FTC Has Authority Over Corporate Hacks, says Appeals Court

The Third U.S. Circuit Court of Appeals ruled that the Federal Trade Commission can advance its lawsuit against Wyndham Worldwide, which the FTC holds partially culpable for theft of online data three times between 2008 and 2010, for a total of over 619,000 credit- and debit-card numbers. Since Congress has yet to pass sweeping legislation on data security, the FTC has stepped in, so far instigating 50 additional data-security cases based on its mandate to act against unfair and deceptive business practices. Continue reading FTC Has Authority Over Corporate Hacks, says Appeals Court

Sony and ZMP Team Up to Offer Commercial Drone Services

In 2016, Aerosense, jointly owned by Sony and robotics firm ZMP, plans to launch a commercial drone service targeting construction, logistics and agriculture industries. A prototype of an airplane-shaped drone was unveiled this week. The drones, which will be capable of capturing HD images and transmitting them to the cloud, will rely in part on the mobile phone and digital camera technologies developed for Sony’s Xperia smartphones. Analysts believe the unmanned aircraft industry may be worth $82 billion in the U.S. by 2025. Continue reading Sony and ZMP Team Up to Offer Commercial Drone Services

Companies Share Cyberthreat Info on New Facebook Platform

When Facebook launched ThreatExchange in February, the idea was to create a platform where companies could share information on potential cyberattacks, malware and other malicious hazards. Now, the Silicon Valley company says that the number of companies on the platform has reached 90, after 23 joined last week when the application process became easier. Facebook, which isn’t alone in offering a platform for centralized cyberthreats, is continuing its work to integrate these other information-sharing platforms. Continue reading Companies Share Cyberthreat Info on New Facebook Platform

Mobile Devices Now the Largest Threat to Enterprise Security

A recent Check Point Software survey determined that enterprise network vulnerabilities often result from the ease in which company employees can now connect their mobile devices to insecure wireless networks. The study suggests that the threat level increases with larger organizations. For example, companies that use 2,000 or more devices experience a 50 percent chance that at least six devices have become infected with malware (something to consider since 82 percent of companies now have a BYOD plan in place). Continue reading Mobile Devices Now the Largest Threat to Enterprise Security

Google Launches New Chrome OS for its Business Customers

Google has unveiled its new Chrome operating system designed for business customers, which includes changes aimed at allowing companies to operate many of their legacy software applications. Dell has announced new Chromebooks and management software designed to work with the new operating system. After years of pushing cloud-based systems for improved security and management, Google has learned that many companies require custom upgrades or rely on virtualized systems to address the multitude of applications that cannot easily move to the cloud. Continue reading Google Launches New Chrome OS for its Business Customers

U.S. Renews Contract with ICANN, Delays Giving Up Oversight

The Department of Commerce announced that it would renew its contract with the Internet Corporation for Assigned Names and Numbers (ICANN) for one year (with options to extend it another three years), delaying its plans to relinquish oversight of one aspect of Internet governance. Commerce has overseen ICANN’s management of the Internet’s domain-name system since 1998. But last year, the Obama administration proposed transferring the oversight to international stakeholders, a plan that has met criticism regarding the potential impact to free expression. Continue reading U.S. Renews Contract with ICANN, Delays Giving Up Oversight

Netflix Moves Operations to Cloud, Closes Last Data Center

Netflix will be the first large company to move its information technology to a public cloud, more specifically, Amazon Web Services, reporting its plans to shutter its last data center by the end of the summer. After a major hardware failure in 2008, Netflix started moving its operations to AWS in 2009, first shifting its jobs page and, later, its video player, iPhone-related technology, discovery and search, and accounts pages. As a streaming competitor with Amazon, however, Netflix runs its own content delivery network. Continue reading Netflix Moves Operations to Cloud, Closes Last Data Center

Mobile Companies Face Stagefright, Android Security Issues

The emergence of Stagefright, a malicious code that targets Android phones, has impacted all mobile companies using the Google operating system. Google has already fixed the problem in its own line of Nexus phones and tablets, and now plans to supply monthly security updates wirelessly. Both Samsung and LG have also announced they will be issuing a monthly security update; other impacted mobile phone manufacturers include Sony, HTC and Android One, all of which have provided or plan to provide Stagefright patches. Continue reading Mobile Companies Face Stagefright, Android Security Issues

