Welcome Guest | Sign In
LinuxInsider.com
Manipulative User Research Earns Facebook a Shiner
June 30, 2014
Once again, Facebook is embroiled in a controversy over privacy. This time, hackles have been raised by publication of a study for which the company manipulated the News Feeds of nearly 700,000 subscribers. The study concluded that negative messages on social networks make people sad, and positive ones make them happy -- and those feelings can spread through a social network to third parties.
Facebook, NY DA Lock Horns Over User Data Warrants
June 27, 2014
Facebook, not known for respecting users' privacy, is battling a New York County district attorney's demand for all information pertaining to the accounts of several hundred of its subscribers. DA Cyrus Vance's office issued 381 secret warrants for the information in July of 2013 in a hunt for retired police officers and firefighters wrongfully claiming Social Security disability benefits.
Google Worms Its Way Into Nest
June 26, 2014
Google-owned Nest Labs, maker of smart thermostats and smoke detectors, this week launched a developer program along with partnerships that already have products on offer. Partners include Jawbone; LIFX, which makes smart WiFi-enabled light bulbs; Logitech; and Mercedes-Benz, which will offer models that allow owners to remotely control the Nest device.
Google Starts Purging Search Results in Europe
June 26, 2014
Google has started to remove search results in certain cases in Europe, in compliance with the EU's new "right to be forgotten" rules. The EU last month ruled that the company must allow individuals to request the removal of links to news articles, court judgments, and other documents that might turn up in results when searches are conducted on their names.
No Cellphone Search Without Warrant, Supreme Court Rules
June 26, 2014
Police need a warrant to search the cellphone contents of people they have arrested, the United States Supreme Court ruled Wednesday. Warrantless searches, in essence, would impact privacy to a far greater extent than is acceptable. The ruling also applies to individuals stopped for questioning by the authorities, said Jake LaPerruque of the Center for Democracy and Technology.
Card Fraud Hits 1 in 4 Consumers Worldwide: Report
June 25, 2014
As many as a quarter of the world's consumers were victimized by card fraud in the past five years, and financial institutions are losing customers as a result, suggests a new study. ACI Worldwide and the Aite Group, which jointly surveyed more than 6,100 customers in 20 countries, found that 23 percent of consumers hit by card fraud changed financial institutions because they were dissatisfied.
To Pay or Not to Pay - That's the Ransomware Question
June 24, 2014
Ransomware is a growing problem for consumers and businesses alike. In Symantec's most recent quarterly security report, the company's researchers found all targeted attacks -- including ransomware -- grew 91 percent year-over-year. That's raising a big question for those targeted by cyberextortionists: Should the ransom be paid? Security experts generally say no, but some insert a caveat or two.
Heartbleed Flaw Goes Unpatched on 300K Servers: Report
June 23, 2014
Two months after the Heartbleed vulnerability sent frissons of fear down the spines of IT managers everywhere, 300,000 servers still remain vulnerable, Errata Security said. When the flaw was announced in April, Errata found 600,000 servers vulnerable. "The norm is to do no patches at all for some systems, no matter how easy it is to patch," said Errata CEO Robert Graham.
White House Tilts Toward Public-Private Cybersecurity Cooperation
June 23, 2014
The Obama administration and the private sector -- often at odds over the regulation of everything from telecom issues to software protection to the environment -- apparently agree that a major issue dealing with cybersecurity should be addressed on a cooperative basis, largely free of federal regulation. The White House recently signaled its tilt toward a cooperative and voluntary approach.
Researchers Find Android Security on Par With iOS
June 18, 2014
The open source mobile operating system Android long has been considered by security experts to be the mobile OS most vulnerable to security threats, but iOS is just as vulnerable. However, the two OSes expose users to different types of threats. The perceived greater security of iOS rests on Apple's control of app distribution rather than on any inherent superiority of the OS over Android.
BlackBerry Unveils BBM Protected to, Ahem, Protect Market Share
June 18, 2014
BlackBerry, whose share of the mobile phone market has been on a downward spiral, this week launched BBM Protected, the first in its planned eBBM Suite of secure enterprise-class messaging products. BBM Protected targets regulated industries. It's claimed to be the only secure mobile instant messaging app that uses a FIPS 140-2 validated cryptographic library.
