Welcome Guest | Sign In
LinuxInsider.com
Gang Surrenders Key to TeslaCrypt Ransomware Kingdom
May 20, 2016
Eset on Wednesday announced that it has fashioned a free tool that victims of all variants of the TeslaCrypt ransomware can use to unlock affected files. After the criminal gang behind TeslaCrypt recently abandoned support of the malicious software, an Eset analyst contacted the group anonymously, using the channel offered to ransomware victims, and asked for the universal master decryption key.
Google Challenges Right to Be Forgotten in French High Court
May 20, 2016
Google on Thursday filed an appeal with France's supreme administrative court over an order from a privacy regulator requiring it to scrub certain search results around the world under a law called "the right to be forgotten." The March order from the CNIL requires Google and other search engines to delist the information of Europeans that shows up in searches for their name.
Flaw Puts a Billion Wireless Mice at Risk
May 20, 2016
Wireless mice and keyboards are the perfect accessories for a world in which devices increasingly are shuffling off their connection coils, but those accessories -- especially untethered rodents -- also can create new threats for those who use them. One such threat is Mousejack. The attack exploits a vulnerability found in 80 percent of wireless mice.
China Subjects Tech Imports to Heavy Security Scrutiny
May 19, 2016
China reportedly is investigating the encryption and data storage features of technology products sold there by large foreign companies such as Apple to determine whether the products pose a security threat. A committee associated with the Cyberspace Administration of China reportedly is conducting reviews that include interviews of company executives and other employees.
Google to Dim Flash Player in Chrome Browser
May 17, 2016
Google last week announced that it would minimize use of Adobe's Flash Player in its Chrome Web browser by the end of the year by turning off its default status. When Chrome encounters a Web page, it will report the presence of Flash Player only if a user has indicated that the domain should execute Flash or if the site is in one of the top 10 domains using Flash, ‎Google's Anthony LaForge said.
Privacy Concerns Curb Online Commerce, Communication
May 17, 2016
Concern about online security and privacy are leading Americans to curtail online activity, the NTIA reported last week. More than 41,000 households with at least one Internet user in July responded to several privacy and security questions the U.S. Census Bureau posed for the NTIA. Eighty-four percent of those households named at least one online privacy and security concern.
Docker Ramps Up Container Security
May 13, 2016
Docker this week announced the rollout of security scanning technology to safeguard container content across the entire software supply chain. Docker Security Scanning is an opt-in service for Docker Cloud private repository plans. It provides a security assessment of the software included in container images. It enables detailed image security profiles.
Data Breaches Chip Away at IT Pros' Confidence in Security
May 12, 2016
The daily barrage of data breach news appears to be eroding confidence in security solutions. Fifty percent of IT pros aren't confident about the ability of their security measures to protect their data, according to a survey released last week by Barkly. The high percentage of IT pros with doubts about their security systems caught Barkly CTO Jack Danahy off-guard.
Reddit Tech Forum May Ban Sites That Circumvent Ad Blockers
May 11, 2016
A forum on Reddit, /r/ Technology, on Monday announced it was considering blocking links to websites that require visitors to turn off their ad blockers before viewing content on the site. "It has come to our attention that many websites such as Forbes and Wired are now requiring users to disable ad blockers to view content," said creq, the moderator of the site. "We see this as a security risk."
Feds to Take a Hard Look at Mobile Device Patch Practices
May 11, 2016
The U.S. Federal Trade Commission and the Federal Communications Commission on Monday announced a joint investigation into the issue of mobile device security updates. The FTC issued an order requiring Apple, BlackBerry, Google, HTC America, LG Electronics USA, Microsoft, Motorola Mobility and Samsung Electronics America to provide information about how they issue security updates.
IBM to Drill Watson in Cybersecurity
May 11, 2016
IBM on Tuesday announced Watson for Cyber Security, a cloud-based version of its AI technology, trained in cybersecurity as part of a year-long research project. IBM will collaborate with eight universities with renowned cybersecurity programs, including MIT and the University of Waterloo in Canada. The universities' students will provide the data for Watson.
Report: Companies in the Dark About Their Open Source Risk Exposure
May 10, 2016
Commercial software is full of security vulnerabilities from unpatched open source components developers use, according to a report Black Duck Software issued last week. Software companies misjudge how much open source code their commercial products contain, according to the report, which is based on an analysis of 200 applications researchers viewed over the previous six months.
Tweet Tracker Spurns US Intelligence Agencies
May 10, 2016
Twitter reportedly has blocked U.S. intelligence agencies from accessing information from Dataminr, a firm that tracks tweets in real time to provide actionable information for financial, media, security and other types of institutional clients. The block suggests Twitter is unwilling to cooperate with government agencies on intelligence gathering. Twitter owns a 5 percent stake in Dataminr.
Adblock Plus to Websites: 'We've Got Your Back'
May 6, 2016
Adblock Plus, which has been in the forefront of online ad blocking, this week announced the beta of Flattr Plus, which promises no less than to revolutionize Web monetization. Users decide how much money they want to have distributed among their favorite sites, and the Flattr Plus algorithm automatically divvies up the proceeds among the sites they engage with the most.
ISIS Cyberthreat: Puny but Gaining Power
May 5, 2016
The Islamic State group's cyberwar capabilities are unsophisticated, but they won't be that way for long. That was the conclusion of a 25-page report released last week by Flashpoint. The report, "Hacking for ISIS: The Emergent Cyber Threat Landscape," found that the Islamic State's "overall capabilities are neither advanced nor do they demonstrate sophisticated targeting."
