Archive

SPOTLIGHT ON SECURITY

Commerce Dept. Caves on Security Export Rules

Some proposed federal rules on the export of security tools created a tumult in cybersecurity circles -- a tumult that's pushed the rules into limbo. The comment period for the rules, which the U.S. Department of Commerce first aired in May, ended July 20 -- and although the regulations have noble i...

SPOTLIGHT ON SECURITY

OPM Director’s Resignation Draws Mixed Reactions

The resignation of U.S. Office of Personnel Management Director Katherine Archuleta is drawing mixed reactions from the cybersecurity community. Archuleta's departure on July 10, in the wake of a massive data breach resulting in the theft of the personal information of more than 22 million people, i...

New Ford Tech Shines Light Where Drivers Need It

Ford Motor Company has developed a new lighting system that can illuminate hazards on the road -- even those that are not in the direct line of travel of the vehicle -- better than conventional headlights. Ford on Friday unveiled the Camera-Based Advanced Front Lighting System, which can widen the b...

SPOTLIGHT ON SECURITY

Swipes, Taps and Cursor Movements Can Foil Cyberthieves

Swipes, taps, cursor movements and other ways of interacting with electronic devices can be used to protect online merchants from Net fraudsters. Many people are familiar with biometric authenticators like irises, fingerprints and voices, but it turns out that how we behave with our machines can be ...

SPOTLIGHT ON SECURITY

Is Isolating the Internet Key to Bulletproof Security?

With so many cybersecurity pros drowning in an ever-rising tide of hack attacks on their computer systems, an emerging approach to defending those systems may be the life preserver they've been looking for. The approach doesn't involve beefing up perimeter defenses, carefully scrutinizing network tr...

SPOTLIGHT ON SECURITY

Will LastPass Breach Poison Trust in Password Managers?

A data breach is no picnic for any organization, but for a company that makes its potato salad by protecting other people's passwords, it's the mother of all nightmares. Yet, that has happened to LastPass twice. In 2011, the service found anomalies in its network traffic that forced it to reset all ...

SPOTLIGHT ON SECURITY

Routers Becoming Juicy Targets for Hackers

Most consumers pay as much attention to routers as they do to doorknobs. That's not the case with Net marauders. They're finding the devices ripe targets for mischief. "We've seen a big increase in malware designed for home routers," said Incapsula researcher Ofer Gayer. "Every week, we see a new vu...

SPOTLIGHT ON SECURITY

Patch Tuesday Sunset Will Be a Mixed Bag for Windows Security

Microsoft will phase out Patch Tuesday -- its monthly potpourri of software product fixes -- when it rolls out Windows 10, which could be a mixed bag for the operating system's security. Patches will be applied automatically as they're ready. That means users no longer will have to wait until the se...

SPOTLIGHT ON SECURITY

Google’s Android Permissions Get Granular

Google appears to be heeding warnings of security experts who say Android users need better control over what apps do with information from their phones. At I/O, its worldwide shindig for developers held last week, the company announced that the next version of its mobile operating system, Android M...

SPOTLIGHT ON SECURITY

No Wrongdoing at NCIS, Says Defense Watchdog

The U.S. Department of Defense's Inspector General has rejected allegations that the Naval Criminal Investigative Service engaged in questionable domestic intelligence activity. The finding concluded a DoD IG probe spurred by allegations that NCIS was making available to military intelligence agenci...

SPOTLIGHT ON SECURITY

Venom Less Toxic Than Heartbleed

It was a little over a year ago that the Heartbleed bug shocked the Internet with its potential for mischief. Now another flaw in open source code has sent network administrators into damage control mode. The bug, called "Venom" for "Virtualized Environment Neglected Operations Manipulation," allows...

SPOTLIGHT ON SECURITY

Big Data Analytics Fights Insider Threats

Cyberdefenders for years have adopted Fort Apache strategies to protect their networks. Strong perimeters could prevent attackers from reaching precious data, they reasoned. As technology marched on, however, the idea of an impermeable wall became as quaint as the Maginot Line on the eve of World Wa...

Ford R&D Facility Rolls Into Silicon Valley

Ford Motor on Thursday announced the opening of its Research and Innovation Center Palo Alto, a 25,000 square foot facility that will help it accelerate the company's innovation in connectivity, mobility, autonomous vehicles, customer experience and big data. This is the latest addition to the autom...

Volkswagen, Ford Win Vehicle of the Year Laurels

Volkswagen's Golf has been named the 2015 North American Car of the Year, and Ford Motor's F-150 is the 2015 North American Truck/Utility of the Year. For the 22nd year running, a panel of jurors from newspapers, television and radio stations, magazines and websites voted to determine which vehicles...

Self-Driving Concept Cars Impress at CES

CEO Mark Fields on Wednesday took the stage at the International CES 2015 in Las Vegas and said that Ford Motor is focusing on bringing autonomous automobiles to the masses. Although Ford may not be the first company to produce a self-driving car, it could be the first to deliver one outside of the ...

LinuxInsider Channels