By
Paula ParisiNovember 21, 2024
Microsoft has two new chips designed for data centers. The Azure Boost DPU is Microsoft’s first data-specific chip, or data processing unit, and is designed to work with high efficiency and low power. Microsoft anticipates DPU-equipped Azure servers will be able to run storage workloads at four times the performance of those currently in place while reducing power consumption by three times. The Azure Integrated Hardware Security Module (HSM) chip allows cryptographic security keys and encryption keys to be contained in secure modules “without compromising performance or increasing latency.” Continue reading Microsoft Debuts Two New Chips Optimized for Data Centers
By
Paula ParisiSeptember 7, 2023
E.W. Scripps subsidiary Nuvyyo has released a redesigned version of its Tablo DVR that will “better meet the needs of consumers by providing an enhanced over-the-air TV experience with content recommendations and a curated selection of free ad-supported streaming TV channels integrated into the live TV program guide,” the company explains. The puck-like device is available for a one-time hardware fee, with no subscription, contracts or fees required. The Tablo sells for $99.95 at TabloTV.com, Best Buy and Amazon, while the Tablo Total System, which includes a 35-mile indoor TV antenna, is available for the promotional price of $109.95 and will later cost $129.95. Continue reading New Tablo DVR Integrates FAST for Free All-in-One Solution
By
Debra KaufmanJuly 7, 2020
K7 Labs malware researcher Dinesh Devadoss discovered a new form of malware aimed at Mac computers. ThiefQuest (originally dubbed EvilQuest, until researchers discovered that’s the name of a Steam game) isn’t simply ransomware but also contains spyware that allows it to exfiltrate an infected computer’s files, search it for passwords and cryptocurrency wallet data, and nab passwords and credit card numbers. Even after a computer reboots, the spyware lingers as a backdoor that could be used for a second-stage attack. Continue reading ThiefQuest Is New Ransomware and Spyware Aimed at Macs
By
Debra KaufmanJanuary 24, 2019
Australia passed a law that challenges the right of tech companies to sell devices with unbreakable encryption. The Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018, which took effect last month, covers all devices sold in Australia. But if Apple, for example, creates a back door for its iPhones sold there, authorities in other countries previously stymied by Apple’s tough encryption could demand the same access. Australia’s law said it can’t ask a company to build universal decryption. Continue reading New Australian Legislation Challenges Unbreakable Encryption
By
Debra KaufmanJune 27, 2018
The Wi-Fi Alliance just unveiled WPA3, five months after it was first announced. The nonprofit organization that certifies Wi-Fi networking standards introduced a certification for two versions of WPA3, the successor standard to WPA2: WPA3-Personal and WPA3-Enterprise as well as Wi-Fi Easy Connect, a program that makes it easier to pair Wi-Fi devices without displays. Wi-Fi Alliance vice president of marketing Kevin Robinson dubs WPA3 as “the next generation of security for personal and enterprise networks.” Continue reading Wi-Fi Alliance Finalizes the WPA3 Wireless Security Protocol
By
Debra KaufmanJune 26, 2018
Cyber criminals recently hacked the municipal computers of Rockport, Maine, demanding $1,200 in Bitcoin to unlock them. That’s just one example of a surge of ransomware aimed at municipal computer systems, both large and small, including the city of Atlanta and a St. Louis library system. According to Ponemon Institute, an information systems research firm, these kinds of public sector hacks are increasing faster than those on private ones. City officials are often unprepared to deal with the consequences. Continue reading Municipalities Increasingly Targeted for Ransomware Attacks
By
Debra KaufmanSeptember 20, 2017
The World Wide Web Consortium (W3C) published the Encrypted Media Extensions (EME) specification as a recommendation, although W3C members only voted 58.4 percent to approve, with 30.8 percent opposing and 10.8 percent abstaining. EME is a standard interface for digital rights management (DRM) protection of content delivered through the browser, defining how Internet content works with third-party Content Decryption Modules (CDMs) that provide proprietary decryption and rights management. In response to the EME recommendation, the Electronic Frontier Foundation has resigned from the W3C. Continue reading W3C Officially Recommends EME Spec for DRM Protection
By
Debra KaufmanJuly 11, 2017