Godzilla Foreshadows Trouble for Internet of Things
June 16, 2014
The Internet of Things has come under attack by pranksters in recent days. The events could signal tumultuous things to come as more and more everyday objects connect to the Internet. Homeland Security has advised the customers of digital sign maker Daktronics to "take defensive measures" following a series of cyberpranks on the company's traffic signs.
Project Galileo Offers DDoS Protection for Free Expression Online
June 13, 2014
CloudFlare on Thursday announced the launch of Project Galileo, a service designed to provide enterprise-grade protection against distributed denial of service attacks free of charge to certain sites, with the goal of protecting freedom of expression on the Internet. CloudFlare is working with a number of partners to identify at-risk sites that qualify.
Microsoft Pushes Back Against US Data Warrant
June 12, 2014
The latest court ruling in an ongoing battle between Microsoft and demands from the United States government for data about one of the company's users, seems to have a lot of folks running for cover. In 2013, U.S. Magistrate Judge James Francis issued a search warrant requiring Microsoft to turn over all date pertaining to the subscriber, hosted on a server in Ireland, to the U.S. authorities.
5 Myths of Virtualization Security: You May Be More Vulnerable Than You Think
June 11, 2014
Businesses increasingly are relying on virtual machines to handle more critical data and tasks than ever before. The reality is that virtualization is growing as a platform for managing customer data, financial transactions and the applications that businesses use. Simply put, virtualization is a core component of today's mission-critical IT infrastructure.
Cupid Fires Arrow at OpenSSL's Heart
June 10, 2014
As if the discovery of the Heartbleed flaw weren't enough woe for OpenSSL, more than half a dozen additional defects have been discovered in the code used to protect communication on the Web. Among them is one dubbed "Cupid" by its discoverers. The flaw can be used to compromise enterprise networks. Like Heartbleed, Cupid uses a malicious heartbeat packet to compromise a TLS connection.
Free Speech vs. Internet Privacy and the 'Right to Be Forgotten'
June 10, 2014
The conventional wisdom of the Internet is that everything posted, whether on social media, a website or anywhere else, will be on the Internet forever. That conventional wisdom was just challenged successfully in a recent ruling handed down by the EU's highest court. A new conventional wisdom may arise from that ruling -- that we have a "right to be forgotten."
Open Source Persistence: Resistance Is Futile
June 09, 2014
Software developers routinely use open source components to boost productivity and improve the quality of their code. The problem for enterprises is that companies using open source must properly manage it and comply with its licensing, as with any third-party code. That becomes difficult to do when corporate leaders do not know their computer systems are running open source code.
Why Mobile Providers Will Have to Give a Little on Privacy
June 06, 2014
Apple has tossed out some hints that its App Store may soon accept apps that handle digital currencies such as bitcoin. Though there are many possible reasons for the move, one stands out: PornHub last month released an analysis of its 38 million daily visitors, which included the interesting observation that more than half were using mobile devices like tablets and smartphones.
Google Releases Email Encryption Tool Alpha
June 06, 2014
Google this week released the alpha version of source code for End-to-End, a Chrome browser extension that encrypts email. End-to-End uses the OpenPGP standard to encrypt, decrypt, digitally sign and verify signed messages within the browser. "We're just sharing the code today so that the community can test and evaluate it, helping us make sure that it's as secure as it needs to be," Google said.
US-Led Posse Scatters GameOver Zeus Botnet
June 04, 2014
A worldwide operation led by the U.S. involving law enforcement, private sector cybersecurity firms and software vendors has disrupted the GameOver Zeus botnet for now. The U.S. also has filed criminal charges in Pittsburgh, Penn., and Omaha, Neb., against Russian national Evgeniy Mikhailovich Bogachev, and has charged a number of other suspects in the Russian Federation and the Ukraine.
Spammers Quick to Exploit eBay Breach
June 03, 2014
If you're a spammer, big news like the recent breach of eBay's computers is like striking oil in your back yard. Spammers live for headline-grabbing events that they can use to separate gullible Web wanderers from their money, so the eBay breach is a perfect vehicle for a scam. In this case, they try to convince recipients their eBay credentials could be used to give them a criminal record.

See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS