Quantcast
Channel: InfoWorld Tim Greene
Browsing all 79 articles
Browse latest View live

FBI director renews push for back doors, urging vendors to change business...

The FBI still wants backdoors into encrypted communications, it just doesn't want to call them backdoors and it doesn't want to dictate what they should look like.FBI Director James Comey told the...

View Article


Acts of terrorism could push Congress toward encryption backdoors in 2016

Despite the risks to online commerce, international high-tech sales, security of trade secrets and the fact that it won't actually make encryption useless to criminals, decryption backdoors to let law...

View Article


Image may be NSFW.
Clik here to view.

10 amazing algorithms for the real world

Figuring out mysteriesImage by FlickrCyber technology couldn’t get by without algorithms to encrypt, analyze metadata, and find traffic anomalies, but they are used more and more widely in other...

View Article

Microsoft, Google, Facebook to U.K.: Don't weaken encryption

Microsoft, Google and Facebook are urging U.K. officials not to undermine encryption as they work on laws that would authorize forcing communications service providers to decrypt customer traffic.In a...

View Article

Startup's security platform uses AI to to learn from human decision making

Startup PatternEx with roots in MIT’s artificial intelligence lab is launching a security platform it says employs artificial intelligence by learning from input it gets from human security analysts...

View Article


Image may be NSFW.
Clik here to view.

8 hot technologies the CIA wants

Of interest to the CIAThe CIA has been investing in startups since 1999 through its not-for-profit arm called In-Q-Tel, hoping to accelerate development of technologies the agency might find useful. It...

View Article

Report: Hacker steals, posts personal details on 9,000 DHS employees

A hacker posted the names, phone numbers, and other details about 9,000 Department of Homeland Security employees and says he will post 20,000 similar records about FBI workers. He claims to have...

View Article

Image may be NSFW.
Clik here to view.

Bill in Congress would ban states from seeking encryption backdoors

Four Congressmen are proposing that states be forbidden to ask manufacturers to install encryption backdoors on their products outfitted with the technology. U.S. Rep. Ted Lieu The four filed a short...

View Article


Startup touts four-factor authentication for VIP-level access

Startup Trusona is launching what it claims to be a 100 percent accurate authentication scheme aimed at corporate executives, premiere banking customers and IT admins who have unfettered authorization...

View Article


FBI is helping to crack an iPhone in an Arkansas murder case

Now that it has found a way to do so for its own purposes in a California terrorism case, the FBI is helping Arkansas prosecutors break into an iPhone and iPad.This time it's to look for evidence in a...

View Article

Senators release official draft of federal encryption legislation

The first proposed federal encryption legislation has been released, and had it been established law earlier this year Apple would have had to provide the help the FBI asked for in accessing encrypted...

View Article

U.S. cyberwar against ISIS could use methods and tactics criminals use...

Cyberwar against ISIS could bring into play tools and tactics that corporate security pros face every day, only this time they will be used as part of a larger objective than criminal profit.The goals...

View Article

Trend Micro: 6 most popular homebrewed terrorist tools

Terrorists are developing and distributing encryption tools that protect privacy of their communications, as well as other homegrown apps that include a news-feed compiler and DDoS attack software,...

View Article


Black Hat: 9 free security tools for defense and attacking

When Black Hat convenes next week in Las Vegas, it will be a rich environment for gathering tools that can be used to tighten security but also -- in the wrong hands -- to carry out...

View Article

Largest DDoS attack ever delivered by botnet of hijacked IoT devices

Securing the internet of things should become a major priority now that an army of compromised devices – perhaps 1 million strong - has swamped one of the industry’s top distributed denial-of-service...

View Article


Security blogger Krebs says IoT DDoS attack was payback for a blog

Security blogger Brian Krebs says a massive distributed denial-of-service attack that took down his website last week was likely the consequences for his outing of two Israelis who ran a DDoS-for-hire...

View Article

Akamai warns: Look for IoT devices to attack during Thanksgiving, Christmas

The annual holiday uptick in denial of service attacks will likely continue this year only this time with a new devastating weapon: Internet of Things (IoT) devices, according to Akamai.In its...

View Article


IBM sets up test range to practice fighting cybersecurity battles

IBM Security has launched a network-emulation environment where corporate teams can play out attack scenarios so they are better prepared for incidents they might face in the real world.The facility,...

View Article

Cisco scrambling to fix a remote code execution problem in WebEx

Cisco’s Webex Browser Extension contain a critical bug that can open up customers’ entire computers to remote code execution attacks if the browsers visit websites containing specially crafted...

View Article

That Hearbleed problem may be more pervasive than you think

 That lingering Hearbleed flaw recently discovered in 200,000 devices is more insidious than that number indicates.According to a report posted by Shodan, the Heartbleed vulnerability first exposed in...

View Article
Browsing all 79 articles
Browse latest View live