Welcome Guest | Sign In
LinuxInsider.com
Boeing Unveils Suicidally Secure Smartphone
February 27, 2014
Boeing this week filed an application with the United States Federal Communications Commission for a secure Android smartphone called the "Black" that will self-destruct if anyone tries to physically open the case. The company will offer it to the U.S. defense and security communities. The Black has endless modularity capabilities, according to Boeing.
Target Reels From Customer Data Breach
February 26, 2014
Target reported financial results for the quarter during which it suffered a high-profile data breach, revealing how badly the company was stung by the security lapses. In the three months ending Feb. 1, net earnings dropped by 46 percent compared with the year-ago fourth quarter, from $961 million to $520 million. Profit dropped by more than 40 percent from the same period a year earlier.
Apple's Better Late Than Never With OS X Security Fix
February 26, 2014
Apple has pushed a large update to its OS X Mavericks OS that includes a patch for a significant security flaw. The vulnerability allows Net predators to hijack a secure communication channel from a device running the latest version of OS X and perform mischief such as intercepting user names and passwords. The flaw affects Apple programs that use SSL encryption.
Mt. Gox Comes Tumbling Down
February 25, 2014
Bitcoin exchange Mt. Gox, which has been troubled by repeated DDoS attacks, has gone offline, following publication on Scribd of a purported internal memo alleging a multiyear server theft totaling nearly 745,000 Bitcoins. At Tuesday morning's price of $518.84 CoinDesk, that would amount to about $386 million. "This isn't about saving Mt. Gox any more," the document states.
Windows XP to Live On in China
February 25, 2014
A handful of Chinese Web companies are banding together to provide user support -- system upgrades, security services and the like -- to domestic users after Microsoft turns out the lights on Windows XP. Microsoft announced that it's going to punt on Windows XP in early April. Alas, an estimated 25-plus percent of China's computers run on the operating system. But fear not!
Security Firms Scour Mobile Apps
February 24, 2014
Security pros weren't very kind to mobile applications last week. A number of firms knocked apps produced for the smartphone market for all kinds of risky behaviors that could lead to trouble not only for mobile device owners, but also for their employers. While Android has been a poster child for misbehaving apps in the past, competitor Apple's apps aren't as pristine as is commonly believed.
Google Gets Spider.io to Take a Bite Out of Click-Fraud
February 24, 2014
Google on Friday announced its purchase of online ad fraud fighter Spider.io. It initially will include Spider's fraud detection technology in its video and display ad products. Over time, Google will incorporate Spider's iFramed ads view technology in its products. "This is an excellent move for Google," said Mukul Krishna, senior global director of digital media at Frost & Sullivan.
Amazon and Apple's 'Tough Slog' on Madison Avenue
February 21, 2014
Amazon and Apple just can't seem to catch a break with the advertising elite on Madison Avenue. In fact, advertising sales are a "tough slog" for both companies, mourns a feature published this week. The problem? Apple and Amazon won't reveal enough information about their customers. This is the best news I've heard all year. In fact, it just reinforces my loyalty to both companies.
IBM, AT&T Hook Up on Internet of Things
February 19, 2014
IBM and AT&T on Tuesday announced they were forming a global alliance to develop solutions for the Internet of Things. They will be combining their analytic platforms, cloud and security technologies -- all with privacy in mind -- to gain insights from machine-to-machine data collected by a variety of industries. Initially, they will focus on solutions for municipalities and utilities.
China Calls Kerry's Internet Comments 'Na´ve'
February 18, 2014
Maybe they aren't fighting words, but they sure aren't friendly. China's Foreign Ministry spokesperson, Hua Chunying, said that U.S. Secretary of State John Kerry's remarks about Chinese Internet freedom were, shall we say, a bit base. Kerry had a half-hour-plus chat with bloggers Saturday in Beijing, during which time he expressed support for more online freedom in China.
CDT's New Global Civil Liberty Aspirations
February 18, 2014
This is the best of times and the worst of times for privacy and civil liberties. Almost every day, new revelations about the U.S. National Security Agency's surveillance activities make headlines. Meanwhile, some U.S. intelligence chiefs have called for the execution of whistleblower Edward Snowden and have painted journalists who run stories based on his material as his accomplices.
PCI 3.0, Part 1: Breathe, Relax, Get Compliant
February 18, 2014
Aimed at improving the security of payment card data and reducing fraud, PCI DSS 3.0 standard, which took effect on Jan. 1, introduces changes that extend across all 12 requirements. It no doubt will mean some shakeups for many organizations. However, transitioning to meet the new requirements will help e-businesses build a stronger, safer, lower-risk environment.
Hackers Perfectly Time Largest DDoS Attack Ever
February 12, 2014
"Very big NTP reflection attack hitting us right now. Appears to be bigger than the #Spamhaus attack from last year. Mitigating." That Monday evening tweet from Matthew Prince, CEO of CloudFlare, signaled what's being touted as the largest distributed denial of service attack ever launched on the Internet. The attackers leveraged a known vulnerability in the Internet's infrastructure.
Internet of Things, Part 1: God's Gift to the NSA
February 12, 2014
The NSA's salivary glands no doubt started working overtime when it became apparent that technological advances were moving the world toward an Internet of Things -- a world where everything would be connected to everything else wirelessly or over the Web. Almost two years ago, David Petraeus, then director of the CIA, enthused that the IoT would transform surveillance techniques.
Kaspersky Details Sophisticated 'Mask' Robber Ops
February 11, 2014
Kaspersky Lab has released research findings on Careto, a malware toolkit that has hit more than 380 victims in 31 countries so far since 2007. "Careto" means "mask" in Spanish, Kaspersky notes. The word also could point to an ancient tradition incorporated into Portuguese and Brazilian Carnival festivals. Because they are so highly sophisticated, the attacks could be the work of a nation-state.
Defense Contractors Shore Up Security Post-Snowden
February 10, 2014
Defense contractors have begun to bolster their cybersecurity practices in the wake of the massive leaking of government data by former NSA contractor Edward Snowden. Seventy-five percent of defense contractors said the Snowden Affair had changed security procedures for their employees in a recent survey. "I'm surprised that number isn't higher," said security researcher Dodi Glenn.
Unable to Dent Wallet, France Attacks Google's Pride
February 10, 2014
France's top administrative court ruled that Google must display a notice on its French search page saying that the company was fined by a local privacy watchdog. Google plans to fight the fine, but will have to adorn its Google.fr page with the humiliating message in the meantime. In January, French privacy regulators followed through on previous threats by fining Google roughly $200,000.
Careless, Reckless Staff Are Corporate Security's Biggest Threat
February 07, 2014
We have met the enemy and he is us. Pogo's philosophical observation perfectly describes the way IT and security professionals view their end users' attitude toward data security. An overwhelming 80 percent of corporate security professionals and IT administrators indicated in a recent survey that "end user carelessness" constituted the biggest security threat to their organizations.
Google Offers Higher Bounties for Security Bugs
February 05, 2014
Google is taking the fight to hackers by increasing the rewards it hands out to researchers who flag vulnerabilities in the company's products. Its security reward program now covers additional services including Chrome browser apps and extensions that the company has developed and branded as "by Google." Researchers who report vulnerabilities can now grab between $500 and $10,000.
Feds' Shift to Mobile Creates Security Cracks
February 05, 2014
Federal employees quickly have become strong adherents of mobile devices. In a recent survey, 90 percent of government employees said they used at least one mobile device -- laptop, smartphone or tablet -- for work purposes. However, the enthusiasm by federal workers for the use of mobile devices has not been matched by appropriate concerns for security.

See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS