EFF sues Justice Department to discover if secret orders are used to decrypt user data


EFF (the Electronic Frontier Foundation) has filed a Freedom of Information (FOIA) lawsuit against the Justice Department. The digital rights group wants to learn whether the government has made use of secret court orders to force tech companies to provide access to encrypted user data.
After the Apple vs the FBI battle, there has been renewed interest in how companies handle not only encryption, but government requests for access to such data. With services such as WhatsApp enabling end-to-end encryption, attention has now switched to what might be happening in the background without users' knowledge. While Apple very publicly refused to provide decryption keys, EFF -- and others -- are concerned that secret court orders may be used to hide what is really happening.
New analytics platform aims to transform mental healthcare


Healthcare costs for people diagnosed with mental illness and common chronic health conditions are 75 percent higher than for those without a mental health diagnosis according to the Centers for Medicare and Medicaid Services (CMS).
This is because there’s often a lack of coordination between multiple care providers, different state policies and diverse payment structures which can result in poor health outcomes and higher costs across health systems.
Adjust brightness and contrast from software with ClickMonitorDDC


ClickMonitorDDC is a tiny free tool which allows adjusting the brightness and contrast of DDC-compatible monitors (and that’s most of them, if you’re unsure).
You could do this anyway with the monitor buttons, maybe opening the Display Control Panel applet, but ClickMonitorDDC will often be much more convenient.
Only 23 percent of businesses can effectively respond to cyber attacks


NTT Com Security today released its annual Global Threat Intelligence Report (GTIR), which examines the threat landscape by analyzing the attacks, threats and trends from the previous year.
This year’s report is the most comprehensive to date, featuring key findings from partners including Lockheed Martin and the Center for Internet Security and pulling information from 24 security operations centers, seven R&D centers, 3.5 trillion logs, 6.2 billion attacks and nearly 8,000 security clients across six continents.
Norton Security Premium 2017 gets first public beta


Symantec has released a first public beta of Norton Security Premium 2017, the next generation of its high end security suite.
The new edition introduces "Proactive Exploit Protection", which aims to prevent malware exploiting holes in your operating system -- even those not yet discovered.
Win a free Xbox One and custom controller from Microsoft in the comfort of your PJs


The Xbox One is a marvelous game console and media player. In my living room, it has replaced both my Roku and Blu-ray player, lessening the number of unsightly wires. Best of all, of course, are the high-quality games, providing many hours of entertainment.
Understandably, not everyone can afford such a costly piece of tech. If this game console is not in your budget, I have some good news; Microsoft is giving one away at Pax East 2016. As an added bonus, the company is including a custom controller. Don't worry, if you aren't going to Pax, you can participate from home in your pajamas -- aka PJs -- too.
China wants Apple's source code, but Apple refuses to hand over the goods


Apple has revealed that Chinese authorities have asked for access to the company's source code in the last couple of years. The revelation was made by Apple general counsel Bruce Sewell as he tried to deflect accusations that have sprung up in the wake of the San Bernardino iPhone case.
The battle between Apple and the FBI rumbled on for a while as authorities asked the iPhone manufacturer to crack encryption or provide a backdoor into the phone at the center of the case. Apple refused to help the FBI, leading to accusations that the company was failing to help US authorities whilst assisting those abroad. Apple categorically denies handing over information to the Chinese authorities.
Google's second annual Android security report shows how app and device scanning keep you safe


As Apple releases its transparency report, Google today releases its second Android Security Annual report. The report covers all things Android, from the security of the operating system itself, to the security of Google Play and the apps it provides access to. Of course, Google is keen to highlight everything it does to improve security for its users.
As such, the report shows how the company performs more than 400 million automatic security scans per day on devices with Google Mobile Services. Aided by machine learning, these scans help to home in on what are referred to as Potentially Harmful Applications (PHAs). Google points out that just 0.5 percent of scanned devices feature PHAs, and this dropped to 0.15 percent for devices that only installed apps from Google Play.
ISPs offer inadequate DDoS protection


A new report from Corero Network Security, which provides security solutions against distributed denial of service (DDoS) attacks, shows that 85 percent of enterprise end users want their Internet Service Providers (ISPs) to offer better protection against DDoS attacks.
To compile its research, the security company polled more than 100 ISPs and 75 enterprise customers in regards to their DDoS mitigation strategies. Corero found that a high number of ISPs still rely on outdated technologies to protect their customers from these attacks.
Apple transparency report sheds some light on government data requests


Reinvigorated interest in privacy, security and surveillance means that the transparency reports published by tech companies are always greeted with some enthusiasm. How much data are governments around the world asking for from companies? How much user data are companies handing over to the authorities?
Apple's latest transparency report reveals that the iPhone manufacturer has complied with an increased number of requests for data -- including 80 percent of requests in North America, and 97 percent in Latin America. But while the report makes for interesting reading, it also highlights a problem that Microsoft recently sued the Department of Justice over: even if companies want to be transparent about data requests, when it comes to National Security Requests it is not even possible to report the precise number of requests that have been received.
PC Internet usage is dropping


ComScore, an online measurement specialist, has released new data that shows that less users are using desktop devices to access the Internet and are instead browsing on their smartphones and tablets.
The company has noticed a steep decline in the overall time people have spent online in the US using both desktop PCs and laptops.
77 percent of companies don't have the capability to respond to cyber attacks


Only 23 percent of organizations are capable of responding effectively to a cyber incident. This leaves the remaining 77 percent often having to purchase support services after an incident has occurred.
This is among the findings of the latest Global Threat Intelligence Report from security company Solutionary. The report is made up of information from 24 security operations centers, seven R&D centers, 3.5 trillion logs, 6.2 billion attacks and nearly 8,000 security clients across six continents.
Internet of Things will extend to running shoes


Your next running shoes will probably be connected to the internet, IoT-style.
Footwear branding, labeling and RFID solutions firm Avery Dennison Retail Branding and Information Solutions (RBIS) and IoT firm EVRYTHNG announced today they’re teaming up to give more than 10 billion apparel and footwear products a "unique digital identity".
Apple's MacBook now offers better performance, longer battery life


Apple has announced the first MacBook refresh, a year after the introduction of its thinnest and lightest laptop. The device gets the latest Intel processors, better graphics performance, faster SSD storage and longer battery life. Also new is a rose gold finish, on top of the existing gold, silver and space gray.
The 2016 refresh for the 12-inch MacBook brings sixth-generation dual-core Intel Core M processors with speeds of up to 1.3 GHz and Turbo Boost of up to 3.1 GHz, 1866 MHz RAM and HD Graphics 515, which is said to be 25 percent faster than in the original model.
US hosts more malicious websites than any other country


According to a new report from German security company G DATA, more malicious websites were hosted in the US in 2015 than in any other country, originating around 57 percent of recorded attacks.
China, Hong Kong, Russia and Canada are also major hosts of malware, though Europe is little in evidence, only Germany and Italy making the top seven and accounting for just six percent between them.
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.