Mergers and acquisitions in the first six months of this year grew by 3% over the last six months of last year, according to a new study by mid-market investment bank Berkery Noyes. That’s a positive sign that investment in the technology sector remains strong. In fact, beginning from the last six months of 2013, … continue reading
Call it the digital sword of Damocles: Like some torturous situation out of an Edgar Allan Poe story, the entire world’s population of Android users is currently waiting with baited breath for Joshua Drake (Jduck) to release his claimed super exploit for Android. The famous security researcher claims his exploit can take advantage of 95% … continue reading
It’s that time of year again: Black Hat and Defcon are upon us! That means your systems are all in danger, and your applications should be afraid. Not only will there be (and has already been) an endless stream of new exploits dropped at the shows, but the weekend of Defcon is, effectively, open season … continue reading
Samsung open-source JavaScript Internet of Things engine Samsung has open-sourced JerryScript, a JavaScript engine for the Internet of Things. JerryScript is designed to run on microcontrollers and other Internet of Things devices with constrained RAM and ROM space. The engine supports on-device code compilation and execution, and provides access to peripherals from JavaScript. The project … continue reading
Honda has unveiled its 2016 Accord featuring both Android Auto and Apple CarPlay interface functionality. Honda becomes the first auto manufacturer to roll out a connected vehicle supporting both Apple and Google’s automotive operating systems synced with an Android or iOS device. Android Auto offers 2016 Accord drivers features such as Google Maps, Google Now, … continue reading
Google security researchers say “non-expert” Web users overlook software updates—the “seatbelts of online security” as a best practice, along with other misconceptions about safe Web habits. Google researchers have published the results of two surveys, one with 231 security experts and another with 294 Web users, asking respondents what practices they took to keep their … continue reading
The NSA is getting into open source with the System Integrity Management Platform (SIMP), a cybersecurity tool for the masses. From the National Security Agency, the governmental organization that brought you PRISM and the arsenal of surveillance tools leaked in the Snowden files comes SIMP, a Linux framework designed to provide a combination of security … continue reading
More and more tech companies are piling on the “Occupy Flash” movement as Adobe’s Flash Player continues to be beset by publicly known security vulnerabilities. Mark Schmidt, Mozilla’s head of Firefox support, tweeted that the company has officially blocked Flash in all versions of Mozilla Firefox. He clarified that the block will only remain in … continue reading
The OpenSSL team has issued a high-severity security advisory. The advisory discloses a new certificate validation vulnerability where during certificate verification, OpenSSL will attempt to find alternative certificate chains if the first validation attempt fails. The vulnerability lies in an implementation error allowing an attacker to forge an invalid certificate and bypass verification. This security issue … continue reading
NEW YORK–Datapipe, a leader in secure managed hosting and cloud solutions for the enterprise, today announced a new suite of automation and orchestration services for its Managed Cloud for AWS solution. The new Datapipe Automation Services connect the enterprise with Datapipe automation experts who perform an audit of existing infrastructures, identify key opportunities for automation, … continue reading
Amazon has introduced s2n, a new open-source implementation of the TLS encryption protocol. The s2n implementation, short for “signal to noise,” is a library designed to be small, fast and simple. s2n avoids implementing rarely used TLS options and extensions, and it contains little more than 6,000 lines of code. Amazon plans to integrate s2n … continue reading
No matter how genius a new application is, it is still required to go through testers’ hands. And despite the important role testers play, they remain in the shadows. When developers become aware of the variety of tests their software must endure, it often forces them to rethink the way they develop their software—in a … continue reading