Digital Experience: All eyes on cybersecurity solutions

New York’s plan to ramp up cybersecurity fit in with the overall tone of last night’s Pepcom Digital Experience event, held at the Metropolitan Pavilion in the city, proving that businesses are innovating on all security fronts. Whether it’s a device to protect hackers from getting into your devices, or it’s software to safeguard your … continue reading

Check Point discovers new attack vector through media player subtitles

Malicious hackers will find any way to deliver a cyberattack. This week, Check Point Software researchers discovered a new method for perpetrators, one which is threatening millions of users: Attacking by subtitles. According to Check Point’s research, the new possible attack vector delivers the cyberattack through movie subtitles that are loaded by the user’s media … continue reading

What is the WannaCry ransomware, and why should organizations be concerned?

There’s a new ransomware attack that has affected several organizations globally, and although it’s slow-moving, security experts are urging companies to keep their antivirus programs up-to-date, as well as their software. The ransomware — dubbed WannaCry (WanaCrypt0r 2.0/WCry) — has hit Britain’s National Health Service, some of Spain’s big companies, and has spread across Russia, … continue reading

MIT CSAIL’s WiGait, Check Point discovers OSX/Dok malware, and Apple suggests self-driving changes to Calif. DMV — SD Times news digest: May 1, 2017

Researchers from MIT CSAIL have been working on a system called WiGait, which accurately monitors walking speed in a way that is both continuous and unobtrusive. The researchers’ paper presented the device, saying it measures the walking speed of multiple people, with 95 to 99 percent accuracy using wireless signals. Professor Dina Katabi at MIT’s CSAIL says … continue reading

Black Duck audit highlights risk of open-source security vulnerabilities

Black Duck, a company that serves up information about the latest security vulnerabilities on open source components, released its 2017 Open Source Security and Risk Analysis (OSSRA) today. The OSSRA revealed significant risks related to open-source vulnerabilities and license-compliance challenges, as well as high levels of risk in the retail and ecommerce industry. According to … continue reading

man on a computer

Free learning resources and tools for security savvy developers

Developers will never be responsible for all of security in an organization, but if they keep up with best practices, resources, and find new ways to secure and deliver good code, they could play a key role in developing resilient software. Today, most firms have a software security group (or SSG) or a product security … continue reading

Senate lawmaker asks FTC for answers on recent children’s IoT breaches

Recent data breaches involving children’s Internet-connected toys pushed U.S. Sen. Bill Nelson to write a letter to the Federal Trade Commission (FTC), detailing what steps it’s taken to protect the personal data of the children using such toys. This isn’t the first letter Nelson, a Democrat from Florida, has written in response to security breaches. … continue reading

Apple iOS 10.3: APFS implementation, developer improvements, and security updates

Apple has announced iOS 10.3 with the highly requested “Find my AirPods” feature, new Apple File System (APFS) implementation, and a number of developer improvements. Other enhancements include bug fixes and touch ID authentication for its Numbers, Pages, and Keynote productivity apps. The latest version of the mobile operating system went through seven beta versions … continue reading

Security Playbook 2017: How to improve practices this year

From LinkedIn to Yahoo, companies fell into the hands of hackers and identity thieves in 2016. Each year, companies seem to make the same security resolutions, only to face roadblocks like skill shortages, time constraints and budget issues, which prevent them from implementing good security practices. Experts recommended companies consider the following trends and predictions … continue reading

How to keep kids safe from unsecure IoT devices and toys

The world of Internet-connected devices targeted at children is a magical one. Toy dinosaurs can learn and communicate with a growing child, teddy bears can transmit messages overseas to military parents, and talking dolls can communicate with children via speech recognition software. But this connectedness comes with a price. Recent hacks on IoT toys are … continue reading

Report: Organizations embracing DevSecOps automation

The DevOps community is struggling with bringing security into the organization and across the software development life cycle (SDLC). However, new research from Sonatype reveals that while companies continue to face breaches, mature development organizations finally realize how critical it is to weave automated security early in the SDLC. Sonatype, a software automation and security … continue reading

Google introduces invisible reCAPTCHA, beta launch of Cloud Functions for Firebase, and Kaggle joins Google Cloud—SD Times news digest: March 10, 2017

Google is taking reCAPTCHA one step further by making it invisible. Now, human users will be let through without seeing the “I’m not a robot” checkbox, and bot and suspicious users will have to solve challenges that use Google’s risk analysis algorithms. The advantage of reCAPTCHA is its enhanced security, according to Google. It’s a … continue reading

Next Page »
HTML Snippets Powered By : XYZScripts.com