Target CIO Beth Jacob has apparently fallen on her sword in the wake of the massive security breach in mid-December that compromised 40 million debit and credit cards and swept national headlines. Her resignation was rendered this week effective immediately.
"If you look at the history of other large data breaches, turnover at the top of the IT shop is not unusual," says retail IT consultant Cathy Hotka.
Researchers from North Carolina State University (NCSU) have refined a technique – known as anomaly detection – and created a tool that applies it to Android applications, ultimately allowing them to detect and contain apps that are actually root exploit malware.
On Tuesday, Xiaohui Gu, Tsung-Hsuan Ho, Daniel Dean, and William Enck released their findings in a report titled, “PREC: Practical Root Exploit Containment for Android Devices.” They also presented their research at the ACM Conference on Data and Application Security and Privacy in Texas.
At first it was apps like Wickr and Silent Circle designed to keep users’ communications safe but now we’re seeing more solutions baked right into handsets. Blackphone is perhaps the most popular example but low-cost mobile provider FreedomPop is now getting in on the action with a modified Samsung smartphone known as The Privacy Phone.
A variety of Linux distributions are vulnerable to hacks because of a bug that allows people to bypass security protocols to intercept and disseminate encrypted information. A member of the Red Hat security team discovered a bug in the GnuTLS library that allows hackers to easily circumvent the Transport Layer Security (TLS) and secure sockets layer (SSL).
The home security industry is ripe for disruption right now. The rise of smartphones over the past decade have driven down the cost of compact sensor and camera technologies, and now there’s a slew of different products in the works that can keep your home just as safe, but for a fraction of the cost.