L33tdawg: On a related note, there's still time to apply for the Google Women in Tech Travel and Conference Grant for #HITB2014AMS
Google is committing $1 million to 40 groups that work with technology and other startups to encourage them to find ways to bring more women into businesses that are beginning from the ground up.
Target CIO Beth Jacob has apparently fallen on her sword in the wake of the massive security breach in mid-December that compromised 40 million debit and credit cards and swept national headlines. Her resignation was rendered this week effective immediately.
"If you look at the history of other large data breaches, turnover at the top of the IT shop is not unusual," says retail IT consultant Cathy Hotka.
Security researchers have developed a password storage system that uses inexpensive hardware to prevent the cracking of passwords—even the most common and weak ones such as "123456," "password," and "letmein."
Julian Assange doesn’t use the blustering rhetoric you might expect from the founder of the activist publishing group WikiLeaks. Assange is responsible for leaking documents that have changed America’s political landscape— State Department cables and Iraq War logs—yet to a South by Southwest audience on Saturday, he spoke quietly and matter-of-factly even when uttering the most inflammatory statements.
One of the go-to strategies for securing a computer network when a machine is infected with malware is to remove that machine from the network. This effectively prevents the malware from spreading to other devices.
The technique is called "air-gapping" — network admins are building a "roadblock" quite literally made out of air to stop malicious computer code from propagating throughout a network. With no cables connecting the affected machine to the rest of the network, malware has no "road" by which to travel.
Researchers from North Carolina State University (NCSU) have refined a technique – known as anomaly detection – and created a tool that applies it to Android applications, ultimately allowing them to detect and contain apps that are actually root exploit malware.
On Tuesday, Xiaohui Gu, Tsung-Hsuan Ho, Daniel Dean, and William Enck released their findings in a report titled, “PREC: Practical Root Exploit Containment for Android Devices.” They also presented their research at the ACM Conference on Data and Application Security and Privacy in Texas.
David Jevans, CTO and founder of Marble Security, recently received some bad feedback from a potential customer testing his company's product, which helps organizations manage and secure their mobile devices.
"They basically said 'Your stuff doesn't work'," Jevans said. "It thinks Netflix is malicious."
The upcoming edition of the SXSW Interactive Festival will be an interesting one. That’s because Edward Snowden, the man who needs no introduction, will speak at the event on Monday, March 10, 2014.
Of course, since SXSW takes place in Austin, Texas, there’s no way for Snowden to attend the event in person so he’ll speak via videoconference.
Early computer viruses spread over what we called "sneaker net," with one infected floppy disk inserted in one computer after another. Online networks make infections move much faster — but, until now, all the infections had been from computer to computer, or server to computer. They had never spread from one disconnected Wi-Fi network to another before.
"May it please the court if I place a cell phone up this court's trouser leg and take a picture or two?"
These words might have been the temptation of many after hearing an interestingly thought-out decision in Massachusetts.