188bet|体育

                          Get the Tech News Flash Newsletter from TechNewsWorld » View Sample | Subscribe
                          Welcome Guest | Sign In
                          TechNewsWorld.com


                          The Agile Health Plan eBook
                          Health plans are no longer asking why they need to digitally transform, but how they can execute transformation projects well. Vlocity's proven methodologies guide you through 3 key stages and tactics that influence successful digital transformations. Download the eBook.

                          The Past, Present and Future of Attribute-Based Encryption
                          July 21, 2020
                          Encryption is an obscure but critical part of everyday life. That padlock in the address bar of the website you're visiting represents the 's' after 'http' -- which stands for the latest version of Transport Layer Security. Together with Secure Sockets Layer, which TLS replaced, these digital security technologies allow encrypted communication between two parties, such as web sites or servers, and web browsers.
                          Digital Fraud Flourishing During Pandemic: Report
                          July 9, 2020
                          If you conducted e-commerce transactions since the pandemic struck, you have probably been the target, or even a victim, of online fraud. A report from Sift titled "Q2 2020 Digital Trust & Safety Index" details a 109 percent increase in content abuse and growth of the fraud economy from January through May 2020.
                          New DoD Security Regulations Have Ramifications for IT Contractors
                          July 7, 2020
                          With billions of dollars of federal contracts at stake, information technology providers are being swept up in the tide of a new U.S. Department of Defense information security requirement that will become mandatory for IT providers and other companies doing business with DoD. While IT companies already incorporate data protection elements in the products and services they provide to DoD, the department is raising the bar on the way vendors should handle information security.
                          Cybersecurity and Your New Remote Workforce
                          June 30, 2020
                          For most organizations, COVID-19 has been a literal transformative agent. Our organizations have almost overnight gone from environments where teleworking was an exception, to where it's the norm. As any student of human nature will tell you, people tend to view "the new" with reservation. There's a temptation when things are new to assume the worst about them. For security pros, this means we often view new things as riskier than things we're familiar with.
                          Twitter's Security Blunder: More Dangerous Than You Think
                          June 29, 2020
                          Twitter had a data security problem last week that might sound trivial. Email addresses, phone numbers, and the last four digits of the credit cards used to buy ads on Twitter were left in browser cache after the transaction, and that cache was not secured. This may seem trivial, but the consequences could be far more significant than you might think. Let's explore how.
                          Open Source Security Issues Exist: Deal With Them, Report Urges
                          June 25, 2020
                          Open Source Software is becoming much more commonplace within organizations, bringing a different set of risks and perceived challenges compared to closed source or proprietary software. The Information Security Forum has released a report to help security professionals recognize the benefits and perceived challenges of using Open Source Software.
                          Twitter Apologies for Data Security Incident
                          June 24, 2020
                          Twitter on Tuesday notified business clients that their personal information, including email addresses, phone numbers, and the last four digits of their credit card numbers may have been compromised. Self-serve advertisers that viewed billing information on ads.twitter.com or analytics.twitter.com were affected. The issue occurred prior to May 20, 2020. However, Twitter only notified customers about it on June 23.
                          Intel Says 'Tiger Lake' Will Drown Control-Flow Malware
                          June 16, 2020
                          The next generation of Intel mobile processors will include malware protection built into the chip. The protection, provided by Intel's Control-Flow Enforcement Technology, will first be available in the company's "Tiger Lake" mobile processors. CET is designed to protect against the misuse of legitimate code through control-flow hijacking attacks, which is widely used in large classes of malware.
                          New Flaws in Intel's CPU Software Guard Extensions Revealed
                          June 11, 2020
                          Two separate teams of academic researchers have published papers describing flaws in Intel's Software Guard Extensions. SGX enhances application security by letting developers partition sensitive information into enclaves with hardware-assisted enhanced security protection. The aim is to protect application code and data from disclosure or modification.
                          'New Normal' Security Era Begins for US Agencies, Cloud Providers
                          June 4, 2020
                          U.S. government agencies and cloud technology providers are heading toward a reset in how they cooperate on cybersecurity challenges. The expected growth of cloud use will create a more complex federal security landscape, according to a report from Thales. Federal agencies actually have moved ahead of businesses in cloud adoption, with 54 percent of agency data already embedded in the cloud.
