Welcome Guest | Sign In
LinuxInsider.com
New Open Source Tools Test for VPN Leaks
December 13, 2017
ExpressVPN on Tuesday launched a suite of open source tools that let users test for vulnerabilities that can compromise privacy and security in virtual private networks. Released under an open source MIT License, they are the first-ever public tools to allow automated testing for leaks on VPNs, the company said. The tools are written primarily in Python, and available for download on Github.
Oops... Some HP Laptops Shipped With Hidden Keylogger
December 12, 2017
Some HP laptops users came with a preinstalled program to capture the keystrokes of users, a security researcher recently discovered. The researcher, Michael Myng aka "ZwClose," discovered the keylogger software while trying to solve a keyboard problem for a friend. The software is turned off by default. After Myng contacted HP about the program, it quickly released a patch to get rid of it.
Feds: Cloud Cybersecurity Benefits Now Outweigh Risks
December 11, 2017
Many federal government IT managers used to be wary of the shortcomings of migrating to cloud technology because of potential data security problems affecting email, business systems, personal data records and, especially, national security operations. However, after the federal "cloud first" initiative's six-year effort, there are signs that federal IT managers have changed their assessment.
The Return of Industrial Espionage and the Building New Wave of Scandals
December 4, 2017
As powerful men drop like flies due to their inability to resist abusing their authority, it's clear that the problem is widespread. Similarly, it's likely that we'll find the problem of alleged industrial espionage is not limited to Uber. You see, when people misuse authority -- and the sexual harassment problem is a massive misuse of authority -- folks typically don't just misuse it in one area.
Quantum Key Distribution Gets a Speed Boost
November 30, 2017
A method for scrambling data to protect it from the super powerful computers of the future has received a speed boost from a team of researchers from Duke and Ohio State universities and the Oak Ridge National Laboratory. The method uses quantum key distribution to guard data from prying eyes. The problem in the past with the technology is it's slow. Transfer speeds typically are measured in kilobits per second.
MacOS High Sierra Flaw Creates High Anxiety
November 29, 2017
Apple has released a security update to fix a serious flaw revealed via Twitter. The patch is available for macOS High Sierra 10.13.1. macOS 10.12.6 and earlier versions aren't affected. "This morning, as of 8 a.m., the update is available for download, and, starting later today, it will be immediately automatically installed on all systems running MacOS High Sierra 10.13.1," Apple said.
Risky Scripts Pose Threat to Web Surfers, Say Researchers
November 28, 2017
A popular technique used by website operators to observe the keystrokes, mouse movements and scrolling behavior of visitors on Web pages is fraught with risk. The technique offered by a number of service providers uses scripts to capture the activity of a visitor on a Web page, store it on the provider's servers, and play it back on demand for a website's operators.
Offsetting Asymmetry With Automation
November 24, 2017
In the security world, there is a truism that defense is harder than offense because it's an asymmetric playing field. The bad guys need only find one path into an environment -- one place where everything hasn't been done exactly "just so" and perfectly -- while those charged with securing that environment need to protect against intrusions everywhere they have a technology footprint.
BlackBerry: The Most Important Mobile Company of the Future?
November 20, 2017
If you are like many, when you saw this headline you likely were surprised BlackBerry was still around. As BlackBerry phones left the market, the company fell out of sight. However, behind the scenes it has been moving into industries like automotive. Also, it remains the leading vendor providing mobile security to our politicians, military personnel and major corporations.
Newly Revealed Flaw Could Subject IoT Devices to Airborne Attacks
November 17, 2017
Billions of voice-activated IoT devices may be subject to external attack due to BlueBorne vulnerabilities, Armis revealed. Hackers could exploit BlueBorne to mount an airborne attack, using Bluetooth to spread malware and access critical data, including sensitive personal information. More than 20 million Amazon Echo and Google Home smart speakers could have been impacted by the flaws.
