Find Command Cheat Sheet » Free from Linux Training Academy » Download Now!
Welcome Guest | Sign In
LinuxInsider.com
Salesforce Commerce Solution Guide
Hackers Use Microsoft Help Desk to Pull Off Massive Email Breach
April 16, 2019
Hackers piggybacked onto a Microsoft customer support portal between Jan. 1 and March 28 to gain access to the emails of noncorporate account holders on webmail services Microsoft manages, including MSN.com, Hotmail.com and Outlook.com. Microsoft has confirmed that a "limited" number of customers who use its Web service had their accounts compromised.
Zuckerberg Tries, Tries Again
April 6, 2019
Mark Zuckerberg's most recent effort to change the conversation about Facebook seems like just another attempt at self-justification. In a recent op-ed, he places the onus squarely on the shoulders of government to regulate how social media works. "I believe we need new regulation in four areas: harmful content, election integrity, privacy and data portability," Zuckerberg wrote.
What Lies Beneath Facebook's Sudden Embrace of Government Regulation
April 5, 2019
Facebook CEO Mark Zuckerberg called for greater government oversight and even regulation of the Internet in an op-ed piece published last weekend. Zuckerberg, who famously built the social network by playing by his own rules, said it was time for government and regulators around the world to step up and help rein in the Internet. The main point was to regulate what he called "harmful content."
Phishers Bait Hooks for Netflix, Amex Users
March 22, 2019
Cybersecurity experts at Microsoft's Windows Defender Security Intelligence Team this week reported their discovery of two new email-based phishing campaigns. One targets Amex users while the other targets Netflix customers. Both campaigns reportedly are very well-crafted, featuring legitimate logos and even fill-in forms that closely mimic those on the respective company's own websites.
Can Facebook Solve Its Worsening Privacy Problem?
March 14, 2019
The good news is that of the many troubles Facebook has, privacy seems to be front and center for both CEO Mark Zuckerberg and COO Sheryl Sandberg. The question is, will the actions they take to address the company's privacy issues be enough? If not, this is the kind of problem that can and will cause long-term damage to the Facebook brand. Its leaders need to come up with an immediate fix.
Mozilla Offers Free Secure File-Sharing Service
March 13, 2019
Mozilla has announced Firefox Send, a free encrypted file-sharing service that works in any browser. To share a file, you simply visit the Send site and drag your file to a box on the Web page. Unregistered users may upload up to 1 gigabyte in files, while registered users have a 2.5 GB allowance. After uploading your files, you choose an expiration time for the link used to share them.
End of the Line for Windows 7: Open Road for Hackers
March 7, 2019
Microsoft has been urging customers to upgrade from its Windows 7 operating system, while attempting to ease the transition with several options for extended support. It will stop providing routine fixes and security patches effective January 2020. Regular support for Windows Server 2008 also will end at that time. Windows 7 enterprise customers can subscribe to Extended Security Updates.
August Adds Wireless HD Video Doorbell to Smart Home Line
March 6, 2019
The August View is a wireless doorbell that can stream sharp 1440p HD video. It supports two-way audio, so you can talk to guests via an Internet connection. The View can be paired with August and Connected by August smart locks. That means you not only can speak to visitors remotely, but also can let them into your house. That functionality can be handy for accepting package deliveries.
Facebook's 2FA 'Security' Practices Violate User Privacy
March 5, 2019
Facebook has undermined privacy on its network by exposing mobile phone numbers provided to secure user accounts through two-factor authentication. That's because anyone can use the numbers to look up a user's account. One doesn't even have to be a Facebook member to do so. Moreover, there's no way to opt out of the setting, although it can be limited to "friends" only.
Android Addition Opens FIDO Password Killer to Billions
February 26, 2019
The FIDO Alliance hammered another nail into the passwords coffin with the announcement that devices running Android 7.0 or higher will be compatible with FIDO2, the latest version of its authentication solution. Certification of Android 7.0+ means devices running those versions of Google's mobile operating system will support FIDO2 out of the box or through a software update.
