OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
LinuxInsider.com
Manipulative User Research Earns Facebook a Shiner
June 30, 2014
Once again, Facebook is embroiled in a controversy over privacy. This time, hackles have been raised by publication of a study for which the company manipulated the News Feeds of nearly 700,000 subscribers. The study concluded that negative messages on social networks make people sad, and positive ones make them happy -- and those feelings can spread through a social network to third parties.
In 'The Internet's Own Boy,' the Good Guy Doesn't Win
June 27, 2014
The Internet's Own Boy: The Story of Aaron Swartz, a documentary directed and produced by Brian Knappenberger, is opening at theaters and online this weekend -- and re-opening wounds about the subject and his suicide. The film is a reminder that often the good guy doesn't win, said tech analyst Rob Enderle. "If you are going to fight this fight, be aware it will get really ugly."
Facebook, NY DA Lock Horns Over User Data Warrants
June 27, 2014
Facebook, not known for respecting users' privacy, is battling a New York County district attorney's demand for all information pertaining to the accounts of several hundred of its subscribers. DA Cyrus Vance's office issued 381 secret warrants for the information in July of 2013 in a hunt for retired police officers and firefighters wrongfully claiming Social Security disability benefits.
Google Starts Purging Search Results in Europe
June 26, 2014
Google has started to remove search results in certain cases in Europe, in compliance with the EU's new "right to be forgotten" rules. The EU last month ruled that the company must allow individuals to request the removal of links to news articles, court judgments, and other documents that might turn up in results when searches are conducted on their names.
No Cellphone Search Without Warrant, Supreme Court Rules
June 26, 2014
Police need a warrant to search the cellphone contents of people they have arrested, the United States Supreme Court ruled Wednesday. Warrantless searches, in essence, would impact privacy to a far greater extent than is acceptable. The ruling also applies to individuals stopped for questioning by the authorities, said Jake LaPerruque of the Center for Democracy and Technology.
Will Nest Get Too Nosy?
June 26, 2014
Nest Labs may offer cool technology, but do we really want Google or anyone knowing everything that goes on in our homes? Home automation may indeed be a double-edged sword. Today, like children, we are excited and amazed at how tech can accomplish simple tasks. Will we still be happy down the road, when it crosses the line and invades our privacy?
Card Fraud Hits 1 in 4 Consumers Worldwide: Report
June 25, 2014
As many as a quarter of the world's consumers were victimized by card fraud in the past five years, and financial institutions are losing customers as a result, suggests a new study. ACI Worldwide and the Aite Group, which jointly surveyed more than 6,100 customers in 20 countries, found that 23 percent of consumers hit by card fraud changed financial institutions because they were dissatisfied.
To Pay or Not to Pay - That's the Ransomware Question
June 24, 2014
Ransomware is a growing problem for consumers and businesses alike. In Symantec's most recent quarterly security report, the company's researchers found all targeted attacks -- including ransomware -- grew 91 percent year-over-year. That's raising a big question for those targeted by cyberextortionists: Should the ransom be paid? Security experts generally say no, but some insert a caveat or two.
Heartbleed Flaw Goes Unpatched on 300K Servers: Report
June 23, 2014
Two months after the Heartbleed vulnerability sent frissons of fear down the spines of IT managers everywhere, 300,000 servers still remain vulnerable, Errata Security said. When the flaw was announced in April, Errata found 600,000 servers vulnerable. "The norm is to do no patches at all for some systems, no matter how easy it is to patch," said Errata CEO Robert Graham.
White House Tilts Toward Public-Private Cybersecurity Cooperation
June 23, 2014
The Obama administration and the private sector -- often at odds over the regulation of everything from telecom issues to software protection to the environment -- apparently agree that a major issue dealing with cybersecurity should be addressed on a cooperative basis, largely free of federal regulation. The White House recently signaled its tilt toward a cooperative and voluntary approach.
Researchers Find Android Security on Par With iOS
June 18, 2014
The open source mobile operating system Android long has been considered by security experts to be the mobile OS most vulnerable to security threats, but iOS is just as vulnerable. However, the two OSes expose users to different types of threats. The perceived greater security of iOS rests on Apple's control of app distribution rather than on any inherent superiority of the OS over Android.