Fixes MIA for Many Linux Kernel Flaws
November 11, 2017
A Google code security researcher's recent discovery of 14 flaws in Linux kernel USB drivers led to last-minute fixes in the Linux 4.14 release candidate code set for distribution on Sunday. The flaws, which Google researcher Andrey Konovalov disclosed this week, affect the Linux kernel before version 4.13.8. All 14 have available fixes. However, there are other flaws that have not been fixed.
Eavesdropper Vulnerability Exposes Hundreds of Mobile Apps
November 10, 2017
Appthority has warned that up to 700 apps in the enterprise mobile environment, including more than 170 that were live in official app stores, could be at risk to due to the Eavesdropper vulnerability. Affected Android apps already may have been downloaded up to 180 million times, the firm said. The vulnerability has resulted in large-scale data exposure.
Amazon Cloud Cam Joins Burgeoning Smart-Home Ecosystem
November 9, 2017
Amazon has begun shipping its latest smart home product, a security camera that works with its Alexa personal assistant and Echo speakers. The Amazon Cloud Cam allows customers to live-stream activity inside their home 24/7. It features 1080p full HD resolution, two-way audio for communicating with family members or pets, night vision technology, and sophisticated identification algorithms.
5 Ways Etailers Can Make Online Shoppers Feel Safe
November 8, 2017
At least 145 million Americans were impacted by a data breach at Equifax that netted thieves personal information such as names, addresses, birthdates, Social Security Numbers and driver's license numbers. That pales in comparison to the earlier Yahoo breaches, which affected more than 1 billion accounts. However, those incidents may be just the tip of a very large iceberg.
Marcher Malware Poses Triple Threat to Android Users
November 7, 2017
A three-pronged banking malware campaign has been infecting Android phones since the beginning of this year, according to Proofpoint. Attackers have been stealing credentials, planting the Marcher banking Trojan on phones, and nicking credit card information. So far, they have targeted customers of BankAustria, Raiffeisen Meine Bank and Sparkasse, but the campaign could spread beyond Vienna.
Sony's Aibo Resurrected From Robot Pet Cemetery
November 2, 2017
Sony has revived its robot dog, Aibo, which it put down, so to speak, in 2006. The autonomous entertainment robot brings fun and joy to the entire family, Sony claimed. It can bond emotionally, give people love and affection, and let them experience the joy of nurturing and raising a companion. Aibo has ultra-impact 1- and 2-axis actuators that let it move smoothly and naturally along 22 axes.
Amazon to Let Delivery Drivers Open Your Front Door
October 26, 2017
Amazon has announced a new service that will allow Prime members to receive in-home delivery of packages with the help of high-tech smart locks that allow drivers to open their front doors. Amazon Key will launch officially on Nov. 8 in 37 U.S. cities and surrounding communities, with additional locations to be added over time. The service will be available at no extra cost to Prime members.
Apple May Have Fudged iPhone X's Face ID
October 25, 2017
Apple reportedly has reduced the accuracy of the iPhone X Face ID feature to speed up production. It's not clear how much the new specs will reduce Face ID's efficacy, but if the reporting is accurate, there could be problems recognizing changes in facial hair, glasses and other ancillary features, suggested Gerrit Schneemann, senior analyst at IHS Markit. "That would be a real problem."
E-Commerce Firms: Get Ready for New Privacy Laws
October 24, 2017
The Federal Trade Commission regulates privacy in the United States, and under the FTC rules, a website need not have a privacy policy at all. However, a website must comply with and not violate its policy if it has one. ifeLock learned that lesson the hard way when " target="_blank">the FTC sued it for failing to abide by its privacy policy. How do other countries' privacy laws apply to U.S. businesses?
WPA2 Flaw Could Blow WiFi Systems Wide Open
October 17, 2017
A security flaw in WPA2, the security protocol for most modern WiFi systems, could allow an attacker to steal sensitive data including emails, credit card numbers and passwords, Researchers at Belgian university KU Leuven reported Monday. Depending on the network configuration, the flaw also could allow an attacker to inject or manipulate information in the system.
LogicHub CPO Monica Jain: Focus on Results
October 11, 2017
"I was always interested in analyzing the data," said LogicHub Chief Product Officer Monica Jain. "I was introduced to a company that was a pioneer in the market, and that's where my career in security started. I fell in love with security because it's all about finding and analyzing the data, and about crunching the data. That's how I started with security. I've never left it since then."
