Month: October 2018

On Tuesday, Oct. 16, the National Institute of Standards and Technology (NIST) held its “Kicking off the NIST Privacy Framework: Workshop #1” in Austin, Texas. I was honored to be asked to participate. This was the first in a series of public workshops focusing on the development of a useful and voluntary Privacy Framework, like
In his keynote speech at the Securing the Enterprise 2018 conference in Cambridge, MA, BT Security president Mark Hughes said that when it comes to the threats enterprises and government are facing, the global network is telling us that old strategies don’t work. In the face of ongoing cyber-attacks, mounting privacy concerns and daily data
Apple introduces a new privacy feature for all new MacBooks that “at some extent” will prevent hackers and malicious applications from eavesdropping on your conversations. Apple’s custom T2 security chip in the latest MacBooks includes a new hardware feature that physically disconnects the MacBook’s built-in microphone whenever the user closes the lid, the company revealed
Apple’s ideal display size is everywhere and everything Lucas Matney 7 hours Everything is already big. The iPhone SE died. The iPad Mini was last upgraded in 2015. The 11-inch MacBook Air died years ago. The smaller Series 4 Apple Watch has a bigger display than the larger Series 3 Apple Watch. Apple’s smallest devices
A new technique to escape malware detection has been used in a malicious campaign targeting smartphones, according to The Media Trust. In today’s blog post, Michael Bittner, digital security and operations manager at The Media Trust, revealed that the campaign involved third-party code that enabled smart malware delivery. The malware, dubbed JuiceChecker-3PC by The Media
iHeartMedia announced today that its streaming radio app iHeartRadio is coming to Mexico. In fact, a beta version of the app is already live, with plans for an official launch on November 3. As part of this launch, the company is partnering with Mexican broadcaster Grupo ACIR, which owns the Amor, Mix and La Comadre
Introduction Windows 10 is the most used OS for desktops in the world, so it’s a big target for hackers. IT professionals should get to know all the Windows 10 security tools they have at their disposal so they can protect users’ desktops. Options include native Windows 10 security tools and utilities such as Microsoft
In what it is calling the “most significant tech acquisition of 2018,” IBM announced today that it will acquire Red Hat, a global provider of open source cloud software. The two companies have finalized an agreement subject to Red Hat shareholder and regulatory approvals, which is expected to close in late 2019. According to IBM,
At a price typically reserved for semiconductor companies, telecoms, and pharmaceutical giants, IBM announced today it would pay a record $34 billion in cash and debt to acquire enterprise open source provider Red Hat. Eclipsing Microsoft’s $26.2 billion acquisition of LinkedIn, this is the biggest software acquisition in history. It’s not the biggest tech acquisition
The McAfee Mobile Research team recently found an active phishing campaign using text messages (SMS) that tricks users into downloading and installing a fake voice-message app which allows cybercriminals to use infected devices as network proxies without users’ knowledge. If the fake application is installed, a background service starts a Socks proxy that redirects all
Following reports that Chinese spies infiltrated the supply chain of servers assembled by Supermicro Computers Inc., the New York–based CYBERGYM has launched a new infrastructure-security combat training program. Driven by the belief that threats posed by these types of supply chain and infrastructure hacks are significant, CYBERGYM said it developed the training to help organizations
A security researcher with Twitter alias SandboxEscaper—who two months ago publicly dropped a zero-day exploit for Microsoft Windows Task Scheduler—has yesterday released another proof-of-concept exploit for a new Windows zero-day vulnerability. SandboxEscaper posted a link to a Github page hosting a proof-of-concept (PoC) exploit for the vulnerability that appears to be a privilege escalation flaw
There’s some turmoil brewing over at Miami-based facial recognition startup Kairos. Late last month, New World Angels President and Kairos board chairperson Steve O’Hara sent a letter to Kairos founder Brian Brackeen notifying him of his termination from the role of chief executive officer. The termination letter cited willful misconduct as the cause for Brackeen’s
As concern over medical device cybersecurity grows, the U.S. Food and Drug Administration has taken additional steps to help hospitals get in front of the issue, an action commended by one medical device company CEO. The FDA recently announced efforts to strengthen the agency’s medical device cybersecurity program to help device manufacturers identify security vulnerabilities