Fog Computing Unifies Technologies for Smart Cars, Homes

Fog computing is the latest idea on how to get the most out of new technologies and provide solutions for smart cars, cities and homes. It relies on cloud computing infrastructure, but brings the actual processes closer to earth (hence, fog) by using hardware near the edge of the network. Fog computing brings together many cutting edge technologies including virtualization, blockchain, DevOps, 5G, TSN (time-sensitive networking), distributed computing and IT-OT (operations technology) collaboration. Continue reading Fog Computing Unifies Technologies for Smart Cars, Homes

Facebook, Google and Twitter Execs Testify Before Congress

Facing the Senate Judiciary Committee on Tuesday, Facebook, Google and Twitter executives responded to questions on why they didn’t recognize Russian-linked accounts earlier. In response, the rueful executives said their companies were working on ways to curb the activity of foreign governments, terrorists and criminals and prevent them from exploiting social media. On the other hand, however, those same Silicon Valley companies face a public that is far from united over whether they should curb free speech. Continue reading Facebook, Google and Twitter Execs Testify Before Congress

Cisco, Google Partner to Gain Market Share in Cloud Services

Google and Cisco Systems are partnering to help companies manage software and technology services in their own data centers or an external cloud service. The two tech titans’ collaboration is aimed at breaking through Amazon and Microsoft’s domination of cloud services. With the new deal, Google will have access to Cisco’s corporate clients and Cisco will get a boost in its transition from computing networking equipment to cloud services. Cisco also competes with rivals such as VMware, another Amazon ally. Continue reading Cisco, Google Partner to Gain Market Share in Cloud Services

Amazon to Debut New Delivery Service in 37 Cities Next Month

Amazon is introducing Amazon Key, a service that, via a smart lock and a security camera, allows its couriers to unlock the consumer’s front door and drop a package inside. Similarly, Latch, a startup that makes smart locks, inked a deal this summer with Walmart online shopping site Jet.com to pay for its locks to be installed in 1,000 New York City apartment buildings. Amazon Key, which starts at $250, is a kit that includes an Amazon Cloud Cam (available separately for $120) and a Yale or Kwikset smart door lock. Continue reading Amazon to Debut New Delivery Service in 37 Cities Next Month

ARM Proposes Security Framework Standard for IoT Devices

Consumer confidence in the Internet of Things can be easily rattled by reports of compromised privacy, such as when researchers found that some baby monitors had been turned into surveillance devices. The SoftBank Group-owned U.K. chip manufacturer ARM, however, has introduced a potential solution: a security framework for IoT devices from home appliances and children’s toys to vehicles and streetlights. Up until now, the many IoT manufacturers haven’t agreed on a single security standard, something ARM hopes to remedy. Continue reading ARM Proposes Security Framework Standard for IoT Devices

WPA2 Wi-Fi Flaw Revealed, Android & Linux Most Vulnerable

According to researchers, the WPA2 protocol for Wi-Fi connectivity contains a significant weakness that makes it vulnerable to attackers. A hacker within range of connected devices would reportedly be able to exploit this weakness to hijack passwords, emails and other “encrypted” data, or even place ransomware into a website the user is visiting. The research, which has been ongoing for weeks, reveals that the WPA2 core vulnerability could affect operating systems and devices including Android, Linux, OpenBSD, MediaTek, Linksys, macOS and Windows. Continue reading WPA2 Wi-Fi Flaw Revealed, Android & Linux Most Vulnerable

Clicking Flash Update on the Equifax Site Results in Adware

In the wake of May’s Equifax website breach that reportedly involved personal data of 145.5 million U.S. consumers, the credit reporting service’s site was manipulated again this week. On Wednesday, and again on Thursday, fraudulent Adobe Flash updates appeared that infected computers with adware when clicked. Only three of 65 antivirus providers detected the adware. Security analyst Randy Abrams discovered the issue while investigating false information that had appeared on his credit report. Meanwhile. federal legislators have introduced a new cybersecurity bill to help protect consumers. Continue reading Clicking Flash Update on the Equifax Site Results in Adware