                          How to Stay Safe on the Internet, Part 4: Fighting the Power
                          May 15, 2020
                          Category 2 adversaries are nothing to sneeze at, but their resources are finite. If you armor up enough, they will give up, and move onto an easier comparable target. In confronting the threat of category 3, everything you have learned ratchets up to a whole new level of paranoia. Category 3 adversaries have functionally unlimited resources for pursuing top targets.
                          Abandoned Open Source Code Heightens Commercial Software Security Risks
                          May 13, 2020
                          Outdated or abandoned open source components are persistent in practically all commercial software, putting enterprise and consumer applications at risk from security issues, license compliance violations, and operational threats, concludes the Synopsys 2020 Open Source Security and Risk Analysis Report. The report highlights trends and patterns in open source usage within commercial applications.
                          Thunderbolt Flaw Opens Door for 'Evil Maid' Attack
                          May 12, 2020
                          A Dutch researcher has revealed a novel way to crack into a PC through a Thunderbolt port. The method, dubbed "Thunderspy" by researcher Björn Ruytenberg, sidesteps the login screen of a sleeping computer, as well as its hard disk encryption, to access all its data. "Thunderspy is stealth, meaning that you cannot find any traces of the attack. It does not require your involvement," he explained.
                          Information Security: New Rules
                          May 8, 2020
                          Warren Buffet once said, "Only when the tide goes out do you discover who's been swimming naked." You can cover over a host of sins when times are good, but bad or unsafe practices will be exposed when times are rough. Time and experience have borne out the accuracy of this witticism in the financial arena -- and we're now seeing its applicability to the intersection of infosec and COVID-19.
                          How to Stay Safe on the Internet, Part 3: Drive the Black Hatters Mad
                          May 1, 2020
                          Like conventional criminals, criminal hackers choose easy, lucrative targets. One group in the crosshairs is made up of companies that have data on millions of users, such as private sector entities with a Web presence. Why go after one user at a time when data is collected in one place? Criminal hackers also like to hunt small organizations that have modest capital but weak information security.
                          Study Reveals E-Commerce Shopping Patterns That Hint at New Normal
                          April 28, 2020
                          Consumers and companies worldwide have ramped up online ordering for software products and digital goods as they struggle to improve productivity and security while working remotely and spending more time at home. The sharp spike in online commerce aligns with the timing of the current global pandemic. Software-based offerings accounted for the highest levels of growth.
                          How to Stay Safe on the Internet, Part 2: Take Canaries Into the Data Mine
                          April 24, 2020
                          More than any other factor, it is our asset that determines our adversary. For most of us, our asset is the corpus of sensitive personal details used for online transactions. This all comes down to how much data an adversary can glean from you, and how thoroughly it can analyze it. If your data passes through some software or hardware, its developer or maintainer enjoys some measure of control.
                          Ubuntu 'Focal Fossa' Homes In on Enterprise Security
                          April 23, 2020
                          Canonical, the parent company of Ubuntu, has announced the general availability of Ubuntu 20.04 LTS, codenamed "Focal Fossa." This major upgrade places particular emphasis on security and performance. Released once every two years, the new long-term support version provides a platform for enterprise IT infrastructures and workloads across all sectors for five years.
                          How to Stay Safe on the Internet, Part 1
                          April 17, 2020
                          At this point, remarking that people now are more concerned about online privacy than ever before is not a novel observation. What's fascinating, though, is that interest in personal digital security has remained high since the issue exploded about seven years ago. In other words, instead of experiencing a short-lived spike, digital privacy awareness has been sustained. This is encouraging.
                          Zoom Boosts Security With Pick-Your-Route Feature
                          April 15, 2020
                          Zoom's paying customers will be able to choose the region they want to use for their virtual meetings. Paying customers will be able to opt in or out of a specific data center region, although they won't be able to change their default, which for most customers is the United States. Zoom has data centers in the U.S., Canada, Europe, India, Australia, China, Latin America, and Japan/Hong Kong.
                          How BlackBerry Could Make Voting From Smartphones Secure
                          April 13, 2020
                          Some states defaulted to mail-in ballots some time ago, and their elections are unconstrained by the pandemic. However, in many parts of the U.S. the prevailing attitude is that the Web lacks enough security for elections. That seems odd, given that we now use the Internet to manage our finances, our healthcare, our businesses, our travel -- and now our shopping, including for food.
