House votes to undermine net neutrality rules, and ISPs cheer
The US Capitol Building.House of Representatives The House of Representatives today approved a Republican proposal that limits the Federal Communications Commission's authority to regulate Internet...
View ArticleApple holds steadfast, refuses to help feds access seized iPhone in NY drug case
PtigarstheoneApple's encryption battle FBI paid “gray hats” for zero-day exploit that unlocked seized iPhone Apple won’t demand to learn how FBI cracked terror suspect’s phone US government still...
View ArticleMedia Probe Reveals BlackBerry Shared BBM Encryption Key With RCMP
NEWS ANALYSIS: Reporters citing court filings in Canada say that the company provided assistance to the RCMP in decoding messages in a criminal case. Canada's federal police force, the Royal Canadian...
View ArticleU.S. Business Concerned Over E.U. Panel Rejecting Data Privacy Accord
The United States may have to renegotiate an agreement that allows data on European customers to be stored outside Europe. U.S. business associations criticized an opinion by a European group of...
View ArticleBritish Airways flight hits possible drone during landing at Heathrow
A British Airways A320 like this one reportedly struck a possible drone today at Heathrow, again raising concerns about consumer drone operators flouting regulations and endangering aircraft.British...
View ArticleUS-CERT advice says kill Quicktime for Windows, quickly
Unsupported software with known bugs has no place anywhere US-CERT has echoed The Register's advice to the effect that if you're running Quicktime for Windows, it's time to delete it. Right now. The...
View ArticleEncryption laws should think global, not local
Setting universal standards has never been easy. Over the centuries, the world hasn’t agreed on much of anything, from power outlets to politics. We must manufacture cars that have both left-hand and...
View ArticleTelecom Italia Sparkle and 365squared launch SMS Booster for Mobile Operators
SMS Booster combines Sparkle SMS transit solutions with 365secure and 365managed servicesRome and Malta, April 18, 2016 Sparkle, the International Services arm of Telecom Italia Group and a leading...
View ArticleFlashback: Declassified 1970 DOD cybersecurity document still relevant
Networks may look different, but the security problems are basically the same.The National Security Archives at George Washington University has just added a classic text of computer security to its...
View ArticleCRN Exclusive: BlackStratus Launches SIEM Solution For SMB Market
Enterprise SIEM vendor BlackStratus is diving into the SMB market, revealing Monday the launch of a SIEM-as-a-Service solution that brings enterprise-grade capabilities to partners serving small to...
View ArticleUnisys Delivers Award-Winning Micro-Segmentation Security on Microsoft Azure
Unisys Stealth(cloud)™ to deliver added security at a lower cost to users of Microsoft Azure, a platform used by 85 percent of Fortune 500 companies in 140 countriesLondon, UK, April 18, 2016 – Unisys...
View ArticleHacker: This is how I broke into Hacking Team
Almost a year after Italian surveillance software maker Hacking Team had its internal emails and files leaked online, the hacker responsible for the breach published a full account of how he...
View ArticleFair use prevails as Supreme Court rejects Google Books copyright case
Roman BoedThe Supreme Court on Monday declined (PDF) to hear a challenge from the Authors Guild and other writers claiming Google's scanning of their books amounts to wanton copyright infringement and...
View ArticleKanye West promises Tidal exclusive, fan sues when new album surfaces elsewhere
On Monday, Kanye West fan Justin Baker-Rhett sued (PDF) West and S.Carter Enterprises (SCE), the company that owns music streaming service Tidal.Baker-Rhett alleges that the rapper and the streaming...
View ArticleHow hackers eavesdropped on a US Congressman using only his phone number
A US congressman has learned first-hand just how vulnerable cellphones are to eavesdropping and geographic tracking after hackers were able to record his calls and monitor his movements using nothing...
View ArticleMeet MIT's New Cyber-Attack Detection Tool
Researchers merged artificial intelligence with 'analyst intuition' to create AI2. Cyber crime never sleeps, but researchers from MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL)...
View ArticleVerodin Emerges From Stealth Mode to Test Security
Security startup Verodin debuts with a new take on how to ensure that an organization's IT infrastructure and people are configured properly for an attack. Verodin emerged from stealth mode today with...
View ArticleHacking Team hole still unpatched, exploit pop doc claims
'Phineas Fihser' says embedded device pwnage exposed spyware-for-states firm The hacker who claims responsibility for the flaying of Italian spyware-for-States firm Hacking Team says the vulnerability...
View ArticleBrits Risking Work Security by Accessing Pirated Content
RiskIQ find 59% of UK citizens using personal devices to access corporate networks use the same device to access illegal pirate contentLondon, UK. 19 April 2016 – New research from RiskIQ, the leader...
View ArticlePatch JBoss now to prevent SamSam ransomware attacks
Cisco Talos researchers say that 3.2 million servers have a JBoss vulnerability that could potentially be exploited by SamSam ransomware.Even more worrying, the researchers found 2,100 backdoors across...
View Article