Archive

SPOTLIGHT ON SECURITY

GM Bug Program Gets Mixed Notices

Two white-hat hackers, Charlie Miller and Chris Valasek, made headlines last year when they demonstrated how they could hijack the control systems of a moving motor vehicle over the Internet. The move got the attention of the auto industry, and last week General Motors put in place a program to enco...

SPOTLIGHT ON SECURITY

Privacy as a Service Advocates Promise Better Data Protection

There's been a lot of wailing and gnashing of teeth about the Sisyphean task of protecting privacy in the Digital Age, but that hasn't stopped innovators from searching for ways to preserve it. One of the latest ideas to emerge in the field is Privacy as a Service. As with many emerging technologies...

SPOTLIGHT ON SECURITY

Iranian Cyberattack on American Dam Viewed As Rarity

Just days before Christmas, a rare event occurred: the report of a successful intrusion into America's infrastructure by overseas hackers. Although the event -- penetration of the control system of a dam 20 miles from New York City -- was more than two years old, it just made it into the public ligh...

SPOTLIGHT ON SECURITY

Security Execs Sweat Insider Threats

Insider threats are becoming increasingly worrisome to corporate security executives. That is one of the findings in a survey of C-level businesspeople Nuix released last week. "The insider threat seems to be a bigger concern this year than it was in previous years," said Nuix's Keith Lowry. "People...

SPOTLIGHT ON SECURITY

All Security Pros Want for Christmas: Smarter Users, Decoy Networks

People like to see gifts from their wish lists under the Christmas tree, and security pros are no exception. Here are things some cyberwarriors would like old St. Nick to deliver to them. The wish at the top of Ryan Kalember's Christmas list would be a tough one for Santa to fulfill, said the senior...

SPOTLIGHT ON SECURITY

Hot Hacker Targets in 2016: Fantasy Sports, Professional Services

As 2016 approaches, it's time to get the crystal ball out and predict next year's cybersecurity trends. Here are some predictions from security pros TechNewsWorld interviewed. Fantasy sports sites like DraftKings and FanDuel in 2015 caught the attention of states' attorneys general, who wanted to tr...

SPOTLIGHT ON SECURITY

‘Tis the Season for Online Predators

While visions of holiday shoppers dance in retailers' heads, those visions are also on the minds of online marauders. Net predators are sticking to scams that have made them money throughout the year. "Over the last 12 months, we've seen a return to attachments with innocuous macros in them," said K...

SPOTLIGHT ON SECURITY

New Tech Targets Enterprise Ransomware

SentinelOne last week introduced an addition to its behavioral solution designed to address the problem of ransomware scrambling files on a computer. Ransomware has been a scourge not only for consumers, but for the enterprise, too. The malicious software can be particularly nettlesome for enterpris...

SPOTLIGHT ON SECURITY

FBI, Carnegie Mellon Deny $1M Contract to Crack Tor

The FBI has denied allegations that it paid Carnegie Mellon University security researchers $1 million to crack a network designed to protect the anonymity of its users. The Tor Project, which operates the network, last week accused the FBI of cutting the CMU deal. The attack occurred from January t...

SPOTLIGHT ON SECURITY

Deep Learning App Targets Malware

Here's the problem with most programs aimed at killing malicious software: They need someone to tell them something's malicious. What if, however, the programs had the smarts to identify bad code on their own? That's what a company called Deep Instinct says its security solution, launched last week,...

SPOTLIGHT ON SECURITY

Mobile Malware’s Growth Slows, Nastiness Grows

The good news about mobile malware in 2015 is that growth has slowed down. The bad news is that the malware entering the market is more virulent than ever. While there hasn't been a sharp rise in the volume of mobile malware this year, the increasingly malicious nature of the types of malware and at...

SPOTLIGHT ON SECURITY

Google Pushes Transparency for SSL Certificates

The padlock on a browser's address bar is supposed to give Net travelers some security in insecure virtual space, but that's not always the case. Some dangerous flaws lurk behind the padlock. They can weaken the effectiveness of encrypted Internet connections and compromise TLS/SSL processes, includ...

SPOTLIGHT ON SECURITY

Global Attacks on Mobile Networks Jeopardize Privacy, Profits

Bad actors are exploiting an obscure technology found in telecommunications networks around the world to track mobile users and engage in fraud, and they could be costing carriers millions of dollars in lost revenues. The technology, called "SS7," is a signal protocol developed in the 1970s for sett...

How will consumers react to Apple's WWDC 2023 announcements?
Loading ... Loading ...

LinuxInsider Channels