Welcome Guest | Sign In
ECTNews.com
Content Marketing on ALL EC
E-Commerce Times TechNewsWorld CRM Buyer LinuxInsider
BlackBerry Makes Autonomous Vehicle Play
December 13, 2018
BlackBerry this week introduced its new Security Credential Management System. SCMS -- a free service for the public and private sectors -- could encourage efforts to develop autonomous and connected vehicle pilot programs. BlackBerry undertook development of this technology to provide the critical infrastructure for vehicles and traffic lights to exchange information securely.
Supermicro: Our Motherboards Are Clean
December 12, 2018
Supermicro CEO Charles Liang has informed the company's customers that a leading third-party investigations company found "absolutely no evidence of malicious hardware" on its motherboards. The investigation was undertaken in response to a recent claim that bad actors had inserted spy chips in the firm's motherboards on behalf of the Chinese People's Liberation Army.
Quora Looks for Answers in Wake of Massive Data Breach
December 5, 2018
The personal data of some 100 million people who have used Quora, a popular question and answer website, has been compromised, the company disclosed. "We recently discovered that some user data was compromised as a result of unauthorized access to one of our systems by a malicious third party," wrote Quora CEO Adam D'Angelo in an online post. "We are working rapidly to investigate the situation."
How to Use a VPN for Safer Online Shopping
December 4, 2018
With the holidays fast approaching, are you looking to buy presents online? The holiday season has become synonymous with online shopping. This isn't really surprising as physical stores usually attract crowds of deal hunters. This often conjures up images of throngs of people waiting in line outside the store, some even camping out. This activity is tolerable for some and even fun for others.
DoJ Takes Down Online Ad Fraud Ring, Indicts 8
November 29, 2018
The DoJ has revealed an unsealed indictment of eight defendants for crimes related to their involvement in widespread digital advertising fraud. The DoJ alleges the eight individuals were behind two global schemes, 3ve and Methbot, which stole tens of millions of dollars through a scam that used fake Web traffic and fake websites to reap ad view revenue from unwitting advertisers.
When Is the Time to Hire a Cyber Specialist?
November 14, 2018
Cybersecurity has been becoming a larger and larger concern for organizations. Nowadays, most organizations -- regardless of size, industry, location, or profit vs. nonprofit status -- find themselves directly or indirectly impacted by cybersecurity. Even though the topic itself is increasing in importance, many smaller organizations don't have specialized security expertise on staff.
Whether Intended or Accidental, Internet Traffic Rerouting Can Be Costly
November 14, 2018
An apparent prefix leak from an errant router misconfiguration caused Google to lose control of several million of its IP addresses for more than an hour on Monday. During the event, Internet traffic was misrouted to China and Russia from Nigeria. The incident initially sparked concerns that it might have been a hijacking. The mishap made Google services unavailable to many users intermittently.
Cryptohackers Breach StatCounter to Steal Bitcoins
November 8, 2018
Hackers planted malware on StatCounter to steal bitcoin revenue from Gate.io account holders, according to Eset researcher Matthieu Faou, who discovered the breach. The malicious code was added to StatCounter's site-tracking script last weekend, he reported. The malicious code hijacks any bitcoin transactions made through the Web interface of the Gate.io cryptocurrency exchange.
How to Protect Your Online Privacy: A Practical Guide
November 7, 2018
Do you take your online privacy seriously? Most people don't. They have an ideal scenario of just how private their online activities should be, but they rarely do anything to actually achieve it. The problem is that bad actors know and rely on this fact, and that's why there's been a steady rise in identity theft cases from 2013 to 2017, often resulting in loss of reputation or financial woes.
Mobile Phone Security: All You Need to Know
November 6, 2018
We rely on our phones to process and store reams of personal digital data. Our digital activities -- from checking bank balances to paying for a product with a tap of the screen, to sending friends and family messages over social media, to accessing work emails remotely -- have turned our phones into a goldmine of personal information. How secure is your mobile device?