Wireless Carriers Caught Playing Fast and Loose With Location Data
February 8, 2019
AT&T, T-Mobile and Sprint have sold access to subscribers' real-time location data to aggregators, which in turn have sold it to about 250 bounty hunters and related businesses, according to a report. In some cases, the data allowed users to track individuals to their specific locations inside a building. Some companies made thousands of location requests to data brokers.
E-Ticketing Flaw Exposes Airline Passenger Data to Hackers
February 7, 2019
The e-ticketing systems of eight airlines, including Southwest Airlines and Dutch carrier KLM, have a vulnerability that can expose passengers' personal data, mobile security vendor Wandera has reported. They use unencrypted links that hackers can intercept easily. The hackers then can view and, in some cases, even change the victim's flight booking details, or print their boarding passes.
What's Wrong With the Social Media Model
January 31, 2019
The social media model has come under increased scrutiny following revelations of data misuse and news of executives reneging on some security commitments. People expecting to change the situation will need to address how social media works. This means changing not just the business model, which describes how a social media business makes money, but the fundamental technology model too.
Apple Squashes FaceTime Eavesdropping Bug
January 30, 2019
Apple has suspended its Group FaceTime application following reports that a bug in the software allowed callers to eavesdrop on the people they were calling. The flaw let a person making a FaceTime call listen through the phone of the person called before the call was accepted or rejected. It reportedly also allowed access to the front-facing camera in an iPhone.
Apple Pay's US Expansion Will Fuel Mobile Payment Turf Wars
January 23, 2019
Apple on Tuesday announced more large retailers will accept Apple Pay: Target, Taco Bell, Hy-Vee supermarkets in the Midwest, Speedway convenience stores, and the Jack in the Box fast food chain. With those additions, 74 of the top 100 merchants in the United States, and 65 percent of all retail locations across the country, now support Apple Pay, the company said.
Court: Cops Can't Compel the Use of Body Parts to Unlock Phones
January 16, 2019
Authorities can't force people to unlock their biometrically secured phones or other devices, ruled a federal judge in California. "The Government may not compel or otherwise utilize fingers, thumbs, facial recognition, optical/iris, or any other biometric feature to unlock electronic devices," Magistrate Judge Kandis A. Westmore wrote. Passcodes already are protected by the Fifth Amendment.
The Biggest Cybercrime Threats of 2019
January 11, 2019
A new year means a fresh start, but it doesn't mean that old threats will go away. In fact, in the world of cybersecurity things could get far worse before they get better. Cybercrime continues to increase, as it allows nefarious actors to operate at a safe distance from victims -- and more importantly, law enforcement. Cybercrime often doesn't get the same attention as other types of crimes.
BlackBerry Makes Autonomous Vehicle Play
December 13, 2018
BlackBerry this week introduced its new Security Credential Management System. SCMS -- a free service for the public and private sectors -- could encourage efforts to develop autonomous and connected vehicle pilot programs. BlackBerry undertook development of this technology to provide the critical infrastructure for vehicles and traffic lights to exchange information securely.
Quora Looks for Answers in Wake of Massive Data Breach
December 5, 2018
The personal data of some 100 million people who have used Quora, a popular question and answer website, has been compromised, the company disclosed. "We recently discovered that some user data was compromised as a result of unauthorized access to one of our systems by a malicious third party," wrote Quora CEO Adam D'Angelo in an online post. "We are working rapidly to investigate the situation."
How to Use a VPN for Safer Online Shopping
December 4, 2018
With the holidays fast approaching, are you looking to buy presents online? The holiday season has become synonymous with online shopping. This isn't really surprising as physical stores usually attract crowds of deal hunters. This often conjures up images of throngs of people waiting in line outside the store, some even camping out. This activity is tolerable for some and even fun for others.
Tesla vs. Jaguar: The First Real Electric Car Track Shootout
November 26, 2018
I'm a longtime Jaguar fan. I've owned a ton of them over the years, and I've had both good and bad experiences with the cars. Currently I own two -- a 1970 XKE and a 2014 F-Type -- and they are about to get a sibling. I've ordered a new Jaguar I-Pace, which is the first legitimate challenger to Tesla, which surprised the automotive industry much like Apple surprised the mobile phone industry.
