OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
LinuxInsider.com
US Toughens Stance on Chinese Cyberspying With 5 Criminal Indictments
May 20, 2014
The U.S. Justice Department on Monday kicked up a notch the Obama administration's efforts to curb China's economic espionage activity against American businesses. A grand jury indicted five members of the Chinese army on DoJ allegations they conspired to hack into the networks of U.S. companies to steal information that would be useful to their competitors in China.
Hackers Paint Bull's-eyes on Cybercurrencies
May 19, 2014
Another digital currency was brought to its knees last week when the administrators of Doge Vault had to suspend operations after they discovered their online wallet service had been attacked by hackers. Following an investigation of the incident and the reconstruction of some of their damaged information from a backup, the administrators contacted users.
Russian Rocket, Satellite Don't Quite Make It
May 19, 2014
A space-bound satellite designed to provide Internet access to remote regions in Russia and neighboring states was destroyed when its ride blew apart mid-flight. The Proton-M rocket, affixed with a European-built Express AM4R satellite, seemed to be doing just fine until nine minutes into the flight, when it exploded some 93 miles above Earth. The exact cause of the crash apparently was not known.
'I Am Google': Pride Comes Before a Fall
May 19, 2014
Last week, I observed repercussions from one of the most arrogant moves I've ever seen an executive make. A small uproar occurred when a Google product strategist learned there were fewer people than he'd expected at an event he'd volunteered to speak at. As he stormed out, he uttered the immortal words, "I Am Google," to the event organizer -- whom he apparently thought was a booth babe.
Vendors Quibble With US Procurement Cybersecurity Plan
May 16, 2014
Protecting supply lines is essential to military success. But the U.S. government has now launched an initiative designed to protect the supply chain of both civilian and military agencies from potential cyberattacks. The effort will be especially important in the e-commerce procurement process. The initiative is being managed jointly by the GSA and the DoD.
In the Eye of the Right-to-Be-Forgotten vs. Right-to-Know Storm
May 16, 2014
A disgraced politician, a pedophile, and a doctor who received negative ratings from patients reportedly are among the hordes of people asking Google to take down links to information published about them. The requests followed Tuesday's preliminary ruling by the European Court of Justice indicating Google may have to remove links to people's names on request, if appropriate.
Fallout Begins Following EU Google Decision
May 15, 2014
This week's European high court decision against Google was "astonishing," according to Wikipedia founder Jimmy Wales, who called it "one of the most wide-sweeping Internet censorship rulings I've ever seen." Wales, like anyone who read the ruling, noticed that the parameters for judging whether content be removed were exceptionally ambiguous. This puts Google in dilly of a pickle, Wales said.
For Safe, Private Mobile Browsing, Huddle Under F-Secure's Freedome
May 15, 2014
At a meeting with the press earlier this year, F-Secure Chief Research Officer Mikko Hypponen -- yes, the man who sparked the angry exodus of a small group of malware vendors from the RSA security conference -- mentioned the company would soon unveil Freedome, a cloud-based service that would be pretty much the bees' knees for protecting mobile devices.
No, Bot! UN Ponders Regulations for Killer Robots
May 14, 2014
In a move that could complicate the creation of any more Terminator movies, United Nations diplomats on Tuesday discussed international laws to govern, or simply ban, the use of killer robots. This was the first time that a UN meeting was devoted entirely to the topic, which makes sense given that the robots in question don't yet exist. That said, the UN wants to be proactive.
EU Court Hands Google a Missing Links Quandary
May 13, 2014
The European Court of Justice, which is the highest court for matters of European Law, has handed down a preliminary ruling that indicates Google may have to remove links to consumers' names on request -- if appropriate. The case was referred to the ECJ by Spain's Audiencia Nacional, or National High Court. The ECJ's ruling lays down the guidelines for the Audiencia Nacional in hearing the case.
Psychologist: Search Results Could Sway Elections
May 13, 2014
Search engines could have a profound influence on voters, according to psychologist Robert Epstein, whose recent study chronicles the impact of what he dubbed the "search engine manipulation effect." Epstein has not produced any evidence that search engines intentionally manipulate elections. Even so, he claims the phenomenon is legit. This is not a new topic for Epstein.
Ransomware Gang Targets Android Phones
May 13, 2014
The Reveton Gang is at it again. This time, though, they're targeting users of Android phones -- typically visitors to porn sites. The gang that pioneered the idea of locking up a target's computer and demanding a ransom to unlock it has turned its attention to the rapidly growing mobile market. Once Reveton mobile infects a phone, it will display a bogus warning.
Snapchat Makes FTC Privacy Charges Disappear
May 09, 2014
Snapchat has agreed to a settlement with the United States Federal Trade Commission to resolve privacy issues resulting from a hacker's publication in January of data associated with 4.6 million of its users. The company has not admitted any wrongdoing, but it has agreed to implement a comprehensive privacy program that will be audited by a third party for the next 20 years.
John McAfee Makes Dubious Tech Comeback With Chadder Privacy App
May 07, 2014
Future Tense Central and Etransfr have debuted Chadder, an app that sends private encrypted messages. The app is one of a growing number of security products built around encryption technology and touted as secure that hit the market following Edward Snowden's massive data dump revealing the extent of the U.S. government's reach into consumers' digital lives.
Mobile CRM May Widen the Big Data/Privacy Divide
May 06, 2014
The White House last week added to the ongoing national discussion about online privacy and tracking with the release of a review counselor John Podesta conducted on Big Data and privacy issues. Among other things, privacy advocates hope the findings will spotlight the role of mobile in the gathering of consumer data by companies. Mobile technologies have a particularly voracious appetite.
The Tangled Web of IoT Security
May 06, 2014
The Internet of Things, or IoT, consists of "uniquely identifiable objects and their virtual representations in an Internet-like structure," according to Wikipedia. The IoT is "the network of physical objects accessed through the Internet," according to Cisco Systems. In addition to there being no clear definition of the IoT, estimates vary widely about the number of unique devices it includes.
Security Pros Struggle With Cyberthreat Angst
May 05, 2014
As the volume and sophistication of cyberattacks increase, system defenders in the trenches are losing confidence in their ability to protect their organizations' information assets, suggests a survey released last week. The survey of almost 5,000 global IT security pros found that 57 percent felt their organizations were unprotected from sophisticated cyberattacks.
Microsoft Gives XP One last Hug
May 03, 2014
When Microsoft included Windows XP in the Internet Explorer zero-day browser vulnerability patch it issued this week, some industry observers were stunned. Had the company decided to backtrack on its assertion that it would no longer support XP? Had it knuckled under to user protests? Not really. Redmond has not decided to backtrack on killing support for Windows XP; it made a one-time exception.
Heartbleed: SaaS' Forbidden Experiment?
May 02, 2014
Have you ever heard the term "The Forbidden Experiment"? If you're not familiar with it, it's a concept originating in the behavioral sciences relating to challenges in understanding human language development. Specifically, the "experiment" in question refers to actually testing empirically what would happen if a child were raised without language.
Feds Weigh In on Cybersharing Antitrust Issues
May 01, 2014
The use and scope of information technology has grown dramatically since 2000 -- and along with that growth have come ever greater cybersecurity threats to businesses, government agencies and consumers. The need to counter actual threats, as well as to prevent potential cybersecurity problems, calls for sharing information among vulnerable parties.

See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS