It's a time-honored tradition: U.S. businesses find ways to skirt inconvenient or expensive laws by moving operations to other countries. Thus we have had U.S. corporations operating overseas to exploit child labor, run sweatshops or avoid taxes and rigorous health and safety inspections. Now the U.S. government says something similar is happening in regards to email.
By Evan Schuman | 18 March, 2015 01:56
Though she may have broken no laws, Hillary Clinton acted irresponsibly in using a personal email account to conduct official U.S. government business in her capacity as secretary of State.
By Kenneth van Wyk | 13 March, 2015 08:01
Having been at my new company for several months now, this week I was invited to inform executive management about the state of our security. I had half an hour to formally introduce myself and talk about my philosophy, my initial findings and the priorities I think we need to have.
By By Mathias Thurman | 11 March, 2015 03:46
Lenovo pre-installing Superfish software was a security disaster. Whether Lenovo was evil, or, as they eventually claimed, merely incompetent, it's hard to trust them going forward. If nothing else, their initial denials that anything was wrong, leave a lasting impression. Of course, Superfish, along with the software that they bundled from Komodia, also deserve plenty of blame for breaking the security of HTTPS and SSL/TLS.
By Michael Horowitz | 10 March, 2015 00:07
Several electronic and mobile payment options have become available, but most of us in the U.S. are still using plain-vanilla credit and debit cards with magnetic stripes. They use technology that dates to the first Nixon administration. That's not a problem in itself; I have no problem with time-tested security measures that work effectively. But just look around: Data breaches are everywhere, and those magnetic-stripe cards are often implicated.
By Kenneth van Wyk | 27 February, 2015 03:07
As the White House and Congress consider new cybersecurity legislation, some middle-market companies may still be questioning whether the cybersecurity crisis is a real threat for their businesses.
By By Matthew F. Prewitt | 17 February, 2015 21:08
Sometimes I wonder whether any company will ever fall victim to an unsophisticated cyberattack. Because after every attack that comes to light, we hear that same excuse: It was a sophisticated attack.
By Ira Winkler | 11 February, 2015 03:26
The downside of email, chat, text and messaging apps is that they make you feel like you're communicating privately, with only the intended recipients. And that your messages are private. Until they're not.
By Mike Elgan | 07 February, 2015 23:07
By Evan Schuman | 06 February, 2015 06:08
Thank goodness for that signature on the back of my credit card. If it weren't for that smudged scrawl, a thief might steal my card (or card number) and make fraudulent purchases. Or steal my identity. Right.
By By Bret Swanson | 05 February, 2015 02:05
When Amazon unveiled its cloud-based corporate WorkMail email offering last week (Jan. 28), it stressed the high-level of encryption it would use and the fact that corporate users would control their own decryption keys. But Amazon neglected to mention that it will retain full access to those messages -- along with the ability to both analyze data for e-commerce marketing and to give data to law enforcement should subpoenas show up.
By Evan Schuman | 03 February, 2015 20:07
Federal regulators have been throwing their weight around lately, and mostly to good effect for consumers and users of mobile technology.
By Mike Elgan | 03 February, 2015 01:24
If you tuned into Parks And Recreation Tuesday night, you were treated to an episode where social media startup Gryzzl attempts to win over the hearts and minds of its new neighbors in the fictional town of Pawnee with boxes full of gifts, delivered via Amazon-esque drones.
By Matt Weinberger | 29 January, 2015 09:04
January 2015 is already winding down, but it's not too late to think about the lessons of 2014. For anyone in information security, 2014 was a year marked by spectacular breaches. It ended with Sony Pictures Entertainment getting its clock cleaned by hackers, quite possibly from North Korea. Wouldn't it be great if 2015 doesn't include the same sort of clock cleaning at your company?
By By Kenneth van Wyk | 27 January, 2015 02:28
In the last few weeks it's possible some of your Facebook chums posted messages on their walls in which they tried to revoke permission for the social network to use and distribute content they post.
By Jonny Evans | 22 January, 2015 13:58
So who was really behind the Sony hack? And does it really matter?
By By Ira Winkler and Araceli Treu Gomes | 15 January, 2015 03:07
An Internet joke that goes back at least to the early 1980s consists entirely of the phrase: "Imminent Death of the Net Predicted!" Every year, even more often than you'd hear "This will be the year of the Linux desktop!" someone would predict that the Internet was going to go to hell in a handbasket -- and nothing happened. This year it's my turn, but I fear I'm going to be proved right.
By Steven J. Vaughan-Nichols | 09 January, 2015 07:26
Over the last couple of weeks, I have read numerous news stories about the widely publicized security breaches at Sony and JPMorgan Chase. It seems as if everybody is a Monday-morning quarterback, with every other reporter voicing an opinion on how these breaches should have been prevented. In particular, I read two articles that specifically blamed the information security organizations at those companies for failing to properly stop the attackers. That's not fair.
By By J.F. Rice | 08 January, 2015 01:23
Well that stinks, doesn't it? Sony Pictures goes and scrubs the launch of a $44 million movie after being hacked, potentially by North Korea. Almost reads more like a James Bond plot than a news story, but there it is. And this time, it doesn't seem likely that Bond, James Bond, is going to show up at the eleventh hour to save the day.
By By Kenneth van Wyk | 20 December, 2014 06:09
Maybe I should be outraged by Sony's decision not to distribute the movie The Interview, but I am merely saddened by it. I am saddened that a hacking incident with all the hallmarks of a simple case of extortion has been distorted so it looks like a terrorist threat.
By Ira Winkler | 20 December, 2014 05:58
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
- CCMobile Designer / Developer - IOSNSW
- CCMobile iOS DeveloperNSW
- CCMobile Designer / Developer - IOSNSW
- FTSenior SQL DBANSW
- CCFront End Web Developer (Drupal)NSW
- CCDBA (Oracle/SQL)NSW
- FTJunior Media Buyer - Sales CoordinatorNSW
- FT.Net Solution ArchitectNSW
- FTBusiness Management - Account Director - Leading Entertainment ClientNSW
- CC.Net Solution ArchitectNSW
- CCSenior Systems EngineerNSW
- FTApplication Support SpecialistNSW
- CCSenior Release EngineerNSW
Bolstered by favorable economics, today’s global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously. This DDoS threat spectrum includes conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
- French self-driving car goes for a spin around Paris monument
- Google to bring imaging, sensor technology to the operating room
- 5 freshly-funded cloud computing companies worth watching
- Why Meerkat and Periscope are the next big challenge for marketers
- USB Type-C peripherals are on the way, and storage devices are first up
- Microsoft should forget the Surface, stick to the Pro 2-in-1 line
- Slack hacked, compromising users' profile data
- Congress moves quickly on cyberthreat information sharing
- New mobile-malware detection technique uses gestures
- Google Cloud Launcher deploys VM-based apps in a snap
- Apple Watch mini-stores to open in London, Paris, Tokyo luxury retail shops
- BlackBerry posts second straight earnings gain
- Safari users in the UK can sue Google over alleged privacy violations
- BlackBerry shocks with Q4 profit but CEO Chen can't stop sales slide
- Startup takes the effort out of endpoint detection and response