It Is Well Past Time for Elections to Be Online
November 5, 2018
Tomorrow a minority of those who are eligible will take time off, drive through traffic, and wait in lines to take part in one of the most artificially annoying obligations of United States citizenship: voting. Many who make that inconvenient trek will treat the process like a multiple choice test they haven't studied for, either voting the party line or guessing at the right answers.
Former White House CIO Theresa Payton: 'There Are Grave Concerns About Election Interference'
October 26, 2018
Theresa Payton, CEO of Fortalice Solutions, is one of the most influential experts on cybersecurity and IT strategy in the United States. She is an authority on Internet security, data breaches and fraud mitigation. She served as the first female chief information officer at the White House, overseeing IT operations for President George W. Bush and his staff.
Will Oracle Roil the DB Market?
October 23, 2018
When we write the history of the IT era, the big factor that has played an important but not well recognized role will be hardware -- specifically, the Oracle Exadata appliance that puts databases into memory. All of the cloud software starting with the autonomous database on view this week at OpenWorld would be vastly different if the database was still running primarily on disk drives.
Software Security Best Practices Are Changing, Finds New Report
October 2, 2018
Independent software vendors, along with Internet of Things and cloud vendors, are involved in a market transformation that is making them look more alike. The similarities are evident in the way they approach software security initiatives, according to a report from Synopsys. Synopsys has released its ninth annual Building Security in Maturity Model, or BSIMM9.
The Crypto-Criminal Bar Brawl
September 25, 2018
As if e-commerce companies didn't have enough problems with transacting securely and defending against things like fraud, another avalanche of security problems -- like cryptojacking, the act of illegally mining cryptocurrency on your end servers -- has begun. We've also seen a rise in digital credit card skimming attacks against popular e-commerce software such as Magento.
Protecting Against 'Natural' Cybersecurity Erosion
September 21, 2018
Every child who's ever played a board game understands that the act of rolling dice yields an unpredictable result. In fact, that's why children's board games use dice in the first place: to ensure a random outcome that is -- from a macro point of view -- about the same likelihood each time the die is thrown. Consider what would happen if someone replaced the board game's dice with weighted dice.
Why You Should Manage Your IoT Devices Like Employees
September 15, 2018
There is a well-known joke among security professionals: Q: "What does IoT stand for?" A: "Internet of Threats." Sadly, this joke is our reality. An estimated 20.4 billion Internet of Things devices will be deployed by 2020, according to Gartner, in what some have dubbed "the fourth industrial revolution." These connected devices are being manufactured to streamline everything we do.
Facebook Goes Into High Gear to Fight Election Meddling, Fake News
September 14, 2018
Defending against foreign interference in American elections is one of the priorities Facebook CEO Mark Zuckerberg said he has been focusing on this year. The issue is highly sensitive, and it is one that has garnered a great deal of discussion in media reports and on the Web. Special counsel Robert Mueller warned in a court filing this spring that foreign interference efforts were still going on.
Medical Device Insecurity: Diagnosis Clear, Treatment Hazy
September 11, 2018
An increasing number of healthcare professionals have become alert to the need for well-rounded medical device security in recent years, and players throughout the industry have started putting more effort into raising the bar. Developers have become aware of the most glaring holes, and more information security researchers have been brought into the fold.
'Five Eyes' Nations Push for Encryption Backdoors
September 5, 2018
Strong encryption can be a threat to law enforcement and national security, the governments of the United States, United Kingdom, Canada, Australia and New Zealand said in a statement issued Sunday. "The increasing use and sophistication of certain encryption designs present challenges for nations in combating serious crimes and threats to national and global security," maintained the countries.
Facebook Cracks Down on Iranian, Russian Influence Campaigns
August 23, 2018
Facebook has removed more than 650 Facebook and Instagram pages, groups and accounts originating in Iran and Russia for "coordinated inauthentic behavior." The goal is to improve the trustworthiness of Facebook connections. Although it has been making progress in its efforts, the people responsible for the inauthentic activity are determined and well funded, Facebook said.
