Showcase Your Business as a Thought Leader » Publish Your Blog, Videos and Events on ALL EC » Save 25% Now
Welcome Guest | Sign In
LinuxInsider.com
Rakuten Super Logistics
Apple to Raise Barrier Against VR, AR Websites
February 6, 2019
The next upgrade of Apple's mobile operating system will come with an annoying surprise for VR and AR developers. It reportedly will block Web access to the accelerometer and gyroscope in Apple mobile devices by default. That means users will have to grant permission to any Web apps or sites that need those components to function, including those with VR and AR components.
Apple Banishes Facebook Data Reaper From iPhones
January 31, 2019
Apple has blocked a Facebook app that paid users for total access to all network data. The controversy over use of the Facebook Research app erupted earlier this week, with a report that revealed Facebook was paying users $20 a month for root network access to their phones. Facebook was on-boarding users of the program, which included teenagers, through Apple's Enterprise system.
What's Wrong With the Social Media Model
January 31, 2019
The social media model has come under increased scrutiny following revelations of data misuse and news of executives reneging on some security commitments. People expecting to change the situation will need to address how social media works. This means changing not just the business model, which describes how a social media business makes money, but the fundamental technology model too.
Crypto Support in Samsung Galaxy S10 Could Fall Flat
January 30, 2019
The Samsung Galaxy S10, scheduled for launch on Feb. 20, likely will incorporate a cryptocurrency wallet. "Samsung has a long history of throwing everything it can think of, technology-wise, into its flagship Galaxy S series smartphones," remarked Ken Hyers, research director at Strategy Analytics. Most users aren't fully aware of their Galaxy S phone capabilities, he noted.
Apple Squashes FaceTime Eavesdropping Bug
January 30, 2019
Apple has suspended its Group FaceTime application following reports that a bug in the software allowed callers to eavesdrop on the people they were calling. The flaw let a person making a FaceTime call listen through the phone of the person called before the call was accepted or rejected. It reportedly also allowed access to the front-facing camera in an iPhone.
Dutch Doc Wins 'Forget My Suspension' Case
January 23, 2019
Google must remove search results about medical regulators' conditional suspension of a Dutch physician in the first "right to be forgotten" case of its kind in the European Union. After Google and Dutch data privacy watchdog Autoriteit Persoonsgegevens rebuffed the doctor's initial attempts to get disciplinary actions purged from online search results, a district court in Amsterdam sided with the surgeon.
4 Techniques for Validating Enterprise Blockchain
January 21, 2019
There's been a lot of hype about blockchain over the past few years. Nowadays though, there are signs that we may be on the cusp of moving from the "blockchain will solve all your problems" segment of the hype cycle into the "blockchain may be useful for a few targeted applications" segment. Utility-based Darwinism is at work -- we're starting to see the less likely applications fall away.
Court: Cops Can't Compel the Use of Body Parts to Unlock Phones
January 16, 2019
Authorities can't force people to unlock their biometrically secured phones or other devices, ruled a federal judge in California. "The Government may not compel or otherwise utilize fingers, thumbs, facial recognition, optical/iris, or any other biometric feature to unlock electronic devices," Magistrate Judge Kandis A. Westmore wrote. Passcodes already are protected by the Fifth Amendment.
The Biggest Cybercrime Threats of 2019
January 11, 2019
A new year means a fresh start, but it doesn't mean that old threats will go away. In fact, in the world of cybersecurity things could get far worse before they get better. Cybercrime continues to increase, as it allows nefarious actors to operate at a safe distance from victims -- and more importantly, law enforcement. Cybercrime often doesn't get the same attention as other types of crimes.
The Smartest Tech Products of 2018
December 31, 2018
Picking a product of the year is anything but trivial because the products I cover every week range from headphones to laptops to books, cars and more. So, I thought I'd try something different this year and pick six products that each deserve the title and then name a winner that stands out from the rest. This allows me to simplify the task and get around a bit of a writer's block I've been having on this subject.
