By now, you have probably heard about the digital exposure, so to speak, of nude photos of as many as 100 celebrities, taken from their Apple iCloud backups and posted to the “b” forum on 4Chan. Over the last day, an alleged perpetrator has been exposed by redditors, although the man has declared his innocence. The mainstream media have leapt on the story and have gotten reactions from affected celebrities including Oscar winner Jennifer Lawrence and model Kate Upton.
In the current era of mega-(should I say giga-?) breaches with tens to hundreds of millions of lost customer records and the hacking-of-everything, it is safe to assume that the logical security of devices becomes almost more important than the physical protection around those assets. While it is true that the logical (in-)security of devices renders “remote attacks” (attacks that are carried out against the system from another location than where the device is located, i.e.
The Institute of Electrical and Electronics Engineers (IEEE) has formed a new advisory group with the private sector that aims to advise software developers on how to ensure that their applications are secure.
The IEEE has linked with ten IT and security organisations - including Google, Twitter, Cigital and RSA - to form the IEEE Centre for Secure Design (CSD). The CSD's first step has been to issue an advisory report for software developers - and allied staff - on how they can make their applications more secure.
Microsoft has extended the data loss prevention features in Office 365 so that they are available not only for its email tools but also for data in SharePoint Online and OneDrive for Business.
Office 365 already had DLP capabilities for Exchange Online and Outlook, so that compliance officers could monitor email communications and enforce corporate and regulatory rules regarding the use of sensitive corporate data, such as confidential intellectual property details and customers' financial information.
Sometimes it is best to toss security-challenged technology, and that's the recommendation experts are giving to small businesses using a flawed router from a China-based manufacturer.
Trend Micro reported this week that routers sold under the brand name of Netcore in China and Netis outside of the country contained a "backdoor" that could be easily accessed by a hacker to monitor Internet traffic.