Gmail for Work gets improved digital loss protection features

Google has expanded the digital loss protection features in Gmail for Work, to help ensure that employees don’t share confidential information outside the company they work for. The service can now use optical character recognition on attachments, so administrators can ensure that employees aren’t sharing mounds of confidential data in images (whether intentionally or not). Read more about Gmail for Work gets improved digital loss protection features[…]

Share

N.Y. prosecutor wants Apple to turn back security clock to 2013

A New York prosecutor tomorrow plans to urge Congress to write legislation that would require Apple to roll back iPhone security to the model of 2013’s iOS 7, according to prepared testimony published today. Cyrus Vance Jr., the District Attorney for New York County, will testify before the House Judiciary Committee tomorrow as one of Read more about N.Y. prosecutor wants Apple to turn back security clock to 2013[…]

Share

NASA wants to get supersonic with new passenger jet

NASA wants to put a supersonic passenger jet back in the sky that promises to a soft thump or supersonic heartbeat as the agency called it — rather than the disruptive boom currently associated with such high-speed flight. The “low-boom” aircraft known as Quiet Supersonic Technology (QueSST) will be built by a team led by Read more about NASA wants to get supersonic with new passenger jet[…]

Share

IBM to buy Resilient Systems, bringing security guru Bruce Schneier on board

IBM will acquire Resilient Systems, it announced Monday, and along with the company, it will gain a big name in the security world: Bruce Schneier. Resilient makes an incident-response platform that automates and orchestrates the processes for dealing with cyber incidents such as breaches and lost devices, and enabling companies to respond more quickly. The Read more about IBM to buy Resilient Systems, bringing security guru Bruce Schneier on board[…]

Share

Security product solves the network Heisenberg Uncertainty Principle

If you’re a physics fan like me, you’ll know the famous Heisenberg Uncertainty Principle that states you cannot know a particle’s exact location and velocity at the same time. If you shine a light on the particle to see where it is, you change the speed or direction causing a big problem for particle physicists. Read more about Security product solves the network Heisenberg Uncertainty Principle[…]

Share

Apple spells out what it would take to comply with government's iPhone order

Apple last week argued that assisting the FBI in the agency’s attempt to access an iPhone used by one of the San Bernardino killers would be an undue burden that would require a staff of between six and ten people who would have to dedicate two to four weeks of their time to the task. Read more about Apple spells out what it would take to comply with government's iPhone order[…]

Share

Cyber security tools tend to pile up. Here’s how to rationalize them

Although vendor-written, this contributed piece does not advocate a position that is particular to the author’s employer and has been edited and approved by Network World editors. It’s a cliché, but “change is the only constant.”  Every company periodically reviews and makes changes to their applications, processes and solutions they use to conduct business. And Read more about Cyber security tools tend to pile up. Here’s how to rationalize them[…]

Share

CTB-Locker ransomware hits over 100 websites

A new malicious program that encrypts files on Web servers has affected at least 100 websites over the past few weeks, signaling a new trend in ransomware development. The program, which is written in PHP, is called CTB-Locker, a name also used by one of the most widespread ransomware programs for Windows computers. It’s not Read more about CTB-Locker ransomware hits over 100 websites[…]

Share

Glitch in Hive smart thermostat sends temperatures soaring to nearly 90 degrees

You may have seen movies which feature some evil house that is out to get the occupants, but those usually aren’t smart homes. In real life if you use connected devices to make your home “smart,” then you might expect potential security flaws, but you don’t expect those IoT devices to act like they are Read more about Glitch in Hive smart thermostat sends temperatures soaring to nearly 90 degrees[…]

Share

UC Berkeley makes third data breach disclosure in past 15 months

UC Berkeley on Friday — THE time for issuing bad news even in these days of 24-hour news cycles — revealed that it has alerted 80,000 current and former faculty, staff, students and vendors in the wake of a late December “criminal cyberattack” that could have compromised Social Security and bank account numbers. We’re not Read more about UC Berkeley makes third data breach disclosure in past 15 months[…]

Share

Gigamon brings big data analytics to security

The IT security environment has changed significantly over the past decade. Ten years ago, network security was certainly challenging but straightforward. Most organizations had a single network ingress/egress entry point and protected it with a high performance firewall. Today, the environment is completely different. Technologies like Internet of Things, cloud computing, software defined networking, BYOD Read more about Gigamon brings big data analytics to security[…]

Share

New firmware analysis framework finds serious flaws in Netgear and D-Link devices

A team of security researchers has found serious vulnerabilities in over a dozen wireless routers and access points from Netgear and D-Link with the help of an open-source framework that can be used to perform dynamic security analysis on embedded firmware. Called FIRMADYNE, the framework automatically runs Linux-based firmware designed for embedded devices in an Read more about New firmware analysis framework finds serious flaws in Netgear and D-Link devices[…]

Share

How to avoid common travel and vacation scams

As usual, winter’s been bleak. You’re ready to go … anywhere else. Somewhere warmer, brighter, more fun.  And someone else is there waiting and ready to steal your information — and your money — in the process.  Travel scams are ripe and ripening as the days grow longer, in some high and very low tech Read more about How to avoid common travel and vacation scams[…]

Share

New products of the week 2.29.2016

New products of the week Our roundup of intriguing new products. Read how to submit an entry to Network World’s products of the week slideshow.   Savvius Vigil Key features: Savvius Vigil is the security industry’s first network appliance capable of intelligently selecting, capturing, and storing months of relevant network data to enable rapid investigation Read more about New products of the week 2.29.2016[…]

Share
Share