tech and geek stuff
Major security flaw may affect Uber, Fitbit, OkCupid, among other websites
Security firm Cloudflare disclosed late Thursday that a long-running bug in its security systems may have leaked information, including potentially personal information, from thousands of sites including...
How to Secure Your Small Business on a Limited Budget
Small businesses (fewer than 50 employees) face the same security threats as large organizations. However, such businesses also must contend with the challenge of limited budgets for IT expenditures. The...
State Officials Tell DHS to Leave Election Security to Them
A National Association of Secretaries of States resolution says the U.S. Department of Homeland Security has failed to clarify the meaning of its designation of election systems as "critical infrastru...
No key, no login: G Suite admins can now make FIDO security keys mandatory
Enlarge / The Yubikey Neo (the black USB key) is a FIDO U2F-compliant key that works over NFC or USB. reader comments 4 Share this story Today, Google announced a new G Suite feature that allows admins...
Wide Range of New Security Technologies Debut at RSA Conference 2017
The annual RSA Conference has long been one of the premier venues for security vendors to announce and demonstrate new products and services. The 2017 edition of the RSA Conference, which took place in...
Talks on State of Security, Role of the Cloud Highlight RSA Conference
This year's RSA Conference, which was held Feb. 13-17 in San Francisco, saw more than 43,000 attendees show up to listen to speakers and to learn from vendors about the latest security trends, products...
Russian security company to compete with Microsoft via new OS
Kaspersky has launched its own operating system which is built from scratch, designed to offer tight security to Internet of Things devices and industrial control systems.KasperskyOS has apparently been...
Tehran Bans Drones After Security Scares
The Iranian military has banned the unauthorized use of drones in the capital Tehran, after several security scares caused by unpiloted aircraft that are increasingly popular with hobbyists and filmmakers....
Trump’s apparent security faux-pas-palooza triggers call for House investigation
Enlarge / U.S. President Donald Trump met with a group of government cyber security at the White House January 31, 2017 in Washington, DC, and said the government must do more to protect against cyber...
Microsoft's Azure SQL Database Threat Detection Available in April
Microsoft works to provide its customers with attack-resistant cloud services, advanced search capabilities and streamlined application logins. Last week, just before the RSA Conference kicked off in...
Donald Trump’s outdated Android phone prompts national security concerns
“We are writing to request that the House Oversight and Government Reform Committee hold a public hearing into troubling reports that the President is jeopardizing national security by egregiously failing...
IBM Details Risks of Second-Hand IoT Devices and Connected Cars
VIDEO: What happens to IoT user accounts in the cloud when a device or even a car is sold? According to new research from IBM Security, revocation of old users isn't happening, exposing a major new risk....
IoT Exploits, Ransomware Among 7 Most Dangerous New Cyber-Attacks
Researchers at the SANS Institute detailed a range of cyber-threats enterprises are currently dealing with and ways to become a less inviting attack target. SAN FRANCISCO—f you didn’t already believe...
HPE Advances Big Data and IoT Data Security Protection
HPE SecureData for Hadoop and IoT debuts to protect sensitive information, while ArcSight Investigate enters beta to find hidden threats. Hewlett Packard Enterprise (HPE) announced new security capabilities...
IDC Sees Determinism as the Key to Security Integrity
At IDC's annual RSA Conference breakfast, the analyst firm details its view on what's important in security now and in the years ahead. SAN FRANCISCO — Analyst firm IDC hosted its annual RSA Conference...
AppRiver Report Finds Ransomware Most Serious Security Threat
Each year, security firm AppRiver releases a report detailing the good and bad in the security industry. But the 2017 Global Security Report is sobering. AppRiver assessed the threats facing businesses...
Homeland Security Chairman Says U.S. 'Not Winning' Cyber-security War
U.S. Rep. Michael McCaul's keynote address at the RSA security conference included a blunt assessment of cyber-security threats. SAN FRANCISCO—The chairman of the House of Representatives Homeland Security...
Intel Security Looks Forward to McAfee Future
[VIDEO] Chris Young, Senior Vice-President and General Manager of Intel Security talks about his RSA Conference keynote and the future of the company that will soon once again be known as McAfee. SAN...
Microsoft delays Patch Tuesday as world awaits fix for SMB flaw
Microsoft reader comments 14 Share this story Today is the second Tuesday of February, and that means it should be Microsoft's Patch Tuesday. It should be a big Patch Tuesday, too. First, there's an in-the-wild...
Former NSA Chief Wants the Cloud to Protect Small and Midsized Businesses
At the 2017 RSA Conference, Gen. Keith Alexander advocates using the cloud to help provide a common defense for organizations of all sizes. SAN FRANCISCO—Speaking at the Cloud Security Alliance (CSA)...
Dell Explains Why Hardware and Software are Needed for Security
[VIDEO] Michael Dell explains his company's security strategy that includes RSA, SecureWorks and critical networking technology from VMware. SAN FRANCISCO — In a VIP event at the 2017 RSA Conference here,...
