Samsung to plant Trojan horse in Apple's yard

Trojan horse a

Samsung already has a bunch of its apps on iOS, but this year the company plans to bring the majority of its apps to the App Store. In fact, it's quite possible that all of Samsung's apps will be available for iPhones and iPads soon.

To many, this decision comes across as counterintuitive considering Samsung's rivalry with Apple. However, there’s no reason for Samsung not to make money off of Apple. In fact, it’s a smart decision that will support its position on the market, while Apple will likely take a hit, which may not seem quite that obvious.

Continue reading

Electronic toys maker wants to blame parents for data breaches

finger point pointing accuse accusation

Electronic toys maker VTech has recently been a victim of a cyber-attack, which has seen the data of more than 6.3 million children exposed. The hackers got access to chat logs and photos.

Following the breach, VTech has updated its End User License Agreement, saying the company can’t provide a 100 percent guarantee that it won’t be hacked. It also shifts the responsibility back to the parents:

Continue reading

What makes Cryptowall 3.0 the most successful ransomware?

ransom note

Cryptowall 3.0 is the most successful ransomware of all time, a new report by security firm Imperva says. Ransomware is a type of malware which, once active on a device, encrypts all the data and demands payment from the victim, typically through Bitcoin.

In its report on the dangers of ransomware, and the impotent attitude of the FBI, which usually advises victims to pay the ransom, Imperva says Cryptowall 3.0 has caused $325 million (£225.7m) in damages so far.

Continue reading

Mac tool vulnerability exposes lots of apps to man-in-the-middle attacks

shot_padlock

A security specialist has discovered a flaw in Sparkle, a third-party framework that Mac apps use to receive updates, which makes a man in the middle attack possible when unencrypted HTTP connections are used.

If the attacker has the ability to intercept the unencrypted data stream for example on a public Wi-Fi hotspot they could possibly inject malicious code.

Continue reading

More consumers now care about how businesses handle their data

wave_goodbye

Nearly three million Brits have decided to leave a service provider that got hacked, a new research by security firm Privitar reveals. The report shows that 23 per cent of Brits have been affected by a security breach at some point, and 24 per cent of these reacted by switching providers.

The company says consumers now pay attention to how well a company handles data, when making choices. Even though data handling has become one of the key selling points for many companies, 52 per cent of consumers say it’s difficult to find any information on how companies store and use their personal information.

Continue reading

The problem with current 'smart' access control systems

Biometrics

There’s been an explosion in products that promise to make our facilities, assets, networks and cloud resources "smarter", more secure and safe, but do they?

With control system hacks on the rise and traditional lock/entrance manufacturers like Honeywell, Assa Abloy and Stanley developing more intelligent lock systems, it’s clear that enterprises in hospitality, healthcare and government are looking for a more granular access control that increases security.

Continue reading

Opera Software wants shareholders to accept $1.2bn buyout offer

buy_button_keyboard

Opera Software, the company behind the Opera web browser for desktop and mobile devices, has received a $1.2 billion buyout offer from a consortium of Chinese Internet firms.

The company’s board is recommending shareholders to accept the deal, which is higher than Opera Software's valuation at closing time on the Oslo exchange. Rumors of a possible buyout of the company led to its stock being suspended for two days.

Continue reading

Hackers leak contact information of 20,000 FBI employees

cyber criminal

Hackers have leaked the contact information of 20,000 FBI employees, which follows the previous day's release of 10,000 Homeland Security employees' data.

The hackers communicating through Twitter, claimed "Well folks, it looks like @TheJusticeDept has finally realized their computer has been breached after one week".

Continue reading

Five reasons why Apple's iPad Pro is ready for the enterprise

ipad_pro_large_screen

In 2010, Apple heralded the iPad as the device to revolutionize the laptop era for consumers. Now, with the iPad Pro, the company is set to address the prosumer in the enterprise and move closer to achieving that goal. Combining power with new input devices and a platform designed for mobile, it is hoped the iPad Pro will enable businesses to be flexible in how and where they work.

But for businesses looking to become more mobile, is the iPad Pro the right option? And what has changed to make it enterprise ready?

Continue reading

Apple open sources Swift's Benchmarking Suite

open source

Following the release of the Swift programming language as open source back in early December 2015, Apple has followed up by releasing the code for its Benchmarking Suite on GitHub.

By releasing the Benchmarking Suite as open source, Apple is trying to assist developers to create faster, more efficient code. It will allow programmers to find areas where their code is running slowly, so that they can find a faster way of coding their applications before they are committed. Specifically, the suite consists of tools, benchmark libraries and utilities.

Continue reading

How can IT Infrastructure Library (ITIL) improve information security?

ITIL

The ITIL change management process is one of the very important processes that helps increase security for IT applications and infrastructure. For example, in healthcare and hospital environments, maintaining an eHealthRecord (eHR) application is an enormous IT task. Cerner, Epic, Allscripts, MEDITECH, Siemens and McKesson are the major vendors and cost many millions to purchase. It often requires millions more in resources to implement and maintain.

The ongoing task of maintaining a hospital eHealthRecord is a giant burden on IT. There are also many possible security issues, given that HIPAA compliance is required for any hospital or healthcare environment. According to industry research, some hospitals have a backlog of over 1000 eHealthRecord Requests for Change (RFC), and many are related to security.

Continue reading

The role of mobile services in the evolution of IoT

Internet of things

Along with Big Data, the Internet of Things (IoT) has been one of the most heavily hyped broad technology trends because it will touch just about every sector of society and commerce. As it happens, these two great trends will overlap and reinforce each other, while sharing some of the same constraints and concerns as they develop their full potential over the coming five to ten years.

Analyst group Gartner has identified a clear life cycle for such major technology trends, beginning with a discovery that triggers early innovation, which then generates hype followed by an inevitable period of disillusionment when the initial over-stoked expectations are not met. Some technologies die in this trough, but others emerge at the other side into Gartner’s "slope of enlightenment", where they gain adoption before reaching a plateau of maturity occupied now by the ICT sector as a whole.

Continue reading

France orders Facebook to stop tracking non-users

Stop

Facebook is facing a great deal of heat in the European Union, where many countries are concerned with the ways in which the social network collects data and how it uses cookies to track Internet users.

The CNIL, France’s data protection authority, has issued a formal notice to Facebook, because it fails to comply with European data protection law. CNIL has given Facebook three months to make the necessary changes to comply with the EU’s laws. If the company is able to do this, it will not face sanctions from the data protection agency. Facebook is currently reviewing CNIL’s order which it is confident that it currently complies with.

Continue reading

Your business is likely storing useless data

Box file image

Your company computer is probably clogged with unnecessary data, and your company’s cloud is probably filled with things no one really uses any more.

Those are the results of a Crown Records Management/Censuswide survey, released on Clean out Your Computer Day.

Continue reading

Apple's CloudKit gets server API

apple_store_front

Apple has made CloudKit much more appealing to developers by adding a server-side API to its framework. This will allow them to add much more functionality to apps that are powered by the service and to utilize it even when users have not interacted with iOS, Mac, or web apps.

Previously, CloudKit interaction was limited to the APIs that Apple provided in apps. It was useful for developers but did not give them the opportunity to implement more advanced features. Today’s modern apps make use of servers to perform tasks and collect information when a user is not using the app. With CloudKit’s new web API, developers can add these more advanced features into their apps using Apple’s tools instead of having to rely on third party services to do so.

Continue reading

Load More Articles