China Ratchets Up Internet Control with On-Site Cyber Police

The Chinese government stated it will place cybersecurity police units at the country’s major Internet companies and websites, to prevent fraud, other illegal activities and the amorphously phrased “spreading of rumors,” reports the state-owned Xinhua News Agency. The Internet in China is monopolized by three major companies: e-commerce site Alibaba, Tencent for gaming and messaging, and search engine Baidu. Neither Facebook nor Google operate in China; LinkedIn, which has agreed to China’s cybersecurity measures, does. Continue reading China Ratchets Up Internet Control with On-Site Cyber Police

Apple TV Remote Also Offers Features for Home Automation

Apple just came out with a new Apple TV remote with integrated Touch ID, which utilizes fingerprint sensors to authorize and block users. In addition to TV-centric capabilities, the new remote offers the ability to enter a channel without punching in a password and to allow authorized people to make iTunes purchases. What makes this TV remote truly different is its ability to control in-home electronics. Over the years, rumors have been rife that Apple’s end game for Apple TV was as a home automation hub. Continue reading Apple TV Remote Also Offers Features for Home Automation

Security Researcher Reports Privilege-Escalation Bug in OS X

A privilege-escalation bug was identified in the latest version of Apple’s OS X this week by security researcher Stefan Esser. The vulnerability reportedly provides hackers with root user privileges that make it possible to infect Macs with rootkits and other malware. This type of bug is commonly used to bypass security protections created for applications and operating systems. According to Esser, the vulnerability can be found in OS X Yosemite 10.10.4 and the beta version of 10.10.5, but not in the recent beta version of El Capitan 10.11. Continue reading Security Researcher Reports Privilege-Escalation Bug in OS X

Security Experts Remotely Control Jeep’s Steering and Braking

Security researchers Charlie Miller and Chris Valasek were able to hack into a Jeep on the highway and remotely control its radio, windshield wipers, navigation system and, finally, the brakes and steering. Miller and Valasek have been working for the last two years to hack various cars, with the aim of controlling them remotely. Their ability to hack the Jeep highlights one of the potential dangers inherent in the Internet of Things, as an increasing number of interconnected devices hit the market. Continue reading Security Experts Remotely Control Jeep’s Steering and Braking

Security Among Topics Slated for ETC’s Project Cloud Meeting

A team of leading security experts from the Hollywood studios and the Cloud Security Alliance, working with the Entertainment Technology Center’s Project Cloud, helped shape the methodology for security guidelines related to cloud-distributed media content. Recommendations were handed off to CSA and the MPAA in September 2014 — and on March 17 of this year, the MPAA released “Content Security Best Practices” to the public. This is a fundamental milestone in moving studios toward the cloud. Security will be one of several topics discussed at the next Project Cloud meeting on July 27 at the Google offices in Venice. Continue reading Security Among Topics Slated for ETC’s Project Cloud Meeting

Facebook Writes and Open Sources Mac OS Security Software

It is a Windows-centric world, but not at Facebook where the company has many more Mac laptops than those running Windows. With a lack of Mac OS X-based security network appliances, Facebook began, 18 months ago, to write its own security software. The result, Osquery, enables its security team to monitor, in real-time, the current state of those laptops’ operating systems. Facebook also made the tools freely available as an open source project, bringing outside security expertise to bear. Continue reading Facebook Writes and Open Sources Mac OS Security Software

BlackBerry and Google Partner for Business Version of Android

Blackberry and Google have joined forces to develop an enterprise-friendly version of the Android operating system. The companies had already been working together on equipping phones with Android for Work, which helps keep mobile data for business and personal use separate. The new efforts will focus on security and application management features by integrating BlackBerry’s BES12 security software into Android Lollipop. BES12 is compliant with multiple OS platforms and recently added support for corporate-issued iOS devices. Continue reading BlackBerry and Google Partner for Business Version of Android

Page 20 of 33«...10...16171819202122232425...»