                          The Pandemic's Toll on Privacy Laws
                          April 6, 2020
                          Life as we knew it before the coronavirus is gone forever, and many changes will manifest in the pandemic's aftermath. How will it impact privacy laws around the globe? No one knows for sure, and we will not know until after the coronavirus is behind us. Cybercriminals long have been taking advantage of the Internet, and now the spread of COVID-19 has sped up their evil work.
                          Risk Assessment: Buttress Account Security and Foil Fraudsters
                          March 30, 2020
                          Under ordinary circumstances, the average consumer can order a latte on the way to the coffee shop, book a last-minute trip to the coast, and come home to find groceries delivered -- all with the click of a button. What makes these transactions so smooth and effortless? It starts with account creation. Consumers increasingly are willing to create accounts with sites they interact with regularly.
                          Report: E-Commerce Account Takeovers, Shipping Fraud on the Rise
                          March 25, 2020
                          E-commerce account takeovers increased 347 percent and shipping fraud jumped 391 percent from 2018 to 2019, a fraud and identity solutions company reported. Fraudsters are gaining access to accounts using credential stuffing, romance scams, social engineering, phishing or hacking. The three-digit rise in account takeovers is connected to the rash of data breaches over the last decade.
                          COVID-19 and Computer Security, Part 2: Shoring Up Systems for Remote Workers
                          March 19, 2020
                          As companies send employees home in an effort to curb the spread of COVID-19, cybersecurity experts are warning that telecommuting could be putting company assets and data at risk. There are a number of precautions that employees working from home should consider to ensure that sensitive data isn't compromised by cybercriminals taking advantage of the health crisis.
                          Microsoft Leaves Necurs Botnet in Shambles
                          March 13, 2020
                          Microsoft and partners have disrupted the Necurs botnet group blamed for infecting more than 9 million computers globally. There are 11 botnets under the Necurs umbrella, all apparently controlled by a single group, according to Valter Santos, security researcher at Bitsight, which worked with Microsoft on the takedown. Four of those botnets account for about 95 percent of all infections.
                          Report: Open Source Vulnerabilities Rampant in Popular Projects
                          March 12, 2020
                          Open source vulnerabilities rose by nearly 50 percent in 2019 over the previous year, based on a new report. Common vulnerabilities rated as high or critical severity were found in all of the most popular open source projects, according to the WhiteSource 2020 annual report, "The State of Open Source Security Vulnerabilities." The vulnerability rate is expected to continue rising.
                          COVID-19 and Computer Security, Part 1: Telecommuting Risks
                          March 12, 2020
                          The United States Office of Personnel Management last week urged agencies to prepare to allow federal employees to telework -- that is, work remotely.This came on the heels of the Department of Homeland Security closing its facilities in Washington state, after learning an employee had visited the Life Care facility in the city of Kirkland, which is ground zero for the state's COVID-19 outbreak.
                          The Dark Art of Turning Mountains of Stolen Data Into Cash
                          February 28, 2020
                          We're only two months into a new year and already hundreds of millions of personal records have been compromised, including 123 million records from sporting retailer Decathlon and another 10.6 million records from MGM Resorts hotels. These announcements followed fuel and convenience chain Wawa's revelation that it was the victim of a nine-month-long breach of its payment card systems.
                          Firefox Scrambles DNS to Boost Consumer Privacy
                          February 26, 2020
                          Firefox users in the United States are getting an extra measure of privacy protection starting this week, the Mozilla Foundation announced. Firefox Desktop Product Development Vice President Selena Deckelmann heralded the rollout of encrypted DNS over HTTPS, or DoH, by default in Mozilla's browser. The DNS, or Domain Name System, is one of the oldest parts of the Internet.
                          See More Articles in Cybersecurity Section >>
                          Women in Tech
                          What bothers you most about your Internet Service Provider?
                          Customer support is substandard
                          Data caps are too restrictive
                          Internet connection is unreliable
                          Pricing plans lack value
                          Speed is inadequate
                          Inside TechNewsWorld

                                                  explore

                                                  Second-hand housing

                                                  reading

                                                  explore

                                                  Super League

                                                  Variety show

                                                  image

                                                  city

                                                  aviation