Consumers wake up to value of their online personas
October 23, 2013
CT: Do consumers have to get used to taking on more of a burden for protecting their privacy in the age we live in?
Kerrigan: Absolutely. We realized consumers, to adopt tools, don’t want to have to change their behaviors so our design point is clearly on making our …More
Americans share personal info in risky ways
October 3, 2013
WASHINGTON – The majority of U.S. consumers freely admit to sharing personal details online that put them at risk.
That’s the not so surprising finding of a new national survey released by Visa here today to open its annual Visa Security Summit .
More than 58 percent of consumers surveyed admitted to sharing personal details over social media that could put them at risk for fraud and …More
The case supporting the NSA’s PRISM decrypting
September 6, 2013
SEATTLE – More reaction from the global technology community is surfacing this morning about how the New York Times has spun the spying details contained in 50,000 pages of PRISM documents outed by Edward Snowden.
A consensus is gelling that the NSA — in using brute-force password hacking techniques, cracking into Virtual Private Networks and Secure Sockets Layer services and taking steps to weaken certain inherently weak encryption protocols – is simply doing what the NSA has always …More
Latest PRISM disclosures shouldn’t worry consumers
September 5, 2013
Only if you do not believe President Obama and NSA Director Army Gen. Keith Alexander that any and all spying techniques are used strictly in very narrow circumstances to target suspected foreign terrorists, under a federal court review process.
“The people who work on PRISM are working to protect us,” says Tom Kellermann, Trend Micro’s vice …More
Q&A: HD Moore drills down on aftermath of NY Times hack
August 29, 2013
SEATTLE — HD Moore, chief research officer at vulnerability management firm Rapid7, has been keeping a close eye on the aftermath of the Syrian Electronic Army’s disruption of websites of the New York Times, Huffington Post and Twitter. Here’s a drill down of what Moore has pieced together with regard to the unfolding scramble to lock down domain names.
CT: So how were you able to figure out which Melbourne IT clients were exposed and which ones have applied registry …More
How tools for targeted ads also boost targeted attacks
August 19, 2013
(Editor’s note: In this guest essay, Matt Huang, chief operating officer of web security firm Armorize Technologies, outlines why the hackers are increasingly exploiting ad networks.)
Most of people are familiar with online ads. You see it everyday on webpages you browse. Most people also know that these ads are “targeted.”
For example if you’re shopping for a car and browsing related sites, you seem to start seeing more …More
Two names surface tied to Syrian Electronic Army
August 19, 2013
SEATTLE – Rivalries in the hacking world can be interesting. Two names have surfaced in pastebin, the site where stolen docs and other evidence of hacking capers often surfaces, by someone using the handle “ThisIsGameOver.”
According to …Morekeep looking »