By
Debra KaufmanJuly 31, 2019
A hacker accessed the personal data of about 106 million credit card customers and applicants of Capital One Financial, the fifth-largest credit card company in the U.S., making it one of the biggest such breaches of a large bank. Federal authorities arrested 33-year old Paige Thompson, who is accused of breaking through the bank’s firewall to access data stored on Amazon’s cloud service. Most of those exposed by the hack were customers and small businesses who applied for credit cards between 2005 and early 2019. Continue reading Capital One Breach Exposes Data of 106 Million Customers
By
Debra KaufmanDecember 22, 2015
Tech giant Juniper Networks just found unauthorized code — essentially a backdoor — in the operating system running some of its firewalls. The hidden backdoor, found in versions of the company’s ScreenOS software dating back to at least August 2012, enable hackers to take complete control of Juniper NetScreen firewalls as well as decrypt encrypted traffic running through the Virtual Private Networks (VPN) on the firewalls. The FBI is investigating the breach, which appears to be the work of a foreign government. Continue reading Juniper Networks Backdoor Hack Likely From Foreign Nation
Weeks after the California Senate voted down legislation that would require anti-theft tech in all new smartphones, it has now passed a revised version of the bill after Apple and Microsoft withdrew their opposition. While the legislation is applauded by law enforcement groups, it is still opposed by some wireless carriers, and could face an uphill battle in the state Assembly. If passed, kill-switch technology would be required for phones sold in California that are manufactured after July 1, 2015. Continue reading California Senate Passes Amended Smartphone Kill-Switch Bill
By
Meghan CoyleMay 7, 2014
Companies such as IBM and Symantec are investing in new technologies to detect viruses and hackers and make stealing customer data more difficult. The companies believe that traditional antivirus software that erect barriers to keep out threats is becoming increasingly ineffective as hackers around the world regularly create novel bugs. IBM plans to analyze behavior in computer network data to detect irregularities. Symantec is launching its own division that will help hacked businesses respond to security breaches. Continue reading Cybersecurity Focus Shifts From Blocking to Spotting Threats
By
Rob ScottApril 11, 2014
Popular websites have been scrambling to update software and Internet users have been encouraged to change their passwords following the news of an encryption flaw known as the Heartbleed bug, which is already being categorized as one of the biggest security threats the Internet has ever experienced. The bug has affected a number of websites and services (although the extent is not clear), and may have exposed account info including passwords and credit card numbers going back two years. UPDATE: Cisco and Juniper said yesterday that some of their networking products contain the bug, which means sensitive info may have been obtained while moving across corporate networks, home networks and the Internet. Continue reading Bug Causes Scramble to Update Software and Change Passwords
By
Rob ScottApril 8, 2014
The recently released FireChat mobile app stands out from competitors as the only messaging app that can be used without cell phone reception. FireChat makes use of Apple’s multipeer connectivity introduced in iOS 7, which enables phones to connect with each other directly via Bluetooth or Wi-Fi. FireChat users within 100 feet of one another can exchange messages without sending data through a cellular provider. A future of similar apps not reliant upon the Internet could open new possibilities and address privacy concerns. Continue reading New Software Lets Chat Apps Connect Phones Without Internet
By
Cassie PatonDecember 12, 2013
The National Security Agency and its UK sister agency GCHQ have been deploying real-life agents into fictional worlds like “World of Warcraft” and “Second Life,” collecting gamers’ chats and even attempting to recruit potential informants, according to documents leaked by Edward Snowden. The agencies claimed that real-life terrorists might be playing and plotting within these games, suggesting that the gamer communities may provide intelligence on terrorist activity. Continue reading NSA and GCHQ Monitor Gaming Activity, Search for Terrorists
By
Chris CastanedaOctober 4, 2013
Verizon recently released a study that found that NSA surveillance concerns have not decreased the adoption of public cloud services by large corporations. Companies have been increasing their amount of data stored in the cloud. Public clouds remain attractive as they allow companies to decrease or increase the scale of resources, and to share the cost of ownership among users. But some big companies are looking to vendors outside the U.S. to avoid the NSA. Continue reading Verizon: Big Corporations Still Moving to the Public Cloud
By
Rob ScottOctober 3, 2013
A new report from the Pew Internet & American Life Project, based on interviews conducted by Princeton Survey Research Associates, indicates that 15 percent of American adults ages 18 and older say they are not using the Internet or email. Survey participants cite issues related to relevance, problems with ease-of-use, security, expense and availability as primary reasons. Additionally, another 9 percent of U.S. adults note that they use the Internet, but not while they are at home. Continue reading 15 Percent of American Adults Not Using the Internet or Email
By
Chris CastanedaJuly 12, 2013
Many cars made today are embedded with new technologies, which are leading to partnerships between auto manufacturers and wireless companies. These agreements are resulting in vehicles with always-on, fast wireless connectivity, providing the groundwork for new services, such as smartphones integrating with cars, and perhaps car-to-car communication. But with new forms of connectivity come new distractions and potential dangers. Continue reading Smartphones Merging with Cars Creating Connected Vehicles
By
Rob ScottApril 24, 2013
The Associated Press Twitter account was hacked yesterday with a false report involving explosions at the White House. The account was quickly suspended, but not before the news had been retweeted thousands of times, resulting in a temporary yet sharp drop in the Dow and news outfits clamoring to ascertain details. Although the account is active again, the news agency has nearly 2 million less followers, which Twitter explains could take up to 24 hours to repair. Continue reading AP Twitter Account Hacked: Underlines Need for Security