Senators question whether Trump's use of personal phone may be a national security risk
Is President Trump still using an insecure smartphone? If he's been given a secure device for his personal use, is he actually using it? And what security measures are in place to protect his personal...
IBM Brings Watson Cognitive Computing to Security Operations
After months of training, IBM's Watson for Cyber Security platform is now ready for the market and will help to enable a new generation of Cognitive Security Operations Centers. IBM announced a series...
RSA Conference Evolves to Keep Up With New Threats, Technologies
As the venerable security conference enters its 26th year, its scope has greatly expanded to address a new generation of threats such as ransomware. A lot has changed since a small group of cryptographers...
'Cyber curriculum' to defend against attacks
The Cyber Schools Programme aims to train 5,700 teenagers aged between 14 and 18 over the next five years to develop some of the key skills they would need to work in cyber security.A "cyber curriculum"...
SS8 Improves BreachDetect Platform with Timeline View
BreachDetect platform updated with an easier-to-use interface that now provides a timeline view of security events in an effort to help expose hidden risks. When it comes to detecting potential breaches,...
How Trump’s cybersecurity quest could reshape the internet
This feature has been brought to you by IPVanishFollowing the inauguration of President Donald Trump and the induction of a new administration, many concerns ranging from foreign policy to national debt...
IBM X-Force Red Advances Security Testing Collaboration with Red Portal
IBM's elite penetration testing security team adds a critical tool to its portfolio to help improve security outcomes, with the new Red Portal collaboration platform. IBM today is announcing the new Red...
Someone wants to make VPN obsolete
Duo Security has a new solution for workers remotely accessing the company network which it argues is much more secure than the traditional VPN that might be employed – and has other advantages besides.Duo...
Phishing Attack Study Shows Cloud Services a Favorite Target
Phishing increasingly is a security problem for organizations worldwide, according to a new report from security firm PhishLabs. The company released its "2017 Phishing Trends and Intelligence Report"...
Cisco Integrates Advanced Security Services into Umbrella
Technology platform originally developed by OpenDNS is now being integrated with advanced Cisco security technology to provide a secure internet gateway in the cloud. Among the many security challenges...
Software Flaws Keep Rising Despite Efforts To Improve Security: Report
The number of software flaws reported in 2016 continued to climb, especially the most severe issues, which topped 24 percent of all vulnerabilities, according to the latest data. While software security...
ServiceNow Enhances Security Operations Platform
Getting IT and security teams to work together isn't always easy, but it's a challenge ServiceNow is taking on with its Security Operations platform. ServiceNow has made a name for itself in recent years...
US visitors may have to reveal social media passwords to enter country
Thomas Kohler reader comments 85 Share this story Further ReadingRights groups decry plan to inspect social media of US-bound touristsUS Department of Homeland Security Secretary John Kelly has informed...
Security Vendor Invincea Acquired by Sophos in $120M Deal
Sophos aims to improve its synchronized security platform with the addition of Invincea's advanced Endpoint Detection and Response capabilities. Security vendor Sophos is set to expand its capabilities...
US visitors may have to hand over social media passwords
People who want to visit the United States could be asked to hand over their social-media passwords to officials as part of enhanced security checks, the country's top domestic security chief said. Homeland...
Fun, games, and security: WarCollar’s DopeScope and Booby Trap
reader comments 0 Share this story The WarCollar Industries 360 Dope Scope: a game, yet not. What do I spy inside the Dope Scope? Wi-Fi access points and signal strengths to help track them down. Sean...
Microsoft to feds: Please exempt our immigrant workers hit by travel ban
EnlargePhoto: Ethan Miller/Getty Images reader comments 0 Share this story Further ReadingTech sector begins legal assault on Trump immigration order [Updated]Microsoft has formally asked the Department...
Security Startup Aims to Automate Threat Analyst Intelligence
Startup emerges from stealth with new funding and the promise of improving threat detection by automating activities that typically require human experience. Understanding all the security data that is...
Aqua Container Security Platform 2.0 Delivers Advanced Isolation
Container Security Platform 2.0 release aims to help further segment application container traffic and adds new support for secrets management. Container technologies already provide multiple types of...
HPE Bolsters Security Portfolio with Niara Acquisition
HPE makes its third acquisition so far in 2017, this time adding new user behavior analytics capabilities that will enhance the Aruba ClearPass offering. Hewlett Packard Enterprise (HPE) announced on...
Xbox and PlayStation gamers' details hacked
Uh-oh, Xbox and PSP gamers — a lot of you may have had your personal details hacked.A data breach of two popular gaming forums has exposed the account details of 2.5 million users, potentially opening...
Cisco Cybersecurity Report Reveals Business Impact of IT Security
Cisco Reports Reveals that Breaches Cost Money Cisco released its 2017 Annual Cybersecurity Report (ACR) on Jan. 31 providing insights into the latest trends from security statistics gathered over the...
