month, the CEO of the site's owner was quick to claim the caper was an inside job. He had the attacker's profile and work credentials, Avid Life Media's CEO Noel Biderman told ace cybersecurity blogger Brian Krebs. Though not an employee, the individual had accessed the company's technical services.
KeyRaider Malware Busts iPhone Jailbreakers
September 3, 2015
Data-robbing malicious software dubbed "KeyRaider" has stolen more than 225,000 valid Apple accounts and thousands of certificates, private keys and purchasing receipts, Palo Alto Networks' Unit 42 reported last week. The firm identified the malware in cooperation with WeipTech, which found the accounts on a server while it was analyzing suspicious user-reported iOS tweaks.
Baby Monitors Riddled With Security Holes
September 2, 2015
Rapid7 has released a report on an assortment of new vulnerabilities found in baby monitors: predictable information leaks; backdoor credentials; reflective, stored XSS; direct browsing; authentication bypass; and privilege escalation. "Many of the issues would allow video and audio from the device to be viewed by an attacker," said Mark Stanislav, senior security consultant at Rapid7.
White House Wants Feedback on IT Contract Security
September 2, 2015
Cybersecurity is a key component of all contracts between U.S. government agencies and information technology vendors. Yet cyberbreaches continue to occur -- some of them with alarming scope and depth. The White House is seeking input from private sector vendors and others on how to improve the cybersecurity elements involved in federal government purchases of IT equipment and services.
Qualcomm Sics Fire-Breathing Snapdragon on Android Hackers
September 1, 2015
Qualcomm on Monday announced Snapdragon Smart Protect, a hardware-software product that could make the world a safer place for Android smartphone users. Snapdragon Smart Protect, which will become available with Qualcomm's upcoming Snapdragon 820 processor, will provide real-time, on-device machine learning designed to support accurate and effective detection of zero-day malware threats.
Shadow IT Feeds 'Man in the Cloud' Attacks
August 27, 2015
Shadow IT -- the use of unauthorized online services by company employees -- is a concern of cyberwarriors charged with defending business systems against network attacks. There's new evidence that those concerns are justified. A new attack vector on business systems leverages the synchronization features of services like Dropbox and Google Drive to perform malicious mischief.
Malvertising Headache Swells to Migraine Proportions
August 26, 2015
Online advertising that pushes malicious software to consumers has increased 325 percent over the past year, Cyphort Labs reported Tuesday. Malvertising is adding to what is already a significant problem for online advertisers. Ad fraud will cost global advertisers more than $6 billion this year, according to the Association of National Advertisers.
Cyber-Posse Aims to Round Up Ashley Madison Hackers
August 25, 2015
The Toronto Police Service on Monday reported on the progress of Project Unicorn, the official investigation into the hack attack on Ashley Madison, an adultery-promoting website. The Toronto police are working closely with the U.S. Department of Homeland Security, the RCMP, the FBI, and the Ministry of the Attorney General's criminal law office in carrying out the investigation.
McDonald's Tips Android Pay Launch
August 24, 2015
An internal McDonald's memo labeled "proprietary and confidential" has been circulating, advising employees to get ready for a Wednesday launch of Android Pay -- the successor to Google Wallet, and Google's answer to Apple Pay. Google officially announced Android Pay this spring, during it's annual developers conference, saying only that Android Pay would launch with "Android M."
Intel: Putting Innovation Back in the Hands of the Innovators
August 24, 2015
We are living in an amazing time, but many of us seem to take it for granted. We have private spaceships. Self-driving cars are on the road, even though we can't buy them yet, and there are plans for a 12-mile-high inflatable building. Granted, a number of us are convinced it will end up looking like a giant version of the inflatable fan blown stick man often seen outside of car dealerships.
Spotify's 'Sorry' Fails to Cut Through Confusion
August 22, 2015
Spotify CEO Daniel Ek on Friday issued a public apology for poor communications regarding the company's new privacy policy. The new policy, which took effect Wednesday, immediately triggered alarm. Several tech publications railed against the terms, and Minecraft creator Markus Persson engaged Spotify CEO Daniel Ek in a Twitter debate that ended with Persson and others quitting the music service.
Ashley Madison Hackers: Catch Them if You Can
August 20, 2015
The Ashley Madison hacker gang will be tough to apprehend. The hackers this week dumped nearly 10 gigabytes of stolen personal data onto the Web -- details gleaned from accounts established on the site, which is dedicated to matching up people who want to engage in extramarital affairs. It's "nearly impossible" to track down attackers, noted Bit9 + Carbon Black's Ben Johnson.
Gear Up for a Flood of IoT Support Requests
August 20, 2015
Growth of the Internet of Things in broadband households extends the life, utility and functionality of all connected solutions in the home. It also puts new pressures on existing support solutions to meet consumers' expectations. Sixteen percent of U.S. broadband households owned a smart home device, and nearly 40 percent planned to buy one in the next 12 months, suggests recent research.
It's a Mad, Mad, Mad Ashley Madison World
August 19, 2015
Hackers have dumped personal data of about 37 million members of the Ashley Madison website onto the Dark Web. The data was stolen in an attack on the site, which aims to hook up people who want to cheat on their spouses. Parent company "Avid Life Media has failed to take down Ashley Madison and Established Men," the Impact Team wrote in a post online. ... Now everyone gets to see their data."

See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS
Will fitness bands fade away?
Yes -- smartwatches will take over their functionality.
Yes -- they're like diets -- people tire of them.
No -- it's smartwatches that will fade away.
No -- people are getting more health-conscious.
Not sure -- but I'd like to try one.
Not sure -- not interested.