Welcome Guest | Sign In
LinuxInsider.com
Google to Search for the Meaning of Health
July 25, 2014
Google is seeking 175 volunteers from whom it will collect bodily samples in an effort to create their biochemical fingerprints and establish the baseline for a healthy body. The Baseline study, to be run by Google X labs, will seek to connect traditional clinical observations of health, such as diet -- or habits, such as smoking -- with molecular-level changes.
Failure to Communicate Hamstrings Cyberdefenders
July 23, 2014
A failure to communicate between security pros and company brass may be contributing to the inability of a significant number of organizations to reduce the risk of cyberattacks on their systems. Thirty-one percent of the nearly 5,000 respondents surveyed for a recent study said their cybersecurity team never met with the executive team about cybersecurity.
Black Hat Tor-Busting Talk Nixed
July 22, 2014
The Tor Project is working to remedy a vulnerability in its anonymity software following the sudden cancellation of a talk at next month's Black Hat security conference in Las Vegas that would have revealed it. The planned talk would have demonstrated a way to unmask users of Tor, the privacy-minded Web browsing software. CMU researcher Alexander Volynkin was to deliver the briefing.
iOS Insecurity - Designed by Apple?
July 22, 2014
The long-held belief that Android is the least secure of mobile OSes was shattered by security researcher and expert iOS hacker Jonathan Zdziarski over the weekend. Zdziarski unveiled a host of iOS vulnerabilities, the scope of which was staggering. They include undocumented services that bypass backup encryption and can be accessed both via USB and wirelessly.
Judge Rules Police Can Stuff Entire Email Accounts Into Evidence Lockers
July 21, 2014
Concerns about overly broad searches of digital data by law enforcement once again have emerged after a federal judge issued an opinion stating officials armed with a warrant can seize and hold a suspect's entire email account. Such an action would not violate the suspect's rights under the Fourth Amendment of the Constitution, said U.S. Magistrate Judge Gabriel Gorenstein.
Cloud App Security: Foggy With Low Visibility
July 21, 2014
While the cloud promises faster time to market and reduced costs, it also presents a new landscape for hackers to attack and achieve their goals -- namely, to find and gain unauthorized access to data and information. Attackers follow the data they are after, and if that data is residing in the cloud, then they are going to start operating in the cloud as well.
'Buy' Button Could Turn Facebook Into Impulse-Shopping-Ville
July 18, 2014
Facebook is testing a function that would allow users to buy products without leaving the site or app. Small and medium-sized businesses in the U.S. that are taking part in the trial can add the Buy button to ads displayed in users' News Feeds or in posts on their pages. Users will see the Buy button in relevant ads whether they're on the Facebook website or using their mobile device.
Down the EU's Right-to-Be-Forgotten Rabbit Hole
July 17, 2014
Telecom regulators from each EU member state, together with the Article 29 Working Party -- a group comprised of a data protection authority representative from each state, the European Data Protection Supervisor, and the European Commission -- reportedly have invited search engines to a meeting next week. Microsoft, which just started fielding link removal requests to Bing, plans to attend.
Gameover Zombies on the March Again
July 17, 2014
The Gameover botnet is back, more or less, only six weeks or so after the Justice Department announced that an FBI-led multinational effort had disrupted it. Still, the botnet's downtime was longer than expected -- the UK's National Crime Agency had warned that the people running it would regain control within two weeks. Sophos this week spotted a new version of the malware.
Windows XP Hacked, Supply Chain Poisoned
July 16, 2014
A supply chain compromise is a security pro's worst nightmare. The thought of malware being planted on computer devices before they leave the factory sends shivers down a cyberdefender's spine. A disturbing case of such poisoning was reported last week by researchers at TrapX. The researchers found an APT was being used to infect a version of Windows XP embedded on devices.
Google's Project Zero Cybersecurity Watch: No Excuses
July 15, 2014
Google on Tuesday announced Project Zero, an effort to speed up the security bug-fixing process. A team of cybersecurity experts will go after vulnerabilities in any and all software, notify the vendors, and then file bug reports in a public database so users can track the issuance of patches. The Project Zero team has promised to send bug reports to vendors in as close to real-time as possible.
