Management of one’s personal devices, applications and security settings for everyone in a large organization can become an overwhelming task and time consuming. Google has released something that can make IT manager’s breath a bit easier. Their announcement today of a new set of security tools to help Google Apps users take back control of their security online.
Frank Swain can hear Wi-Fi, and he’s been tuning in to London’s networks for the past week.
China recently hacked into U.S. weather and satellite systems, forcing cybersecurity teams to seal off vital data, officials said Wednesday. (more…)
Trend Micro Incorporated, has released its annual security predictions report, “Trend Micro Security Predictions for 2015 and Beyond: The Invisible Becomes Visible,” and the company’s threat defense experts are highlighting the report’s forecast that targeted attacks will become rampant from more countries as hackers from the usual suspects have found success targeting victims around the world. Additionally, the report breaks downs seven other cybersecurity threat predictions for 2015 including banks and payment systems.
Getting hacked, whether on a desktop or smartphone, pretty much sucks. In a way, your entire digital life is an open book and even the control of your devices can be wrenched away from you. But imagine it’s not a smartphone getting ripped from your hands but rather your car’s steering wheel. (more…)
Security research Karsten Nohl of Berlin’s SR Labs has revealed a flaw in USB devices that potentially allows hackers to evade all known security measures used by a computer. In a report by Wired, Nohl says his BadUSB exploit is “almost like a magic trick” because “you cannot tell where the virus came from.”
The Chinese cyberattack group Deep Panda has compromised national security think tanks using sophisticated techniques designed to steal confidential data concerning US foreign policy, according to security researchers at CrowdStrike. (more…)
UPDATE: To story we covered earlier.
Microsoft is releasing a security update for Internet Explorer that closes a gap that allowed attackers to take complete control of a computer. It also issued the update to Windows XP users, despite dropping support for the older operating system last month. (more…)
In a rare move, US Computer Emergency Readiness Team says to stop using Internet Explorer until Microsoft can plug a critical security hole. (more…)
The big problem with drones is they look like, well, drones. It makes them easy to spot, and easy to target. The Army has a solution to this problem: make them look like birds.