By
Rob ScottApril 19, 2013
Rather than crawl websites like a traditional search engine, Shodan navigates back channels tracking servers, webcams, printers, routers and other devices connected to the Internet. Each month, it gathers information on roughly 500 million connected devices and services. CNNMoney calls Shodan “the scariest search engine on the Internet.” As we move closer to the Internet of Things, it raises questions about how easy it may be to hack anything that is connected to the Internet. Continue reading Search Engine Exposes Vulnerability of Connected Devices
By
emeadowsApril 15, 2013
With Internet users posting an increasing amount of information online, the question has arisen regarding what happens to that data once an individual passes on. Google may now have an answer with its new Inactive Account Manager. With this technology, users of any Google service can set a time to delete their “digital life” or send selected elements to a person of their choosing, after the account or accounts become permanently inactive. Continue reading Google Creates Manager for Permanently Inactive Accounts
American Express confirmed that its website had come under attack last week. The assault, which took the site offline for two hours, marks the latest in a string of powerful digital attacks on American financial institutions that began this past September. JPMorgan Chase and others experienced a similar attack this month. The assaults collectively resulted in the loss of millions of dollars. Continue reading U.S. Financial Institutions Become Targets of Cyberattacks
By
emeadowsMarch 28, 2013
Businesses have been training their employees to be more aware of potential cyberattacks. However, here’s the twist: the employees don’t always know they are being trained. So-called “ethical hackers” have been hired to lure employees with different tactics such as fake emails promising work bonuses and pictures of adorable cats with links or software that teaches workers how to avoid online dangers. Continue reading Ethical Hacking: Going Undercover to Train Employees
By
emeadowsMarch 25, 2013
During a presentation at last week’s GigaOM Structure:Data conference in New York, Ira “Gus” Hunt, the CIA’s chief technology officer, detailed the Agency’s vision for collecting and analyzing information people put on the Internet. The presentation came just two days after it was reported that the CIA is about to sign a cloud computing contract with Amazon worth up to $600 million over 10 years. Continue reading CIA Discusses Plans for Collecting and Analyzing Big Data
By
Rob ScottMarch 15, 2013
After a two-year investigation into whether or not Google’s Street View violates privacy protections, law enforcement officials have again told the company it is time to shape up. Google acknowledged breaches this week and said no longer will there be a scenario in which a midlevel engineer launches a program to secretly gather data from possibly millions of unencrypted global Wi-Fi networks, unbeknownst to his bosses. Continue reading Coalition of 38 States Draws Up Security Steps for Google
By
emeadowsMarch 15, 2013
President Obama met with a group of 13 corporate executives at the White House on Wednesday to discuss growing cybersecurity concerns and to enlist support for his proposed legislation to combat the threat of computer warfare and corporate espionage. Among the chief execs were Rex W. Tillerson of Exxon Mobil, Randall L. Stephenson of AT&T, Brian T. Moynihan of Bank of America and Jamie Dimon of JPMorgan Chase. Continue reading Obama Seeks Corporate Support for Cybersecurity Initiative
By
emeadowsMarch 11, 2013
Some cybersecurity experts say that Chinese hackers have invaded Hollywood’s computers, much like they did to the systems of Facebook, Apple, The New York Times and many others. The root of the problem, according to The Hollywood Reporter, is China’s contempt for intellectual property. In a country where most video and software is pirated, the culture of copying runs deep. Continue reading China Hacking Hollywood Computers, Say Security Experts
At TED 2013 last week, Danny Hillis, an early Internet user who registered the third domain name ever (Think.com), spoke on the vulnerability of the expanding Internet. While standing on stage for his talk, he held up a one-inch-thick notebook, which listed every person — including name, address and phone number — who had an Internet address in 1982. By his estimates, that book would be 25 miles tall in today’s world. Continue reading Danny Hillis Asks: What Happens if the Internet Goes Down?
Samsung Electronics has another target in its ever-growing sights: the BlackBerry. Until recently, Samsung has marketed its smartphones very successfully to consumers worldwide, but never to businesses. That’s been changing over the past year, as the South Korean manufacturer has been beefing up the Google Android software that runs its phones, in an effort to give businesses a phone with increased security. Continue reading Samsung Preps Android to Take On BlackBerry in Enterprise
By
emeadowsFebruary 21, 2013
After U.S. computer-security firm Mandiant Corp. accused China of stealing large swaths of data from U.S. companies, China flatly denied the accusation. In a 74-page report, the firm claims a group attached to China’s People’s Liberation Army stole data from 141 companies since 2006, 115 of which were in the U.S., spanning industries like information technology, telecommunications, aerospace and energy. Continue reading China Denies Cyberattack Allegations from Mandiant Report
By
emeadowsFebruary 19, 2013
After Congress reintroduced the controversial Cyber Intelligence Sharing and Protection Act (CISPA), a collection of Internet freedom activists quickly jumped into action. “Among them have been Demand Progress and Fight for the Future, who this week helped 300,000 citizens send a petition against CISPA to the lawmakers behind it,” reports Mashable. Continue reading CISPA Reintroduced: Activist Groups Fuel Online Response
By
David TobiaFebruary 5, 2013
Hackers have carried out a sophisticated attack on Twitter, prompting the company to release a statement explaining how its “investigation has thus far indicated that the attackers may have had access to limited user information — usernames, email addresses, session tokens and encrypted/salted versions of passwords — for approximately 250,000 users.” The nature of the attack suggests it could be part of a larger effort. Continue reading Twitter Hacked: 250,000 Users Affected by Recent Attack
By
David TobiaJanuary 31, 2013
Computer security firm Rapid7 has discovered and outlined three sets of security flaws in Universal Plug and Play (UPnP), a component that allows devices to connect and communicate on networks. “The flaws would allow hackers to steal passwords and documents or take remote control of webcams, printers, security systems, and other devices that are connected to the Internet,” reports Wired. Continue reading Rapid7 Uncovers Shocking Flaws in Universal Plug and Play
By
ETCentricJanuary 17, 2013
The “Internet of Things” has arrived and companies across multiple industries are developing means of linking smartphones, vehicles, household appliances and more to industrial-strength sensors, the Internet and each other. Wired notes that while it may seem to be resulting in somewhat mundane technical features as of now, “the potential benefits to lifestyles and businesses are huge” — in both good and bad ways. Continue reading Internet Of Things Has Arrived, So Have Security Concerns