BlackBerry Makes Autonomous Vehicle Play
December 13, 2018
BlackBerry this week introduced its new Security Credential Management System. SCMS -- a free service for the public and private sectors -- could encourage efforts to develop autonomous and connected vehicle pilot programs. BlackBerry undertook development of this technology to provide the critical infrastructure for vehicles and traffic lights to exchange information securely.
Supermicro: Our Motherboards Are Clean
December 12, 2018
Supermicro CEO Charles Liang has informed the company's customers that a leading third-party investigations company found "absolutely no evidence of malicious hardware" on its motherboards. The investigation was undertaken in response to a recent claim that bad actors had inserted spy chips in the firm's motherboards on behalf of the Chinese People's Liberation Army.
Pichai Puts Kibosh on Google Search Engine for China
December 12, 2018
Google is not working on a bespoke search engine that caters to China's totalitarian tastes, and it has no plans to develop one, CEO Sundar Pichai told lawmakers on Capitol Hill. "Right now, we have no plans to launch in China," he told members of the U.S. House Judiciary Committee at a public hearing on Google's data collection, use and filtering practices.
Location Data Selling Threatens Consumer Privacy
December 11, 2018
Selling location data collected by mobile phones has become a lucrative business, according to a report that noted location advertising sales are expected to reach $21 billion this year. At least 75 companies receive anonymous, precise location data from applications with the location services feature activated. Several of those outfits claim to track 200 million mobile devices in the U.S.
Google Hasn't Kept Promise to Stop Bubble-Wrapping Users: Report
December 6, 2018
Google hasn't released consumers from its filter bubble -- the package of personalized search results it delivers -- despite having promised to do so, according to study results from DuckDuckGo. Most participants saw results unique to them, the researchers found, which could not be explained by changes in location, time, by being logged into Google, or by Google testing algorithm changes.
Quora Looks for Answers in Wake of Massive Data Breach
December 5, 2018
The personal data of some 100 million people who have used Quora, a popular question and answer website, has been compromised, the company disclosed. "We recently discovered that some user data was compromised as a result of unauthorized access to one of our systems by a malicious third party," wrote Quora CEO Adam D'Angelo in an online post. "We are working rapidly to investigate the situation."
How to Use a VPN for Safer Online Shopping
December 4, 2018
With the holidays fast approaching, are you looking to buy presents online? The holiday season has become synonymous with online shopping. This isn't really surprising as physical stores usually attract crowds of deal hunters. This often conjures up images of throngs of people waiting in line outside the store, some even camping out. This activity is tolerable for some and even fun for others.
DoJ Takes Down Online Ad Fraud Ring, Indicts 8
November 29, 2018
The DoJ has revealed an unsealed indictment of eight defendants for crimes related to their involvement in widespread digital advertising fraud. The DoJ alleges the eight individuals were behind two global schemes, 3ve and Methbot, which stole tens of millions of dollars through a scam that used fake Web traffic and fake websites to reap ad view revenue from unwitting advertisers.
Users Rate 'Creep Factor' in New Privacy-Security Product Guide
November 16, 2018
The Mozilla Foundation is expanding a campaign begun last year to help consumers buy safe, secure connected toys and mobile gadgets this holiday season. Mozilla's 2018 edition Privacy Not Included buyers' guide offers an assessment of the privacy and security qualities of 70 products, ranging from connected teddy bears and smart speakers to game consoles and smart home gadgets.
When Is the Time to Hire a Cyber Specialist?
November 14, 2018
Cybersecurity has been becoming a larger and larger concern for organizations. Nowadays, most organizations -- regardless of size, industry, location, or profit vs. nonprofit status -- find themselves directly or indirectly impacted by cybersecurity. Even though the topic itself is increasing in importance, many smaller organizations don't have specialized security expertise on staff.