BlackBerry Unveils BBM Protected to, Ahem, Protect Market Share
June 18, 2014
BlackBerry, whose share of the mobile phone market has been on a downward spiral, this week launched BBM Protected, the first in its planned eBBM Suite of secure enterprise-class messaging products. BBM Protected targets regulated industries. It's claimed to be the only secure mobile instant messaging app that uses a FIPS 140-2 validated cryptographic library.
Target Customers Broadcast Epic Checkout Fail
June 16, 2014
Target's customers jumped en masse onto social media Sunday night after technical malfunctions at its stores around the country resulted in long checkout lines and, in some cases, inability to make purchases with store-branded credit cards. The episode struck a nerve with customers, not only because of the inconvenience, but because it was a reminder of another Target point-of-sale glitch.
Godzilla Foreshadows Trouble for Internet of Things
June 16, 2014
The Internet of Things has come under attack by pranksters in recent days. The events could signal tumultuous things to come as more and more everyday objects connect to the Internet. Homeland Security has advised the customers of digital sign maker Daktronics to "take defensive measures" following a series of cyberpranks on the company's traffic signs.
Project Galileo Offers DDoS Protection for Free Expression Online
June 13, 2014
CloudFlare on Thursday announced the launch of Project Galileo, a service designed to provide enterprise-grade protection against distributed denial of service attacks free of charge to certain sites, with the goal of protecting freedom of expression on the Internet. CloudFlare is working with a number of partners to identify at-risk sites that qualify.
Facebook Plunges Into Online Ad Mainstream
June 12, 2014
Facebook on Thursday announced it will soon move to interest-based advertising, almost three years after archrival Google, and well after other major players such as Yahoo and Amazon. It also will introduce "ad preferences," a tool accessible from every ad on Facebook that will explain why users were served an ad, and let them remove interests that form the basis on which that ad is served.
Microsoft Pushes Back Against US Data Warrant
June 12, 2014
The latest court ruling in an ongoing battle between Microsoft and demands from the United States government for data about one of the company's users, seems to have a lot of folks running for cover. In 2013, U.S. Magistrate Judge James Francis issued a search warrant requiring Microsoft to turn over all date pertaining to the subscriber, hosted on a server in Ireland, to the U.S. authorities.
5 Myths of Virtualization Security: You May Be More Vulnerable Than You Think
June 11, 2014
Businesses increasingly are relying on virtual machines to handle more critical data and tasks than ever before. The reality is that virtualization is growing as a platform for managing customer data, financial transactions and the applications that businesses use. Simply put, virtualization is a core component of today's mission-critical IT infrastructure.
Cupid Fires Arrow at OpenSSL's Heart
June 10, 2014
As if the discovery of the Heartbleed flaw weren't enough woe for OpenSSL, more than half a dozen additional defects have been discovered in the code used to protect communication on the Web. Among them is one dubbed "Cupid" by its discoverers. The flaw can be used to compromise enterprise networks. Like Heartbleed, Cupid uses a malicious heartbeat packet to compromise a TLS connection.
Free Speech vs. Internet Privacy and the 'Right to Be Forgotten'
June 10, 2014
The conventional wisdom of the Internet is that everything posted, whether on social media, a website or anywhere else, will be on the Internet forever. That conventional wisdom was just challenged successfully in a recent ruling handed down by the EU's highest court. A new conventional wisdom may arise from that ruling -- that we have a "right to be forgotten."
Open Source Persistence: Resistance Is Futile
June 09, 2014
Software developers routinely use open source components to boost productivity and improve the quality of their code. The problem for enterprises is that companies using open source must properly manage it and comply with its licensing, as with any third-party code. That becomes difficult to do when corporate leaders do not know their computer systems are running open source code.
Why Mobile Providers Will Have to Give a Little on Privacy
June 06, 2014
Apple has tossed out some hints that its App Store may soon accept apps that handle digital currencies such as bitcoin. Though there are many possible reasons for the move, one stands out: PornHub last month released an analysis of its 38 million daily visitors, which included the interesting observation that more than half were using mobile devices like tablets and smartphones.

See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS