Showcase Your Business as a Thought Leader - Publish Your Blog, Videos and Events on ALL EC - Save 25% Now
Welcome Guest | Sign In
LinuxInsider.com
Google One Paid Storage Now Open to All US Users
August 17, 2018
Google has announced the availability of Google One as a storage upgrade option for people in the United States. The option will become available in other countries within the next few weeks. Users with paid Google Drive storage plans automatically were upgraded to Google One in the past few months, noted Pavni Diwanji, VP of Google One. Google One plans begin at $1.99 for 100 GB.
The Two Sides of the Artificial Intelligence Coin
August 16, 2018
The growth of artificial intelligence in recent years has been astounding -- yet AI is still in the very early stages of growth. Where are we today with this new technology, and where are we heading? Which companies are struggling, and why? What's coming next? AI for years has been a staple of science fiction. Now AI has moved beyond sci-fi and become real, with all sorts of technologies.
Alexa and Cortana: Two AI Heads May Be Better Than One
August 16, 2018
Microsoft and Amazon have released a public preview of the integration of their Cortana and Alexa voice assistants. Cortana will be available on amazon Echo devices, while Alexa will be available on Windows 10 devices and on Harman Kardon Invoke speakers. "Our ongoing goal has been to make Cortana your intelligent assistant, wherever you need assistance," a Microsoft spokesperson said.
Farsight Security COO Alexa Raad: 'Be Your Own Champion'
August 14, 2018
"If you think about Internet threats like phishing and botnets and malware -- all of those start with a DNS -- a domain name system. And so every kind of nefarious act leaves footprints and fingerprints in the DNS. That's something that cannot be faked," said Farsight Security COO Alexa Raad. For example, "a lot of the new domain names that are registered are typically registered with bad intent."
What Can Chrome 68 Teach Us About Election Security?
August 13, 2018
If you're a technologist, you've probably noticed a few new things associated with Chrome 68's release last month. One of the more notable changes is that it now uses a "not secure" indicator for any site not using HTTPS. So instead of providing a notification when a site is HTTPS, it now provides the user with a warning when it isn't. One of those groups is users of government websites.
AI-Driven Marketing Offers High Hopes to B2B Firms
August 8, 2018
Versium has announced a partnership with LiveRamp to launch artificial intelligence-powered B2B audience segments,as part of a new business-to-business data management platform. The partnership will let companies perform online targeting of offline business professional data that often is housed within their own CRM systems. LiveRamp customers will get access to Versium's modeling engine.
Virus Attack on Chipmaker Could Delay Next iPhone
August 7, 2018
A computer virus over the weekend disrupted the operations of the Asian manufacturer that makes chips for the iPhone and other devices offered by top shelf high-tech companies. TSMC said that a virus outbreak Friday evening affected a number of computer systems and fab tools at its facilities in Taiwan. The incident likely will cause shipment delays and create additional costs.
Leveraging Blockchain for B2B E-Commerce
August 6, 2018
Worldwide spending on blockchain will hit $1.5 billion this year -- twice as much as in 2017 -- and it will total nearly $12 billion in 2022, according to IDC. The technology is expected to have a five-year compound annual growth rate of 73.2 percent. Cross-business collaboration and interoperability have emerged as key aspects in the technology's growth.
Homeland Security Unveils Center to Combat Cyberthreats
August 1, 2018
DHS has announced the National Risk Management Center, part of a new effort to combat cyberthreats to the U.S. The new agency's mission will be to defend the critical infrastructure through greater cooperation between the public and private sectors. The center will bring together government experts and industry partners to work out ways that the government can support the partners.
How Online Businesses Must Comply With New California, EU Privacy Laws
July 27, 2018
Governor Jerry Brown last month signed into law the California Consumer Privacy Act. The CCPA is the state's response to a growing concern that consumers need stronger means to protect their personal information. The issue came to a head in part due to recent breaches that exposed the personal data of millions of American consumers. However, the CCPA also addresses other privacy incidents.
Feds Seem to Favor 'Light Touch' IoT Regulation
July 24, 2018
The Internet of Things may be in its infancy, but the U.S. government has been gearing up to determine what the proper federal role should be, both for encouraging and for regulating the use of IoT technology. Two recent developments have underscored the government's interest in IoT. On the regulatory front, the CPSC has launched an initiative to determine a framework for regulation.
Cover Up, Your Smart TV May Be Spying on You
July 18, 2018
Did you know that fancy smart TV sitting in your living room, kitchen, bedroom or bathroom actually may be watching you? Sorry to break it to you. It's another example of amazing modern technology designed to help marketers while striking a blow to privacy. Then again, we haven't had privacy in more years than I can remember. There are two ways to look at this. If you are a marketer, you love it.
New iOS Security Feature Ripe for Defeat
July 11, 2018
A new feature in iOS 11.4.1, which Apple released earlier this week, is designed to protect against unwanted intrusions through the iPhone's Lightning Port. However, the protection may be weak at best. The feature, called "USB Restricted Mode," disables data transfer through the Lightning Port after an hour of inactivity. In some cases, the phone might not charge, according to Apple.
US Lawmakers Eye Apple, Alphabet Data Privacy Practices
July 11, 2018
The House Committee on Energy and Commerce has written Alphabet CEO Larry Page and Apple CEO Tim Cook demanding information on their companies' practices with regard to third-party access, audio and location data collection. "This is a huge issue," said Consumer Watchdog's John Simpson. "People are becoming aware of how much data about them is being sucked up by their smartphones."
Polar Flow Fitness App Exposes Soldiers, Spies
July 10, 2018
A popular fitness app provided a convenient map for anyone interested in shadowing government personnel who exercised in secret locations, including intelligence agencies, military bases and airfields, nuclear weapons storage sites, and embassies around the world. The fitness app, Polar Flow, publicized more data about its users in a more accessible way than comparable apps, investigators found.
Security Economics: The Key to Resilience
July 5, 2018
There are times when looking at something narrowly can be more effective than taking a wider and more comprehensive view. If you don't believe me, consider the experience of looking at organisms in a microscope or watching a bird through binoculars. Distractions are minimized, allowing optimal evaluation and analysis of what's under investigation.
Breaking the Fraud Chain
June 29, 2018
Retailers' biggest worry is increasing e-commerce fraud -- including data breaches, targeted attacks and card-not-present fraud -- according to a report from the Federal Reserve Bank of Minneapolis. Online fraud is one of the biggest challenges facing retailers, with CNP fraud being one of their top worries. CNP fraud will hit $71 billion over the next five years, Juniper Research has forecast.
EU Watchdog Accuses Facebook, Google of Privacy Shenanigans
June 29, 2018
Facebook and Google have manipulated users into sharing data using so-called "dark patterns," according to a report from the Norwegian Consumer Council. The practices nudged users toward accepting privacy options that favored the tech companies rather than themselves, the NCC found. Facebook and Google have no intention of providing users with an actual choice, the NCC has claimed.
WPA3 Arrives to Shore Up WiFi Security
June 27, 2018
Network devices with better security will be hitting the market this year, thanks to Wi-Fi Certified WPA3, which the Wi-Fi Alliance launched Tuesday. The announcement paves the way for the proliferation of devices that support the new, more secure protocol for WiFi communication, which is designed to replace the 14-year-old WPA2. The new protocol adds features to simplify WiFi security.
The Dismal State of Healthcare IoT Security
June 25, 2018
The healthcare industry has been moving toward medical equipment connectivity to speed up data entry and recording, as well as improve data accuracy. At the same time, there has been a shift toward incorporating consumer mobile devices, including wearables. "The demand for connected devices has increased rapidly in recent years," noted Leon Lerman, CEO of Cynerio.