Russian 'Collector' Sells Stolen Email Credentials for a Song
May 5, 2016
A hacker dubbed "The Collector" turned over 272 million stolen email credentials in his possession, Hold Security announced Wednesday. The hacker bragged online about the stash, which included usernames and passwords, the firm said. It got a copy of the data -- which the hacker was peddling for 50 rubles, or less than US$1 -- after giving him a shout-out in the forum.
Researchers Hijack Samsung's SmartThings IoT System
May 4, 2016
Researchers at the University of Michigan on Monday announced they had uncovered a series of vulnerabilities in the Samsung SmartThings home automation system that essentially could have allowed hackers to take control of various functions and break into a user's home. The researchers, working with Microsoft, were able to perform four proof-of-concept attacks.
Cybersecurity Goals to Guide Federal Software Spending
May 4, 2016
The U.S. government is on track to significantly boost spending on cybersecurity solutions. However, evolving requirements to greatly improve federal protection of information technology resources will shape that spending. In fact, federal cyberprotection goals should be augmented and significantly modified, according to recent studies of the federal market.
Law Affords More Protection to PINs Than Prints
May 3, 2016
A federal magistrate in Los Angeles ordered the girlfriend of an alleged gang member to open her phone using her fingerprint so prosecutors could look at the data on it for a case they were working on, according to a news report published last week. After Paytsar Bkhchadzhyan pleaded no contest to identity theft, a judge issued a warrant to force her to press her finger to her iPhone to open it.
Supreme Court Grants Federal Agents Broader Surveillance Authority
May 3, 2016
The U.S. Supreme Court has approved a series of amendments to the federal rules of criminal procedure that would let judges issue search warrants for computers located outside their jurisdiction. Chief Justice John Roberts announced the changes in the Court's interpretation of the rules. They would allow a judge to issue warrants to search for electronic evidence at remote sites, for example.
Osterloh's Return Suggests Google Just Got Serious About Hardware
May 2, 2016
Google has rehired former executive Rick Osterloh to lead its hardware businesses, which it plans to consolidate under a single division, according to news reports published last week. Osterloh, who recently stepped down as president of Motorola, reportedly will head up Google's Nexus business, which will include a suite of products dubbed the "living room."
BlockIQ Escalates War on Ad Blockers
April 28, 2016
As consumers turn to ad blockers to avoid advertising on their mobile and computer screens, marketers and content providers who depend on pitches to pay the bills are searching frantically for ways to counter the pesky programs. BlockIQ offers them one. BlockIQ, owned by AdSupply, which recently merged with Adaptive Medias, has launched BlockBypass.
Alexa Takes Up Residence in a Really Smart Fridge Magnet
April 28, 2016
Invoxia on Thursday announced that Amazon's Alexa Voice Service has been integrated with its Triby digital assistants. The voice-activated unit is the first non-Amazon product to be Alexa-enabled. Triby, which has a magnetic frame, features a built-in speaker and microphone that can be used to listen to Internet radio or as a hands-free speakerphone, but its main function is to act as a digital assistant.
FBI Says Its Hands Are Tied on Revealing iPhone Crack Details
April 28, 2016
The FBI on Wednesday confirmed its decision not to inform Apple of how it hacked into the encrypted iPhone used in last December's San Bernardino terrorist attack. The bureau was investigating the possibility that deceased shooters Syed Farook, who used the iPhone, and his wife may have had links to other terrorist plots. It also was searching for evidence tying the two to ISIS.
IT Execs Join Federal Cybersecurity Panel
April 28, 2016
Key components of the Obama administration's multipronged cybersecurity initiative keep falling into place. One of the most recent developments was the formation of a federal Commission on Enhancing National Cybersecurity. Another was the formal introduction in Congress of the administration's information technology investment plan, which is heavily tilted toward cybersecurity protection.
Pentagon to Open New Cyberfront in War Against ISIS
April 27, 2016
The Obama administration reportedly has authorized a new online campaign in its slow, grinding war against ISIS. The Pentagon's Cyber Command will target ISIS in a way that essentially will get inside the heads of terrorist commanders to disrupt their military operations. The plan amounts to dropping cyberbombs on the enemy, said Deputy Secretary of Defense Robert O. Work.
New Attack Technique Hides Spread of RATs in Asia
April 27, 2016
SentinelOne last week announced that it has detected a technique being used in Asia to infect systems with remote access Trojans that ensures that the payload remains in memory throughout its execution and doesn't touch the victim's computer disk in an unencrypted state. Attackers remain hidden from antivirus and next-generation technologies that focus only on file-based threats.
White Hat Finds Security Threats on Facebook's Corporate Net
April 26, 2016
A white hat hacker last week announced the discovery of more than a half-dozen security flaws in some software Facebook used on its corporate network. While performing penetration testing third-party software in a network appliance Facebook used, Orange Tsai discovered seven vulnerabilities that attackers could use to compromise a system, as well as a backdoor script left by someone else.
Treasury Department Examines Internet's Impact on Finance System
April 25, 2016
Information technology -- especially the Internet -- can have a positive impact on the U.S. financial system. Used improperly, however, such tools can wreak havoc on the financial sector and consumers. The Office of the Comptroller of the Currency, a unit of the U.S. Department of the Treasury, has launched an initiative on the future of e-commerce finance in light of technology innovation.
With Latest Opera Browser, Everybody Gets Free VPN
April 22, 2016
Opera on Wednesday announced that it would add a free VPN service to the latest version of its browser. VPNs, or virtual private networks, add an extra level of security for Web surfers. Companies use them to provide secure communications for employees remotely accessing office systems, and consumers use them to block unwanted snooping on their online activity.
See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS
Live streaming video...
is the next big thing.
is a passing fad.
will dramatically improve citizen journalism.
will feed a lot more disturbing imagery to the Web.
doesn't interest me.