Security Update: 3 Billion Yahoo Accounts Hit in 2013 Attack

Yahoo announced yesterday that all 3 billion of its user accounts were affected by a previously disclosed August 2013 cyberattack, originally reported by the company as affecting 1 billion accounts. Yahoo had earlier reported that a separate 2014 attack affected 500 million accounts. Last year we learned that, “digital thieves made off with names, birth dates, phone numbers and passwords of users that were encrypted with security that was easy to crack,” according to The New York Times. “The intruders also obtained the security questions and backup email addresses used to reset lost passwords.” Continue reading Security Update: 3 Billion Yahoo Accounts Hit in 2013 Attack

Equifax Breach Spurs Call for Federal Laws on Transparency

The Equifax breach exposed millions of U.S. adults’ personal information, prompted Federal Trade Commission and FBI investigations, and spurred lawsuits by many states’ attorneys general. With the threat of even worse breaches in the future, companies will be urged to adopt better cybersecurity practices. But the Equifax breach is likely to have another result that tech companies won’t like: the need for transparency. Although 48 states have already passed data-breach disclosure laws, now federal regulations are proposed. Continue reading Equifax Breach Spurs Call for Federal Laws on Transparency

London Pulls Uber’s License to Operate, Uber Appeals Ruling

London cut Uber’s license to operate, which will expire September 30. London said that Uber lacked corporate responsibility and was not fit and proper to hold a private vehicle hire licenses. Uber has 40,000 drivers and 3.5 million users in London. Transport for London (TfL), the agency that oversees the city’s cabs, buses and subways, said it would allow Uber to operate until the conclusion of the appeals process. TfL also cited Uber’s background checks on drivers, its approach to reporting serious criminal offenses and Greyball, a software that could block regulators from accessing the app. Continue reading London Pulls Uber’s License to Operate, Uber Appeals Ruling

CCleaner Malware Is Linked to Attack Against 20 Tech Firms

Security companies Morphisec and Cisco reported the extent of the damage caused by a malware attack on security software CCleaner. Experts say that the software, distributed by Czech company Avast, was targeted not simply to disrupt as many computers as possible, but to conduct espionage. Hackers penetrated the software and added a backdoor, ultimately installing malware on more than 700,000 computers. But hackers also sought to find computers among those infected that resided in networks of 20 leading tech firms. Continue reading CCleaner Malware Is Linked to Attack Against 20 Tech Firms

Equifax Breaches Spur Businesses to Prioritize Cybersecurity

Equifax’s two cyber breaches, which exposed about 143 million Americans’ personal information, were the work of hackers who took advantage of a flaw in Apache Struts software. The nonprofit Apache Software Foundation and the U.S. Computer Emergency Readiness Team warned of the bug in early March, but Equifax only alerted its end users on September 7, almost five months later. IT experts say the event highlights the challenges in keeping software current and identifying all potentially vulnerable applications. Continue reading Equifax Breaches Spur Businesses to Prioritize Cybersecurity

Companies Return to Tape As Protection From Cyberattacks

The federal government, financial service companies, and other regulated industries store their most important data on tape, an old-fashioned and inconvenient format that is, nonetheless, impervious to hackers. As cyberattacks become more skillful and persistent, other companies are now following suit. Starting in the 1950s, digital tape, stored in on-site libraries, was the only means of reliable storage for massive amounts of data. Eventually, companies moved to digital records and, in recent years, the cloud. Continue reading Companies Return to Tape As Protection From Cyberattacks

W3C Officially Recommends EME Spec for DRM Protection

The World Wide Web Consortium (W3C) published the Encrypted Media Extensions (EME) specification as a recommendation, although W3C members only voted 58.4 percent to approve, with 30.8 percent opposing and 10.8 percent abstaining. EME is a standard interface for digital rights management (DRM) protection of content delivered through the browser, defining how Internet content works with third-party Content Decryption Modules (CDMs) that provide proprietary decryption and rights management. In response to the EME recommendation, the Electronic Frontier Foundation has resigned from the W3C. Continue reading W3C Officially Recommends EME Spec for DRM Protection

As Threats to Cybersecurity Grow, So Does Cyberinsurance

Increasingly pervasive threats to cybersecurity have jumpstarted the cyberinsurance business to reach beyond technology companies, its core customers. Covering financial loss, including theft of data and ransomware, cyberinsurance is reportedly the fastest-growing coverage among U.S. companies; cyberinsurance firms provide competing tools to distinguish their offerings in the marketplace. Insurance is not in lieu of good security practices, but the idea of cyberinsurance is appealing even though it is largely untested. Continue reading As Threats to Cybersecurity Grow, So Does Cyberinsurance