Random Post

Wednesday, July 23, 2014
no image
A failure to communicate between security pros and company brass may be contributing to the inability of a significant number of organizations to reduce the risk of cyberattacks on their systems. That was one of the findings last week in a study conducted by the Ponemon Institute and sponsored by Websense. Thirty-one percent of the nearly 5,000 respondents surveyed for the study said their cybersecurity team never met with the executive team about cybersecurity.


7:33 AM

A failure to communicate between security pros and company brass may be contributing to the inability of a significant number of organizat...

Read more »
Tuesday, July 22, 2014
no image
The Tor Project is working to remedy a vulnerability in its anonymity software following the sudden cancellation of a talk at next month's Black Hat security conference in Las Vegas that would have revealed it. The planned talk, entitled "You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget," would have demonstrated a way to unmask users of Tor, the privacy-minded Web browsing software. Carnegie Mellon University researcher Alexander Volynkin was to deliver the briefing.


4:18 PM

The Tor Project is working to remedy a vulnerability in its anonymity software following the sudden cancellation of a talk at next month...

Read more »
no image
Nvidia is expanding its Shield line of gaming products with the launch of a gaming tablet and accompanying wireless controller. Designed for high performance, the tablet is powered by Nvidia's Tegra K1 processor, which includes 192 graphics processing unit cores. It will be frequently updated with software updates designed to draw stronger performance and additional capabilities from the hardware. The tablet follows on from the release last year of the Shield Portable handheld device.


1:01 PM

Nvidia is expanding its Shield line of gaming products with the launch of a gaming tablet and accompanying wireless controller. Designed f...

Read more »
no image
The long-held belief that Android is the least secure of mobile OSes was shattered by security researcher and expert iOS hacker Jonathan Zdziarski over the weekend. He unveiled a host of iOS vulnerabilities, the scope of which was staggering: undocumented services that bypass backup encryption and can be accessed both via USB and wirelessly; a means to access all data encrypted with data protection if the device has not been rebooted since the user's PIN was last entered; and a packet sniffer that can be monitored remotely over WiFi.


11:55 AM

The long-held belief that Android is the least secure of mobile OSes was shattered by security researcher and expert iOS hacker Jonathan Z...

Read more »
no image
Microsoft last week announced a large staff reduction tied to the acquisition of Nokia. There is actually a science to how to make layoffs, but much of that appears to have been lost over the last couple of decades. I have some theories as to why -- I blame the Democrats and financial analysts -- but how you carry out job cuts actually is very important, and it reflects how well the CEO understands people, which I think is a critical skill. In the context of Microsoft's layoffs, I'll offer a layoff primer this week.


6:56 AM

Microsoft last week announced a large staff reduction tied to the acquisition of Nokia. There is actually a science to how to make layoffs...

Read more »
no image
Startup GoTenna has launched its eponymously named device, which lets users communicate without the need for a cell tower. "This is an interesting concept," said tech analyst Jim McGregor. "It's like a walkie-talkie on steroids." The device uses BlueTooth LE to pair with a user's smartphone. It can exchange text messages only with another GoTenna. The GoTenna's use is further limited because it encrypts messages with the RSA 1024 public/private key encryption, which means only a GoTenna that has the decryption key can read the message.


5:14 AM

Startup GoTenna has launched its eponymously named device, which lets users communicate without the need for a cell tower. "This is a...

Read more »
Monday, July 21, 2014
no image
Concerns about overly broad searches of digital data by law enforcement once again have emerged after a federal judge ruled that officials armed with a warrant can seize and hold a suspect's entire email account. Such an action would not violate the suspect's rights under the Fourth Amendment of the Constitution, said U.S. Magistrate Judge Gabriel Gorenstein in support of a warrant he issued earlier this month. One worry is that police could retain email accounts and search them repeatedly, said ACLU staff attorney Nate Wessler.


4:51 PM

Concerns about overly broad searches of digital data by law enforcement once again have emerged after a federal judge ruled that officials...

Read more »
 
Google Analytics Alternative