The World Wide Web Consortium (W3C), which oversees standards for the web, approved a new system for handling DRM-protected video. Encrypted Media Extensions (EME) work by letting DRM systems connect directly to the user’s browser. EME lets streaming video services protect their content without forcing users to install plugins that can be insecure. But not everyone is happy. Some researchers and advocates of the open Internet believe EME will give browser developers and content providers too much power. Continue reading W3C Approves the EME Standard for DRM-Protected Video
By
ETCentricJune 21, 2017
In the largest ransomware payout to date, South Korean web provider Nayana has agreed to pay $1 million to hackers who originally demanded 550 Bitcoins, about $1.62 million. Following negotiations, Nayana has agreed to pay $1 million in three installments. The ransomware, identified as Erebus by cybersecurity firm Trend Micro, impacted 153 Linux servers and more than 3,400 websites hosted by Nayana. “This is the single largest-known payout for a ransomware attack, and it was an attack on one company,” reports CNET. “For comparison, the WannaCry ransomware attacked 200,000 computers across 150 countries, and has only pooled $127,142 in Bitcoins since it surfaced.” Continue reading Ransomware: Hackers Extort $1 Million From One Company
By
Debra KaufmanMay 22, 2017
Cyberattacks are on the rise, with major corporations, media companies, the healthcare industry and even the federal government becoming targets of hacking. Recent incidents involved media content as hackers threatened early releases of movies and streaming series if the property owners failed to pay ransoms. Hackers called the Shadow Brokers told the NSA they would release secret espionage tools unless the agency pays up. Security experts suggest that this type of extortion has had mixed results thus far. Continue reading Extortion Hacking On the Rise, But Does Not Always Pay Off
By
Debra KaufmanMay 13, 2016
Although the FBI was finally able to decrypt the iPhone belonging to San Bernardino terrorist Syed Rizwan Farook by paying for a third party private hack, the issues around accessing content on a personal smartphone are not resolved. The FBI is figuring out how and if it can re-use the hack, but it’s not simply interested in what’s called “data at rest,” says FBI director James Comey. The FBI is also interested in “data in motion,” the emails, texts and other information in transit over the Internet as “hugely significant” for national security. Continue reading FBI iPhone Hack Could Impact the Future of Law Enforcement
By
Debra KaufmanMay 10, 2016
The battle over encryption is heating up on Capitol Hill where Manhattan district attorney Cyrus R. Vance Jr. said his office hasn’t been able to decrypt 230 iPhones possibly containing important crime-related information. Google general counsel Kent Walker and Microsoft president Brad Smith also visited lawmakers to make the counter-argument that weakened encryption would make their technology less secure. These latest salvos are part of a battle that ignited when Apple refused to decrypt a mass-shooter’s iPhone. Continue reading Twitter Withholds Data, Tensions Rise Between Police, Tech
By
Rob ScottApril 14, 2016
Washington and Silicon Valley are poised to clash again in the ongoing debate over encryption technology in relation to data privacy, law enforcement and national security. Senate Intelligence Committee chair Richard Burr (Republican, NC) and Dianne Feinstein (Democrat, CA), the panel’s vice chair, have introduced proposed legislation that would require companies to unlock encrypted devices when served a court order. Congress has been working on a balance between security and privacy regarding encryption, especially in the wake of the recent iPhone case. Continue reading Proposed Encryption Bill Faces Opposition from Silicon Valley
By
Debra KaufmanApril 4, 2016
Since the FBI broke the encryption of the iPhone 5C belonging to terrorist Syed Rizwan Farook, most likely with the help of the Israeli office of the Japanese mobile phone security firm Cellebrite Mobile Synchronization, it has been testing the method on other iPhone versions. It will not, however, disclose the phone’s flaw or the information found on Farook’s phone. European cases regarding locked phones are heating up, with France and England considering fines for companies that don’t help crack their phones’ encryption. Continue reading FBI Tries to Unlock More iPhones, Debate Continues in Europe
By
Debra KaufmanMarch 29, 2016
As the issue of digital encryption versus privacy roiled in the U.S. over the FBI’s demand that Apple unlock the iPhone of a mass murderer in California, recent violence in Brussels and Paris has brought those same issues to the fore in Europe. Although privacy is enshrined as a basic right in much of Europe, lawmakers in some countries are considering proposals that would give greater powers to law enforcement to access personal digital data. But privacy advocates in those same countries are fighting back. Continue reading Europe Divides in Battle Between Privacy, Digital Decryption