What's Eating Internet Security?
July 15, 2014
It's a given that hackers can and do penetrate websites with laughable ease, ranging from those of retailers to those of the United States government. It certainly doesn't help the security-minded to know that the U.S. National Security Agency and other countries' spy agencies, including the UK's GCHQ and the West German intelligence agency, are tapping into online communications at will.
Critical Infrastructure Companies Lack Cyberdefenses
July 11, 2014
Companies providing the world's critical infrastructure are woefully unprepared for cyberattacks despite the increasing threat level, evidenced by the release of the Stuxnet worm and the Shamoon virus in recent years, found a survey conducted by the Ponemon Institute and Unisys. Nearly 70 percent of the 599 surveyed companies in the past 12 months have reported at least one security breach.
Report: NSA Stalked Prominent Muslim Americans
July 10, 2014
It's been known for years that the U.S. National Security Agency and the Federal Bureau of Investigation have targeted Muslim Americans. What hasn't been widely known is that their targets included lawyers and some who have served the United States at the highest levels. Five highly prominent Muslim Americans were listed on an NSA spreadsheet called "FISA recap."
Can I Get My Reputation Back?
July 09, 2014
Ray Donovan was U.S. Labor Secretary under Ronald Reagan and a colorful figure. During his tenure he was indicted by a Bronx, N.Y., grand jury on corruption charges stemming from a contract to build a subway line. The trial involved unions and the mob and was automatically sensational. The verdict turned on whether a construction company got a contract due to mob influence.
Tor Embroiled in $1M Revenge-Porn Lawsuit
July 09, 2014
Texas attorney Jason L. Van Dyke recently filed a lawsuit against nude-photo-sharing site Pink Meth and included the Tor Project among its defendants. Pink Meth is an "involuntary pornography" site, the suit charges, enabling users to post nude photos for the purposes of getting revenge on those pictured. It's accessible only to users who have downloaded Tor's anonymity-minded software.
Your Abandoned Smartphone May Betray You
July 09, 2014
Doing a factory reset to wipe the data off smartphones does not work, and the data can be recovered, warned Avast. The company recovered tons of data, including more than 40,000 stored photographs, from 20 used Android phones purchased from eBay. Device owners need to overwrite their files to make them irretrievable, Avast said, touting one of the applications it offers.
Report: Malware Poisons One-Third of World's Computers
July 09, 2014
Nearly one-third of the world's computers could be infected with malware, suggests a report released last week by the Anti-Phishing Working Group. Malicious apps invaded 32.77 percent of the world's computers, a more than 4 percent jump from the previous quarter's 28.39 percent, it estimates. The increase in infected computers has come hand-in-hand with a jump in the appearance of malware samples.
Europeans Want Right to Be Forgotten - but Not for the Other Guy
July 08, 2014
Marie Antoinette may not have been too far off the mark when she intoned the immortal line, "Let them eat cake." When it comes to the right to be forgotten, it seems Europeans want both to have their cake and eat it. They are now up in arms over Google's having deleted links to various news stories from search results in Europe, calling the action part of a backroom campaign to change the law.
NSA's Eyes Trained Less on Terrorists Than on Average Joes and Janes
July 07, 2014
Nine out of 10 people whose information is being collected by the NSA are Americans who have nothing to do with people targeted by the agency. Data provided by former NSA contractor Edward Snowden includes some information pertaining to terrorist activities and possible threats to U.S. national security, as well as a few successes in antiterrorist work.
Shame on Facebook
July 03, 2014
Do you remember those snotty little kids who didn't seem to understand the difference between right and wrong? You know, the little brats who thought the rules didn't apply to them. The kids who thought they could get away with whatever they wanted -- rules were for somebody else. Well, that seems to be a fitting description of Facebook, as it repeatedly breaks customer trust.
Emotional Backlash Unlikely to Unsettle Facebook
July 02, 2014
It's unlikely that Facebook's psych experiment that turned some 700,000 of its users into involuntary lab rats will hurt its brand or advertising revenue. However, Facebook's research on the emotional impact of content in the News Feeds of its members has unleashed a torrent of criticism. Facebook has faced this kind of outrage before, though, and the results have almost always been the same.

See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS