Cybersecurity

SPOTLIGHT ON SECURITY

Insurance Industry Buzzes Over Data Breach Ruling

If the rash of data breaches in recent months has done anything for businesses, it's raised their awareness of cyber liability insurance. The market for cyber liability insurance is expected to increase dramatically as businesses become more aware that their current policies don't adequately cover c...

Viber on Tuesday announced that it has begun rolling out end-to-end encryption across all devices for the 711 million users of its messaging app. Users have to download Viber version 6.0 or higher. The app offers stronger security in every voice or video call, message, video and photo, in both group...

MIT researchers have developed a fast, accurate system for identifying security flaws in Web apps written in Ruby on Rails, according to news reports published last week. In tests the researchers -- MIT Professor Daniel Jackson and Joseph Near, a postdoctoral researcher at the University of Californ...

An international team of cybersecurity experts hacked into an iPhone loaned to a U.S. congressman who sits on a key technology committee, in a 60 Minutes demonstration of how easy it is for a criminal to spy on callers by exploiting an international mobile phone network vulnerability. The hackers we...

The U.S. Department of Homeland Security on Thursday issued a warning to remove Apple's QuickTime for Windows. The alert came in response to Trend Micro's report of two security flaws in the software, which will never be patched because Apple has ended support for QuickTime for Windows. Computers ru...

SPOTLIGHT ON SECURITY

E2E Encryption Could Make WhatsApp a Spam Magnet

Facebook's WhatsApp last week announced it would roll out end-to-end encryption for its users to better protect their privacy, but the move could make the service more attractive to spammers, too. While encryption can safeguard information from data thieves, it also can block data protectors from de...

It appears that the Obama administration will refrain from giving its outspoken support to any legislation that aims to compel high-tech companies to help law enforcement agencies crack mobile phone encryption. On the other hand, it won't level any outspoken opposition either. Introduction of such...

Vivaldi on Wednesday launched the first release of its eponymously named browser. Vivaldi is the brainchild of CEO Jon von Tetzchner, a cofounder of Opera Software. Aimed at the power user, Vivaldi 1.0 packs in features that were stripped out of Opera 12. However, "Vivaldi is not about a single feat...

SPOTLIGHT ON SECURITY

Apple, FBI Tussle Puts Bull’s-Eye on iPhone

The battle between the FBI and Apple over access to the iPhone of San Bernardino, California, killer Syed Farook came to an abrupt end last week when the agency announced it no longer needed the company's assistance to crack the device. Since the U.S. Department of Justice delayed a hearing on an or...

WhatsApp on Tuesday told its 1 billion users that their communications would be better protected from prying eyes with end-to-end encryption. The company always has made data and communication security a priority, according to Jan Koum and Brian Acton, the founders of WhatsApp, which Facebook bought...

IBM last week announced that Lawrence Livermore National Laboratory has purchased its TrueNorth processor-based cognitive computing platform. The purchase included an end-to-end ecosystem and a multisocket host node. The lab will build a supercomputer based on the platform to see how neural networks...

Despite its computer systems being infected with malware since Monday, MedStar Health, which operates 10 hospitals and more than 250 outpatient facilities in and around Washington, D.C., has continued to provide patient care at near normal levels, according to several updates released this week. Sin...

SPOTLIGHT ON SECURITY

Firm Wins Patent for Novel Way to Detect Spearphishing

Hackers in recent weeks have stepped up their efforts to steal employee tax information from companies in all kinds of industries. Typically, the information contained on IRS form W-2 is used to file false tax returns or steal someone's identity. The situation has become so bad that the IRS earlier ...

Technewsworld Channels