The IoT's Perplexing Security Problems
June 19, 2018
Worldwide IoT spending will total nearly $773 billion this year, IDC has predicted. The IoT will sustain a compound annual growth rate of 14.4 percent, and spending will hit $1.1 trillion by 2021, according to the firm's forecast. Consumer IoT spending will total $62 billion this year, making it the fourth largest industry segment, after manufacturing, transportation and utilities.
Can Hackers Crack the Ivory Towers?
June 19, 2018
Academics have been hard at work studying information security. Most fields aren't as replete with hackers as information security, though, and their contributions are felt much more strongly in the private sector than in academia. The differing motives and professional cultures of the two groups act as barriers to direct collaboration, noted CypherCon presenter Anita Nikolich.
Upcoming iOS Access Restrictions Could Stymie Law Enforcement
June 16, 2018
Apple plans to equip iOS 12 with USB Restricted Mode, which requires users to unlock their iPhone with their passcode before USB accessories can connect if the phone last was unlocked more than an hour earlier. The company included this feature in the developer versions of iOS 11.4.1 and iOS 12. Apple will release USB Restricted Mode publicly in a future software update, it confirmed this week.
Breach Litigation: A Growing Risk for E-Commerce Businesses
June 15, 2018
The expanding world of Internet commerce likely will generate a corresponding expansion of data breaches, resulting in more e-commerce businesses becoming the targets of consumer class action lawsuits. Breach litigation has become more prevalent as a result of a perceptible legal trend favoring consumers. Courts have tended to allow lawsuits based on a lower threshold for establishing injury.
The CLOUD Act's Dramatic Impact on International Privacy Laws
June 7, 2018
Just when the European Union's General Data Protection Regulation, or GDPR, was about to go into effect, the United States Congress created the CLOUD Act. Without any public hearings, review or public comment, Congress passed the legislation as part of the $1.3 trillion government spending bill. The CLOUD Act changed the privacy provisions that previously were in effect.
Dark Screen Mode Among New macOS Mojave Highlights
June 6, 2018
Apple on Monday gave the world a peek at macOS Mojave, the next version of its operating system for Macintosh laptop and desktop computers. The preview took place at the company's Worldwide Developers Conference held at the McEnery Convention Center in San Jose, California. Mojave has a mix of new features that add to its good looks and utility as a productivity tool.
Oracle's Security Jag
June 2, 2018
Oracle has been on a security campaign ever since Larry Ellison openly began discussing the new "autonomous database" -- so called because it can manage itself, including self-patching and upgrading, without human effort. The hands-off database can eliminate human labor to keep it tuned and running, according to Oracle, greatly reducing the time between availability and implementation.
The Cloud's Hazy Security
May 31, 2018
A significant percentage of IT systems are cloud-based, according to a recent survey. The cloud is a key enabler for emerging technology, suggests the CompTIA poll, which was conducted last month. Cloud computing was one of four trends respondents expected to feature heavily in IT conversations over the next 12 to 18 months, the survey found. Others were AI, the IoT and cybersecurity.
DevOps: Plenty of Devs, Not Enough Ops
May 29, 2018
In spite of all the high-profile breaches that seem to sweep the headlines with greater frequency, companies slowly but surely have been getting a handle on internal security practices. At this point, it's hard to imagine any employee, in or out of the tech sector, who hasn't been run through antiphishing training. However, security is only as strong as its weakest link.
Realistic 'Zero Trust' for Your Cybersecurity Program
May 29, 2018
If you're a cybersecurity practitioner, chances are good that you've heard the term "zero trust" over the past few months. If you attend trade shows, keep current with the trade media headlines, or network with peers and other security pros, you've probably at least heard the term. Depending on whom you're talking to, you'll get a different answer about what it is and why it might be useful.
See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS
Content Marketing on ALL EC
What role will technology play in the upcoming U.S. midterm elections?
Advanced security measures will protect the legitimacy of the elections.
Inadequate security will place the election process at grave risk.
Voter technology is so decentralized, attackers can't have much impact.
Companies that manufacture voting machines need to shore up their security.
The upcoming midterms will be no better or worse than others from a tech standpoint.