Cybersecurity

As consumers start to tackle their holiday shopping lists, retailers are scrambling to finish preparations for what's likely to be a record-breaking year. Total sales could break through the $1.1 trillion mark for the first time in history. Cyber Monday alone racked up an estimated $9.4 billion in s...

The technology one-upmanship between the United States and China is fast becoming the new space race. There's been a lot of talk in the press about the competition to reach 5G, but little traction outside of the tech community about something more momentous: the dangers of computing in a post-quantu...

OPINION

Consider Service Mesh as a Security Tool

If you're like most security pros, chances are pretty good that you're starting to get frustrated with microservices a little bit, or maybe a lot. Microservice architectures -- that is, architectures that leverage REST to build a number of small, distributed, modular components -- are powerful from...

EXPERT ADVICE

Windows 7 End of Life

Microsoft will end support for the Windows 7 operating system on Jan. 14, 2020. Windows 7 will continue to run on Jan. 14 as it did on Jan. 13. So why is it so important to upgrade to Windows 10? The answer: cybercrime. End of support means that Windows 7 no longer will receive the OS patches or sec...

EXPERT ADVICE

The Thorny Problem of 5G Security

There is obviously a geopolitical aspect to 5G security, but it is not the full story by any means. Fundamentally, security for 5G is important now because 5G is going to become essential to many more parts of our lives.

We're just a few short months away from the California Consumer Privacy Act going into effect. The regulation brings privacy rights to residents in California and gives them control of their personal information and how companies can use it. Any business that sells to a California resident needs to ...

University researchers have delivered unauthorized commands to digital assistants like Alexa, Google Assistant, Facebook Portal and Siri using laser beams. The microphones in devices like smart speakers, mobile phones and tablets convert sound into electrical signals, but what the researchers found ...

Flaws in Amazon and Google smart speakers can expose users to eavesdropping and voice phishing. Researchers at Security Research Labs discovered that developers could create malicious apps for the Amazon and Google platforms to turn the smart speakers into smart spies. Using the standard development...

As part of National Cyber Security Awareness Month, the National Cyber Security Alliance is advising all computer users to "Protect IT" by taking precautions such as updating to the latest security software, Web browser and operating system. The nonprofit public-private partnership, which works with...

Developers have patched a vulnerability in Sudo, a core command utility for Linux, that could allow a user to execute commands as a root user even if that root access was specifically disallowed. The patch prevents potential serious consequences within Linux systems. However, the Sudo vulnerability ...

Online tech support scams have been on the rise for the past decade, as hackers found new ways to trick consumers into providing remote access to their computers in order to steal information. This tried-and-true scam currently relies on sophisticated social engineering, fueled by detailed user info...

Since the dawn of the Internet age, criminals have looked for ways to profit on unsuspecting people while they browse the Web. Viruses, malware and other schemes were invented to infect and infiltrate systems, both at the enterprise and consumer levels. One of the most successful forms of cybercrime...

Stopping cyberattacks requires diligent behavior. One of the themes of this year's National Cyber Security Awareness Month, or NCSAM, is that all computer users should take steps to Secure IT. That means shaking up the passphrase protocol by using not just strong passwords but strong and unique pass...

ANALYSIS

Tackling Economic Security Governance

If you've ever played chess, you know that each move you make has to be the best move. At one level, this is painfully obvious -- after all, who would choose to make a terrible move instead of a better one? -- but it's illustrative of an important concept. Specifically, the core reason it's true is...

Technewsworld Channels