security

Fri
10
Oct
Brandon Dimmel's picture

Smart Devices, Cloud to Dominate IT Trends in 2015

Industry analysts at Gartner have released their list of the top trends in information technology (IT) for 2015. The general theme appears to be a growing -- and perhaps troubling -- reliance on web-connected devices and the cloud. Topping Gartner's ... list is the 'computing everywhere' concept, also known as ubiquitous computing . The research firm believes 2015 will be about expanding access to computing capabilities, from placing touchscreens in connected cars , to washing machines and dryers. To many, it's an exciting trend that will allow people unprecedented access to their devices ... (view more)

Mon
22
Sep
Brandon Dimmel's picture

Healthcare.gov Remains Unstable, Vulnerable: Report

A new report from a government auditor suggests that the United States Healthcare.gov web site is missing basic security features. The most alarming findings include ineffective cyber security controls, such as resilient passwords and stable ... security patching. Healthcare.gov represents the central hub of the Obama administration's Affordable Care Act, which is intended to offer U.S. citizens an easier method of finding and acquiring health insurance. However, since the site's launch in October 2013 it has suffered from stability problems, with issues lingering well into 2014. ... (view more)

Wed
03
Sep
John Lister's picture

Apple Proclaims Innocence Over Celeb Photo Hacking

Apple has denied any responsibility for the recent theft and publication of compromising photographs of celebrities. But some analysts say the pictures were vulnerable thanks to a combination of Apple's technical setups, plus the easy availability ... of password cracking software designed specifically for law enforcement authorities. Pictures and videos of famous females such as Jennifer Lawrence, Kirsten Dunst and Kate Upton began circulating earlier this week after being posted at controversial website 4chan. The US Federal Bureau of Investigation (FBI) is said to be investigating, but it ... (view more)

Fri
29
Aug
John Lister's picture

Facebook Rejects New Snooping Claims

Facebook says there's no truth to claims that its Messaging app is spying on smartphone users. It says the confusion over wiretapping stems from security measures on iPhones and Android handsets. The issue involves the tool for Facebook users to ... exchange messages with one another. Whereas computer users are able to message other members through the Facebook website, this same feature is no longer supported in the official Facebook app that runs on mobile devices such as smartphones and tablets. Instead, these users must install and run a separate app called Messenger. The Messenger app ... (view more)

Fri
15
Aug
Brandon Dimmel's picture

Most Hackers Hack for 'Fun', Survey Suggests

A new survey suggests that the majority of hackers carry out their work simply because they find it fun and thrilling. The survey also found that only a small portion of hackers do their work in pursuit of financial gain. The survey was carried out ... by Washington-based security firm Thycotic, which asked hackers attending last week's Black Hat conference (held in Las Vegas, Nevada) what motivated them. More than half of the respondents, or 51 per cent, said they hack for the "fun" and "thrill" of it. Just 19 per cent, or about one in five of the hackers surveyed, said ... (view more)

Wed
06
Aug
John Lister's picture

Hackers Steal 1.2B Passwords; Security Firm Criticized

A Russian gang is believed to have stolen more than a billion online passwords. But the security firm that discovered the breach has also caused controversy over its handling of the situation, including paid-for services to deal with the breach. ... Hold Security of Milwaukee discovered and publicized the breach. The company is legitimate, and its previous claims of breaches have checked out: it was responsible for detecting a massive breach at Adobe last year. The company says it discovered that a Russian group named CyberVor (which translates as cyber-thief) has gathered together data from 420, ... (view more)

Fri
04
Jul
Brandon Dimmel's picture

Despite Threats, Internet Explorer Still Dominates

Microsoft is planning to release a slew of security fixes for Internet Explorer (IE) -- suggesting the web browser continues to face a torrent of security threats . Nevertheless, a recent study shows that Internet Explorer maintains a vice-like grip ... on the web browser market. Yesterday, Microsoft released a Security Bulletin Advance Notification for July 2014 , with plans to ship a total of six security updates to customers next Tuesday (July 8, 2014). The updates will patch security vulnerabilities present in every version of Internet Explorer and all supported editions of the Windows ... (view more)

Wed
04
Jun
John Lister's picture

Zeus Botnet; Officials Urge: Protect Your PC Now

The Federal Bureau of Investigation (FBI) has disrupted a major malware botnet specifically designed to steal personal financial data from computers. Both US and UK security agencies are warning all users that they have a two week grace period to ... shore up their defenses before cybercriminals reactivate the threat. A botnet is essentially an army of malware-infected computers under the control of cybercriminals. In this case, the botnet is known as the GameOver Zeus. When a computer becomes infected with malware, it can also become part of a botnet. Malware infection is usually the result of ... (view more)

Wed
21
May
John Lister's picture

Password Study: Most Sites Inadequate On Security

A new study reviewed security among leading online companies following the Heartbleed bug scare, in which a commonly used encryption technique for secure websites had the capability to expose highly confidential data. The study comes from Dashlane, ... a password management firm. The study evaluated 80 web sites and examined 6 factors with regard to the way passwords and login processes are handled. Using these details, Dashlane ranked each site between +100 and minus -100. Based on a range of security issues, the study suggests Apple and Microsoft have the securest policies for passwords, while ... (view more)

Wed
30
Apr
John Lister's picture

Security Experts: Stop Using Internet Explorer

The United States Department of Homeland Security (DOHS) has warned that users should switch away from Internet Explorer until a serious bug has been fixed. It's the first big security scare since Microsoft stopped supporting Windows XP earlier this ... month. The bug doesn't have a glamorous nickname and is instead simply known as CVE-2014-1776. When triggered, the bug allows for remote code execution, which means a third party would have full control over a remote PC without the need for credentials or consent from the PC owner. By clicking on a malicious link or by visiting an infected ... (view more)

Pages

Subscribe to RSS - security