Whether Intended or Accidental, Internet Traffic Rerouting Can Be Costly
November 14, 2018
An apparent prefix leak from an errant router misconfiguration caused Google to lose control of several million of its IP addresses for more than an hour on Monday. During the event, Internet traffic was misrouted to China and Russia from Nigeria. The incident initially sparked concerns that it might have been a hijacking. The mishap made Google services unavailable to many users intermittently.
Cryptohackers Breach StatCounter to Steal Bitcoins
November 8, 2018
Hackers planted malware on StatCounter to steal bitcoin revenue from Gate.io account holders, according to Eset researcher Matthieu Faou, who discovered the breach. The malicious code was added to StatCounter's site-tracking script last weekend, he reported. The malicious code hijacks any bitcoin transactions made through the Web interface of the Gate.io cryptocurrency exchange.
How to Protect Your Online Privacy: A Practical Guide
November 7, 2018
Do you take your online privacy seriously? Most people don't. They have an ideal scenario of just how private their online activities should be, but they rarely do anything to actually achieve it. The problem is that bad actors know and rely on this fact, and that's why there's been a steady rise in identity theft cases from 2013 to 2017, often resulting in loss of reputation or financial woes.
Mobile Phone Security: All You Need to Know
November 6, 2018
We rely on our phones to process and store reams of personal digital data. Our digital activities -- from checking bank balances to paying for a product with a tap of the screen, to sending friends and family messages over social media, to accessing work emails remotely -- have turned our phones into a goldmine of personal information. How secure is your mobile device?
It Is Well Past Time for Elections to Be Online
November 5, 2018
Tomorrow a minority of those who are eligible will take time off, drive through traffic, and wait in lines to take part in one of the most artificially annoying obligations of United States citizenship: voting. Many who make that inconvenient trek will treat the process like a multiple choice test they haven't studied for, either voting the party line or guessing at the right answers.
Former White House CIO Theresa Payton: 'There Are Grave Concerns About Election Interference'
October 26, 2018
Theresa Payton, CEO of Fortalice Solutions, is one of the most influential experts on cybersecurity and IT strategy in the United States. She is an authority on Internet security, data breaches and fraud mitigation. She served as the first female chief information officer at the White House, overseeing IT operations for President George W. Bush and his staff.
Will Oracle Roil the DB Market?
October 23, 2018
When we write the history of the IT era, the big factor that has played an important but not well recognized role will be hardware -- specifically, the Oracle Exadata appliance that puts databases into memory. All of the cloud software starting with the autonomous database on view this week at OpenWorld would be vastly different if the database was still running primarily on disk drives.
Software Security Best Practices Are Changing, Finds New Report
October 2, 2018
Independent software vendors, along with Internet of Things and cloud vendors, are involved in a market transformation that is making them look more alike. The similarities are evident in the way they approach software security initiatives, according to a report from Synopsys. Synopsys has released its ninth annual Building Security in Maturity Model, or BSIMM9.
The Crypto-Criminal Bar Brawl
September 25, 2018
As if e-commerce companies didn't have enough problems with transacting securely and defending against things like fraud, another avalanche of security problems -- like cryptojacking, the act of illegally mining cryptocurrency on your end servers -- has begun. We've also seen a rise in digital credit card skimming attacks against popular e-commerce software such as Magento.
Protecting Against 'Natural' Cybersecurity Erosion
September 21, 2018
Every child who's ever played a board game understands that the act of rolling dice yields an unpredictable result. In fact, that's why children's board games use dice in the first place: to ensure a random outcome that is -- from a macro point of view -- about the same likelihood each time the die is thrown. Consider what would happen if someone replaced the board game's dice with weighted dice.
See More Articles in Security Section >>
Rakuten Super Logistics
Is "too much screen time" really a problem?
Yes -- smartphone addiction is ruining relationships.
Yes -- but primarily due to parents' failure to regulate kids' use.
Possibly -- long-term effects on health are not yet known.
Not really -- lack of self-discipline and good judgement are the problems.
No -- angst over "screen time" is just the latest overreaction to technology.
No -- what matters is the quality of content, not the time spent viewing it.