Trump update: Trump expected to overhaul government cybersecurity
Trump expected to overhaul government cybersecurity President Donald Trump is expected to sign an executive order Tuesday that will commission a sweeping review of the federal government’s cybersecurity...
Survey Reveals Gap in Midmarket Companies' True Security Capabilities
A common theme across the security landscape in recent years is that there is a gap between the how companies implement security systems and how they perceive their security capabilities. A study sponsored...
Tenable Brings Vulnerability Management Platform to the Cloud
Tenable rolls out new Tenable.io Software-as-a-Service vulnerability platform, built from the ground-up for the cloud era, providing web application scanning, container security and vulnerability management...
Enterprises Won't Find Magic Bullet Against Today's Cyber-Threats
NEWS ANALYSIS: The latest news about software patches and data breaches only reinforces the view that when it comes to cyber-security there is no magic bullet. As the annual RSA Conference approaches...
Could Windows Defender be the last antivirus you will ever need?
Do you use third-party antivirus software? Well you shouldn’t if you’re running one of Microsoft’s newer operating systems, at least according to a developer who used to work on Firefox (but has since...
Top 10 best antivirus apps for Android in 2017
Android is by far and away the most popular mobile operating system, being installed on the vast majority of devices out there, so it’s no surprise that the vast majority of mobile malware is targeted...
Draft Cyber Executive Order calls for immediate 60-day cyber miracle
Enlarge / President Trump has tagged Defense Secretary James Mattis to lead the charge to fix all the cyber things and smash the cyber adversaries.Getty | Sara D. Davis reader comments 9 Share this story...
NSS Lab's CAWS 2.2 Update Improves Cyber Threat Protection Platform
NSS Labs enhances Cyber Advanced Warning System (CAWS) platform with new file based malware and advanced classification capabilities to help better understand the ability of deployed security technologies...
7 Security Startups That Raised Venture Capital in January
There should be no question that IT security is a top concern across all industries and market sectors in 2017. Simply put, no company wants to be a victim of a data breach or other cyber-attack. So corporate...
F5 Networks Debuts Herculon Security Product Portfolio
F5 Networks pushes further into the application security market with new DDoS protection and expanded Web Application Firewall services. F5 Networks is growing its security capabilities with the launch...
It might be time to stop using antivirus
EnlargeThinkstock / Aurich Lawson reader comments 58 Share this story Former Firefox developer Robert O'Callahan, now a free agent and safe from the PR tentacles of his corporate overlord, says that antivirus...
Facebook Embraces U2F to Improve User Login Security
Facebook is now supporting the FIDO Alliance Universal 2nd Factor (U2F) security standard, providing users with a strong authentication method to secure account access. Facebook announced on Jan. 26 that...
NFC security key support is making your Facebook page extra secure
Facebook is showing a real commitment to improving user security today with its announcement that it’ll now support USB security keys as part of its two-factor account authentication.Two-factor authentication...
Microsoft to continue to invest over $1 billion a year on cyber security
U.S. software firm Microsoft will continue to invest over $1 billion annually on cyber security research and development in the coming years, a senior executive said. This amount does not include acquisitions...
Using a VPN on Android? Then you should read this
Generally speaking, you use a VPN to be more secure or stay anonymous when online (or perhaps for other reasons like getting round content blocking), but according to a new study, some Virtual Private...
Sophos Launches Phish Threat Testing and Training Platform
Sophos launches security testing and training platform to help build user awareness around phishing threats. Security vendor Sophos announced the official launch of its Phish Threat attack simulator on...
Kaspersky Lab’s top investigator reportedly arrested in treason probe
reader comments 6 Share this story In a move that stunned some security researchers, a top investigator at Russia's largest antivirus provider, Kaspersky Lab, has been arrested in an investigation into...
Woman: After I rebuffed my Uber driver’s advances, he tried to rape me
EnlargeOre Huiying/Bloomberg via Getty Images reader comments 36 Share this story Further ReadingMan claims Uber driver “left him in a pool of blood” after refusing tripA woman in Minnesota has sued Uber,...
Uber denies targeting ex-engineer in claimed ‘smear campaign’
Susan Fowler, the former engineer whose detailed recounting of sexual harassment and management infighting at Uber prompted CEO Travis Kalanick to apologize for the rough-edged culture he created at the...
Uber says it’s not behind the phone calls to investigate Susan Fowler’s personal life
After a week of controversy — and heavy criticism from its employees, the media and some investors for allowing what one called a "toxic" work culture to thrive — Uber remains on the defense. Today, the...
Uber might genuinely be worried that #DeleteUber is working
alizasherman reader comments 1 Share this story Further ReadingEx-Uber engineer alleges sexual harassment, CEO reacts by promising investigationSocial media calls to #DeleteUber are getting the company's...
I regard the brain as a computer which will stop working when its component fail. There is no heaven or afterlife for broken-down computers. That is a fairy story for people afraid of the dark