Cybersecurity

The National Institute of Standards and Technology on Wednesday released a preliminary cybersecurity framework for improving the cybersecurity of the United States' critical infrastructure. The Institute will soon open a 45-day public comment period on the framework, seeking input from reviewers on ...

German telecommunications companies are marketing email services as being National Security Agency-proof, a potentially fruitful ploy in a country where a past marred by sinister data collection has left people yearning for privacy. Deutsche Telekom recently announced plans for a national internal n...

Strong encryption and natural language search can be like oil and water. That's because encrypted data can't be digested by your typical search engine. However, CipherCloud announced a solution to that knotty problem last week. The latest version of the 3-year-old company's cloud-based service inclu...

Germany's antitrust watchdog said Amazon is undermining competition with its rules for third-party merchants and threatened to impose reforms if Amazon doesn't change its ways. The watchdog complains that Amazon's Marketplace obstructs competition, a term that in Germany and Europe refers less to wh...

Tech billionaire Pierre M. Omidyar, founder and chair of eBay, will team up with Guardian columnist Glenn Greenwald -- the first to open Edward Snowden's treasure chest of leaks -- to launch a mass media venture designed to foster top-flight journalism. Omidyar has long supported journalism. He has ...

The Freedom of the Press Foundation said Tuesday that it would be taking charge of Aaron Swartz's DeadDrop project to protect whistleblowers leaking confidential documents to journalists. FPF will provide in-site installation of the technology, renamed "SecureDrop," as well as support for news organ...

The latest revelations by former U.S. intelligence contractor Edward Snowden show the NSA is spying on Americans, despite repeated government assurances that it does not do so. The agency reportedly is collecting hundreds of millions of electronic address books and contact lists from people worldwid...

The National Security Agency tried to crack the encryption protecting the Tor network -- known as a bulletproof vehicle for anonymous communication -- but was unable to do so, according to news reports based on revelations provided by former NSA systems administrator Edward Snowden. Undaunted, the a...

Adobe on Thursday announced what has become depressingly familiar news to consumers and security experts: It has been hacked, and on a large scale. "Very recently, Adobe's security team discovered sophisticated attacks on our network, involving the illegal access of customer information as well as s...

Symantec has removed more than 500,000 infected PCs from the botnet created by the ZeroAccess Trojan. ZeroAccess uses a peer-to-peer mechanism. It is the latest technique botnet authors have adopted to avoid having their networks taken down by security experts. Symantec used a DNS sinkhole to fight ...

SPOTLIGHT ON SECURITY

Reengineering Human Behavior Can Foil Phishing

Almost all cyberattacks these days require an element of social engineering. Spammers are always looking for that hot button to induce a click on a link or an attachment. Drive-by artists continually experiment with poisoned banner ads designed to steer the curious into an online dark alley. Spearph...

TECH TREK

Brazilian Prez Rebukes US Over NSA

Brazilian President Dilma Rousseff gave a speech in which she -- well, maybe it's best to just let her say it. "What we have before us, Mr. President, is a serious case of violation of human rights and civil liberties," Rousseff said, addressing the UN General Assembly mere moments before President...

The Chaos Computing Club, a group of German hackers, claimed to have cracked Apple's new iPhone fingerprint scanner. The scanner is one of the distinguishing features of Apple's new iPhone 5S. It was not immediately clear whether CCC's claims were true, but two prominent iPhone security experts repo...

SPOTLIGHT ON SECURITY

BYOD Security Is All About Juggling Risks

Allowing workers to use personal phones and tablets to do their jobs has created security risks in the workplace, but those risks can be minimized if they're managed. What should such a risk management program do? "The first step is you have to protect the device," said IBM Application, Data and Mob...

RSA has advised its customers to make a configuration adjustment to its BSafe security software products. This follows an announcement issued by NIST not to use a security standard it designed and published: the Dual Elliptic Curve Deterministic Random Bit Generator. The Dual_EC_DRBG is believed to ...

Technewsworld Channels