Users Rate 'Creep Factor' in New Privacy-Security Product Guide
November 16, 2018
The Mozilla Foundation is expanding a campaign begun last year to help consumers buy safe, secure connected toys and mobile gadgets this holiday season. Mozilla's 2018 edition Privacy Not Included buyers' guide offers an assessment of the privacy and security qualities of 70 products, ranging from connected teddy bears and smart speakers to game consoles and smart home gadgets.
Cryptohackers Breach StatCounter to Steal Bitcoins
November 8, 2018
Hackers planted malware on StatCounter to steal bitcoin revenue from Gate.io account holders, according to Eset researcher Matthieu Faou, who discovered the breach. The malicious code was added to StatCounter's site-tracking script last weekend, he reported. The malicious code hijacks any bitcoin transactions made through the Web interface of the Gate.io cryptocurrency exchange.
How to Protect Your Online Privacy: A Practical Guide
November 7, 2018
Do you take your online privacy seriously? Most people don't. They have an ideal scenario of just how private their online activities should be, but they rarely do anything to actually achieve it. The problem is that bad actors know and rely on this fact, and that's why there's been a steady rise in identity theft cases from 2013 to 2017, often resulting in loss of reputation or financial woes.
Mobile Phone Security: All You Need to Know
November 6, 2018
We rely on our phones to process and store reams of personal digital data. Our digital activities -- from checking bank balances to paying for a product with a tap of the screen, to sending friends and family messages over social media, to accessing work emails remotely -- have turned our phones into a goldmine of personal information. How secure is your mobile device?
It Is Well Past Time for Elections to Be Online
November 5, 2018
Tomorrow a minority of those who are eligible will take time off, drive through traffic, and wait in lines to take part in one of the most artificially annoying obligations of United States citizenship: voting. Many who make that inconvenient trek will treat the process like a multiple choice test they haven't studied for, either voting the party line or guessing at the right answers.
Why You Should Manage Your IoT Devices Like Employees
September 15, 2018
There is a well-known joke among security professionals: Q: "What does IoT stand for?" A: "Internet of Threats." Sadly, this joke is our reality. An estimated 20.4 billion Internet of Things devices will be deployed by 2020, according to Gartner, in what some have dubbed "the fourth industrial revolution." These connected devices are being manufactured to streamline everything we do.
Android Apps Riskier Than Ever: Report
September 12, 2018
Widespread use of unpatched open source code in the most popular Android apps distributed by Google Play has caused significant security vulnerabilities, suggests an American Consumer Institute report. Thirty-two percent -- or 105 apps out of 330 of the most popular apps in 16 categories sampled -- averaged 19 vulnerabilities per app, according to the report. Researchers found critical vulnerabilities in many common applications.
Medical Device Insecurity: Diagnosis Clear, Treatment Hazy
September 11, 2018
An increasing number of healthcare professionals have become alert to the need for well-rounded medical device security in recent years, and players throughout the industry have started putting more effort into raising the bar. Developers have become aware of the most glaring holes, and more information security researchers have been brought into the fold.
The Thrill Is Gone for Many Facebook Users
September 6, 2018
American consumers' attitudes toward Facebook appear to be cooling, based on the results of a Pew Research Center survey. Forty-two percent of the roughly 4,600 people who responded to the May poll said they had taken a break of several weeks from checking the platform. "Facebook's probably losing subscribers for a number of reasons," said Frost & Sullivan's Michael Jude.
See More Articles in Consumer Security Section >>
Salesforce Commerce Solution Guide
How much are you willing to pay for a new smartphone?
I'll pay $1.5K or more for the latest iPhone or Galaxy flagship phone.
I want the latest model, but I can't see paying more than $1K for a phone.
I'm content to buy a slightly older model in the $500 - $750 range.
I don't need an iPhone or Galaxy. I can find a really good phone for $350 or less.
Phone prices are ridiculous. I won't pay more than $100.
I don't have or want a smartphone.
Salesforce Commerce Solution Guide