Small Companies Often in the Dark About Cyberattacks
October 10, 2017
Nearly 60 percent of small businesses have been the victims of a cyberattack over the past year, but the vast majority didn't realize that they had been attacked, according to Nationwide's third annual survey of 1,069 businesses with fewer than 299 employees. Initially, only 13 percent of the participating companies said they had been victims of a cyberattack.
Android Devs May Follow Apple's Face ID Lead
October 9, 2017
Apple's use of facial recognition to unlock its iPhone X may open the gates for developers champing at the bit to bring the technology to the Android world. Face ID, which will replace fingerprint scanning in Apple's new iPhone X, uses Apple's TrueDepth 3D camera to verify the owner of a phone. Android developers have been working on similar systems, said Sensible Vision CEO George Brostoff.
Report: Russian Hackers Penetrated Elite NSA Hacking Division
October 7, 2017
Russian hackers reportedly exploited a vulnerability in Kaspersky Lab's software to steal sensitive cyberdefense data from a National Security Agency contractor. The incident, which occurred in 2015, involved a contractor who loaded classified information onto his personal computer in order to work at home. The information included hacking tools and other sensitive NSA data.
HPE Gave Russia Deep Dive Into Security Software Used by Pentagon
October 6, 2017
Hewlett Packard Enterprise has allowed experts working with Russia to review the source code of cybersecurity software that is used by the U.S. Defense Department. The Pentagon uses HPE's ArcSight software to protect sensitive computer networks. The review of its code was conducted by Russian firm Echelon on behalf of a Russian defense agency that deals with cybersecurity issues.
RoboCyberWall Aims to Block Linux Server Hacks
October 4, 2017
RoboCyberWall has launched its proprietary precision firewall solution bearing the same name. RoboCyberWall is designed to protect HTTP and HTTPS ports on Linux-based Apache2 and NGINX Web servers. The patent-pending firewall blocks all known exploits and zero-day attacks on Apache2 and NGINX Web servers, according to the developer. The Linux server firewall solution targets small and mid-sized business users.
'Invisible' Technologies: What You Can't See Can Hurt You
October 3, 2017
There are times when it seems like technology can work almost too well. Now, if working too well sounds to you like an impossibility, reflect that there's more to a technology than end-user experience. In addition to the experience of using the technology, there are other considerations that play a role: things like maintenance, operations and ongoing support.
Anticipating the Smart World of 2027: A Billion Cameras and AI, Oh My...
October 2, 2017
Nvidia went to China last week and made a series of interesting announcements having to do with smart cities and autonomous cars. IBM made an announcement on advancements in tying the Weather Channel to its Watson artificial intelligence engine, and improvements in targeted marketing. We also found out about Oculus' Fall in Love VR project which is kind of like the The Bachelor.
Behind-the-Scenes Cryptocurrency Mining Discovered on Showtime Sites
September 27, 2017
Showtime Networks apparently has mined the websites of online viewers using the same Coinhive technology that The Pirate Bay recently used in a test run on its site. A subsidiary of CBS, Showtime is a premium television network that offers professional boxing, feature films, original scripted television shows like Ray Donovan and other programming.
Malware Embedded in CCleaner Tool Puts Millions at Risk
September 19, 2017
Malicious code has been discovered in two versions of Piniform's CCleaner housekeeping utility, the company disclosed on Monday. Piniform is owned by Avast, whose security products are used by more than 400 million people. The malware infecting CCleaner could give hackers control over the devices of more than 2 million users. CCleaner is designed to rid computers and mobile phones of junk.
See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS
What is the most consequential impact of social media on society today?
It has opened up valuable new channels for civil discourse.
It has destroyed the meaning of "truth" and "fact."
It has made people stronger by facilitating grass roots activism.
It has deepened divisions among groups with opposing views.
It has made it easier for people to support and help each other.
It has made it easier for people to humiliate and hurt each other.