A collection of notable security news items for the week ending March 6, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years. He was most recently Editorial Director of BYTE, Dark Reading and Network Computing at UBM Tech. Prior to that he spent over a decade consulting and writing on technology subjects, primarily in the area of security. He is the author of three books and thousands of published articles and many more unpublished, private reports. Larry has been Technical Director at several test laboratories where he both directed and ran product testing, with a special interest in test automation. Larry began his career as a Software Engineer at the now-defunct Desktop Software Corporation in Princeton, NJ, on the team that wrote the NPL 4GL query language. He also worked on corporate IT and software development at Chase Econometrics. Larry is a graduate of the University of Pennsylvania with a degree in Public Policy.
Ms. Violet Blue (tinynibbles.com, @violetblue) is a freelance investigative reporter on hacking and cybercrime at Zero Day/ZDNet, CNET and CBS News, as well as a noted sex columnist. She has made regular appearances on CNN and The Oprah Winfrey Show and is regularly interviewed, quoted, and featured in a variety of publications that includes ABC News and the Wall Street Journal. She has authored and edited award-winning, best selling books in eight translations and has been a sex columnist for the San Francisco Chronicle. She has given keynote talks at such conferences as ETech, LeWeb, and the Forbes Brand Leadership Conference, and has given two Tech Talks at Google. In 2010, the London Times named Blue one of “40 bloggers who really count.” Ms. Blue is the author of The Smart Girl's Guide to Privacy. Violet Blue bio courtesy of TTI Vanguard.
Arrested 10 months ago by Australian Federal Police, Anonymous radio host LoraxLive (Adam Bennett) faces a prosecution struggling to pin charges on him.
After admitting to a security breach, the luxury hotel chain has managed to remove malware discovered on systems related to customer financial data.
Tech companies aren't allowed to tell you when the government wants your data. Enter the warrant canary.
Adobe, maker of software including Flash and Adobe reader, is catching up to the times and has launched a vulnerability disclosure program -- but something may be missing.
China wants the encryption keys from U.S. technology companies as part of a counter-terrorism law. The draft law leaves U.S. tech giants with two options: Play ball or get out.
While Silent Circle's encrypted devices and services look tempting, there are now free end-to-end encryption services available.
AdaptiveMobile has uncovered a new mobile malware campaign which uses phone contacts to spread.
UPDATED: The search giant will let phone makers decide whether or not to enable encryption-by-default because of performance issues on older devices.
The Cryptocat developer's new team aims to get easy file and message encryption into everyone's hands, which could give Gmail and Dropbox (and the NSA) a run for their money.
Could 'invisibility' glasses become the next trend in cities crawling with cameras and full of facial recognition technology?
Uber said it is notifying impacted drivers now, but it hasn't seen the compromised data actually misused yet.
A collection of notable security news items for the week ending February 27, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
A fresh funding round will help the company cope with increased demand for encrypted communications in the enterprise.
Before you sync your iCloud or reinstall your apps, you need to lock down your new iPhone or iPad. Here are the important tweaks you need to protect your privacy.