Microsoft Foils Russian Attack on GOP Think Tanks
August 22, 2018
Microsoft has torpedoed websites designed to steal credentials from visitors to two Republican Party think tanks. The malicious websites were among six the company took down last week. A group of hackers affiliated with the Russian military created the sites, according to Microsoft. It apparently was the same group that stole a cache of email from the DNC during the 2016 presidential campaign.
5 Important Healthcare Cloud Security Factors to Weigh
August 21, 2018
The healthcare cloud has been growing incredibly, becoming an ever-more-important element of health information technology, or HIT. There are many reasons why the HIT cloud has been becoming more prominent, such as research and development and collaboration. Since the cloud has been expanding so rapidly, this may be a good time to reconsider security.
Don't Be So Sure AI Is Cybersecurity's Silver Bullet
August 20, 2018
There's a lot of hype around artificial intelligence as the greatest thing since sliced bread, but will AI really help with cybersecurity? Criminals who run cybercriminal businesses also are capable of using the AI to commit crimes. It's logical that if one person is smart enough to develop cyberprotection technologies that utilize AI, then thoughtful, creative criminals can use it too.
Farsight Security COO Alexa Raad: 'Be Your Own Champion'
August 14, 2018
"If you think about Internet threats like phishing and botnets and malware -- all of those start with a DNS -- a domain name system. And so every kind of nefarious act leaves footprints and fingerprints in the DNS. That's something that cannot be faked," said Farsight Security COO Alexa Raad. For example, "a lot of the new domain names that are registered are typically registered with bad intent."
Def Con Voting Machine Hacks Ruffle Feathers
August 14, 2018
Hackers cracked into a wide array of voting equipment Def Con's Voting Village, an event held Friday at Caesar's Palace in Las Vegas, Nevada. Last year, conference goers hacked five machines and an e-poll book of registered voters. This year, in addition to voting machines, tabulators and smart card readers were available for hacking. Websites weren't off limits, either.
Virus Attack on Chipmaker Could Delay Next iPhone
August 7, 2018
A computer virus over the weekend disrupted the operations of the Asian manufacturer that makes chips for the iPhone and other devices offered by top shelf high-tech companies. TSMC said that a virus outbreak Friday evening affected a number of computer systems and fab tools at its facilities in Taiwan. The incident likely will cause shipment delays and create additional costs.
Homeland Security Unveils Center to Combat Cyberthreats
August 1, 2018
DHS has announced the National Risk Management Center, part of a new effort to combat cyberthreats to the U.S. The new agency's mission will be to defend the critical infrastructure through greater cooperation between the public and private sectors. The center will bring together government experts and industry partners to work out ways that the government can support the partners.
Russian Hackers Have Invaded Hundreds of US Utilities: Report
July 25, 2018
Hundreds of U.S. utilities were penetrated by Russian hackers who could have disrupted the nation's power grid. The attacks were launched last year by threat actors sponsored by the Russian government, according to a report. The hackers used Black Hat tools such as phishing and waterhole traps to obtain credentials from legitimate users and leverage them to gain access to the utilities.
Feds Seem to Favor 'Light Touch' IoT Regulation
July 24, 2018
The Internet of Things may be in its infancy, but the U.S. government has been gearing up to determine what the proper federal role should be, both for encouraging and for regulating the use of IoT technology. Two recent developments have underscored the government's interest in IoT. On the regulatory front, the CPSC has launched an initiative to determine a framework for regulation.
See More Articles in Cybersecurity Section >>
Facebook Twitter LinkedIn Google+ RSS
Would you move to a tech hub like San Francisco or Seattle if you were offered a high-paying, career-building job?
Absolutely. I already live in a tech center and I enjoy being where the action is.
No. I live in (or have lived in) a tech-forward city, and I'd rather live elsewhere.
I'd be tempted, but I'm worried about the cost of living.
I doubt it, as I don't like the reputation for decadence in those cities.
I would if I didn't have so many ties where I currently live.
Why bother? With telecommuting you can live and work anywhere.