Stopping threats like Operation Shady RAT
Earlier this week, McAfee published information about a new cyber security threat it dubbed Operation Shady RAT. Operation Shady RAT, and others like it that have emerged over the past months,...
View ArticleQuality of the cloud: best practices for ISVs
Demand for cloud computing continues to increase exponentially as consumers, businesses and government agencies seek to defer the expense of acquiring, operating and maintaining infrastructure and...
View ArticleBYOD-friendly or BYOD-adverse? Critical criteria for picking a cloud vendor
IBM‘s aggressive stance against the use of unsanctioned applications grabbed headlines a few months ago, but the trend toward “Bring Your Own Device” (BYOD) has put pressure on IT in all businesses,...
View Article6 ways to keep your data safe in the cloud
Most of us have a lot of data in the cloud, housed in storage services such as Dropbox, e-mail applications such as Gmail or everyday web services such as Facebook. Most of us probably don’t keep it as...
View ArticleThe rise of M2M security challenges
There will be over 700 million cellular-enabled machine-to-machine (M2M) device adoption and system deployments in the U.S. by 2017. As the volume of M2M devices and associated data increases, so too...
View ArticleNokia: Yes, we decrypt your HTTPS data, but don’t worry about it
Nokia has confirmed reports that its Xpress Browser decrypts data that flows through HTTPS connections – that includes the connections set up for banking sessions, encrypted email and more. However, it...
View ArticleThe new Mega: a privacy triumph or just more content theft?
Kim Dotcom, the flamboyant file-sharing champion who was arrested a year ago on copyright charges, is back with a new service called Mega that offers an easy way to store content in the cloud. Hailing...
View ArticleWhere Kim Dotcom and Mega have the edge on Dropbox and Box.net
As a world (in)famous technologist with the literal last name “Dotcom,” Kim Dotcom is a man whose swag is matched only by the damages sought against him by the U.S. government. His filesharing site...
View ArticleRuckus Wireless designs an open Wi-Fi hotspot with a secure connection
Wi-Fi is everywhere and more often than not it’s free for the taking. Pretty much everyone but airlines and fancy hotels are opening their networks to all comers. The only problem is that open networks...
View ArticleCloud security market landscape, 2013–2017
Cyber threats are now a critical issue affecting the national security of nation countries worldwide. At the same time, the IT world is witnessing a wave of new innovation, and there are numerous...
View ArticleKim Dotcom is starting a VC fund for privacy-focused startups
Some entrepreneurs are betting that the PRISM scandal will stoke user interest in privacy-focused services. The Pirate Bay’s founder Peter Sunde closed its crowdfunding campaign three days after...
View ArticleResearchers find way to encrypt software with “mathematical jigsaw puzzles”
When it comes to protecting software, you’re only as good as your file encryption. A UCLA computer professor and his research team have figured out a way to encrypt software in a way that allows users...
View ArticleFirst Lavabit, now Silent Circle: Another U.S. secure email service closes to...
Silent Circle, the provider of a range of secure communications services, has pre-emptively closed its Silent Mail email service in order to stop U.S. authorities from spying on its customers. That...
View ArticleThis can’t be good for Dropbox for Business
In what could be a speed bump in Dropbox’s drive to attract paying business customers, two researchers said they were able to reverse-engineer the encryption of the Dropbox client. On the plus side...
View ArticleThe NSA has cracked the secure internet: 3 things to know about the latest...
In the latest development in the ongoing scandal over U.S. surveillance practices, new reports show that the National Security Agency can break into a wide range of encrypted internet communications...
View ArticleA question of trust: Why the NSA revelations have the security industry in...
The security industry’s collective head is spinning, thanks to the NSA. A week after it emerged that the U.S. intelligence agency has “some capabilities” against basic internet security mechanisms, no...
View ArticleSilent Circle will “move on” from NSA-associated encryption standards, but is...
The secure communications provider Silent Circle is pretty upset about the apparent betrayal of the cryptographic community by the NSA, so it’s moving away from encryption standards that the...
View ArticleDataguise, a big data security startup, raises $13M
Startup Dataguise has closed a $13 million series B investment round “led by Toba Capital with additional capital coming from the investment arm of a leading electronic conglomerate,” according to a...
View ArticleHow to find the right data-protection solution in the cloud era
Outages and data loss reinforce the critical importance of thorough disaster recovery and business continuity.Today’s cloud-based solutions, however, are limited — something data protection vendors...
View ArticleNSA targets Tor: leaks show how US weakens the privacy tools it pays to build
A top secret slide show by the National Security Agency shows how the US government has been trying to compromise the Tor network, a tool that allows people to communicate anonymously on the internet....
View Article