peering_through_circuit_board

Brits acquiesce to internet surveillance but distrust data storage

UK web users are coming round to the idea of online surveillance by the government, but harbor concerns about how personal data will be stored. These are the findings of a survey by Broadband Genie that suggests terror attacks have led to a swing in public opinion of the Snooper's Charter.

But while people may be coming round to the idea of internet surveillance, they remain concerned about how private data -- such as browsing history -- will be stored. 27 percent of those surveyed said their opinion had been swayed by recent terrorist attacks by the likes of ISIS.

By Sofia Elizabella Wyciślik-Wilson -
angry_mob

And this, boys and girls, is why online vigilantism is a terrible idea

I've written recently about the dangers of online vigilantes infringing on the free speech of others. Anonymous is one of the biggest offenders in this department, but there are numerous hacking groups that -- under the banner of fighting one evil or another -- take the law of the web into their own hands without a thought for the consequences.

Online vigilantes stir up populist support by throwing around the keywords associated with the enemy of the moment -- terrorists, ISIS, racists, fascists, communists, socialists, pedophiles. All very emotive issues, but vigilantism can all too easily get out of hand. This has just been demonstrated perfectly by YouTube star Keemstar who took it upon himself to expose a 62-year-old pedophile online through his DramaAlert podcast. The only problem is that he and his team got the wrong man.

By Sofia Elizabella Wyciślik-Wilson -
vulnerability

Adobe preparing fixes for the Windows and OS X versions of Acrobat and Reader

If you're an advanced user utilizing Adobe products then you likely know the inherent perils of some of the company's platforms. Adobe has gone as far as to instigate its own version of Patch Tuesday, and that will be rolling around in just a few days.

It's aimed at fixing critical flaws in Acrobat and Reader across both the Windows and Apple platforms. These aren't new offenders, as Adobe software has been plagued by problems for sometime now. However, like Windows, it's partially because it's a major target -- the majority of people use Reader for opening PDFs, despite there being very good alternatives available.

By Alan Buckingham -
Shaking hands

Intel Security and AirWatch team up to boost mobile protection

Intel Security has expanded its partnership with VMWare’s enterprise mobility subsidiary AirWatch, placing a greater emphasis on mobile security initiatives.

The two companies aim to help organizations cope with the numerous security issues posed by mobile devices, as well as integrating enterprise protection across PCs, operating systems, networks and the cloud.

By Sam Pudwell -
business-security

Finding the right balance between business security and employee productivity

Don’t you wish you could give your users all the access they need, without worrying about them becoming frustrated with the increased security measures put on the business and then taking actions into their own hands to avoid those security measures in order to remain productive? Simply providing users with IDs and passwords for each application or data set will not keep your business secure…or productive... anymore. A truly successful security strategy must look at information in context, exploring the "who, what, when, where, and why" of access activities. Your strategy must understand where gaps exist, while supporting secure and convenient access to both legacy and emerging applications for users -- who expect to stay productive -- and the IT staff responsible for keeping the business secure.

The theory behind security is noble: IT should ensure that only approved users can access systems and data, that they access them only for the right reasons, and that they’re doing the right things once they’ve gained access. In practice, though, security has been a static process of IT administrators saying "no", denying access and placing barriers (multiple passwords and access protocols) between users and the resources they need to do their jobs.

By Bill Evans -
Malicious email

New malware attack targets WhatsApp users

A new malware campaign is aiming specifically at businesses and consumers using the WhatsApp mobile messaging service.

Uncovered by researchers at Comodo Labs the campaign uses emails masquerading as WhatsApp content. These have an attached zip file containing a malware executable.

By Ian Barker -
oscobo_search_engine

Oscobo is a privacy-focused search engine that won't sell your data

Using the web can mean selling your soul to the devil. Or Google. (Which you may well regard as the same thing.) With the increased interest in privacy there is a new market for tools and services that help to protect users. Catering to web users who are concerned about how Google might use search data, Oscobo is a new search engine that promises not to track users.

Founded on the belief that "personal data should remain just that -- personal", Oscobo is a UK-based company that says it won't store any data about its users, let alone share it with anyone else. With the controversy surrounding the snooper's charter, it makes sense that the privacy-focused search engine should start life in the UK, but there are plans to expand further afield to provide tailored results for people around the world.

By Sofia Elizabella Wyciślik-Wilson -
digital monitoring

Vulnerability puts users of privacy-focused Blackphone at risk

Blackphone is marketed as the most secure Android phone available so it's bad news that researchers at endpoint protection specialist SentinelOne have uncovered a vulnerability in the Blackphone One that would allow some of the phone’s protection features to be bypassed.

The vulnerability means that apps could be installed without asking for permissions, so they could access features and information on the phone without the user’s knowledge.

By Ian Barker -
Keyboard Lock

No backdoors thanks, we're Dutch

Unlike other countries, notably the UK and China, that have been busy passing laws to allow them to snoop on encrypted communication, the Dutch government has decided that strong encryption is vital to the health of its digital economy and the privacy of its citizens.

The country's minister of security and justice Ard van der Steur writes in an official statement that the Dutch executive cabinet endorses, "...the importance of strong encryption for Internet security to support the protection of privacy for citizens, companies, the government, and the entire Dutch economy. Therefore, the government believes that it is currently not desirable to take legal measures against the development, availability and use of encryption within the Netherlands".

By Ian Barker -
Google Nexus 5X

Google Nexus 5X: An Android Marshmallow smartphone worthy of your attention [Review]

Phones have been gradually getting bigger in the past few years. That makes for better displays for watching videos and viewing documents and web pages, but there’s a downside too.

For many people it makes them more awkward to carry around and can mean they’re harder to use as a phone because you need two hands to operate them.

By Ian Barker -
identity thief

A home alarm system that could make you less safe

These days almost everything is online thanks to the internet of things. That can, of course, be good since it allows you to control and monitor devices from wherever you are. It can also be a problem as we've seen. Sometimes the security of these devices is a bit lacking. I fully expect that one day one of my colleagues here will turn off my lights just because he can.

A bigger problem arises when the security weakness is actually your home security system. That seems to be the case with Texecom as UK-based security researcher Luca Lo Castro found out when he purchased the system.

By Alan Buckingham -
security magnifying glass

Global eDiscovery market passes $10 billion

The eDiscovery process of extracting data for regulatory or legal purposes is generally seen as a bit of a niche in the IT field.

However, a new study by research specialists IDC forecasts that the market for worldwide eDiscovery services reached $8.2 billion at the end of 2015. This combined with an eDiscovery software market of just over $2 billion means the global eDiscovery market has passed the $10 billion threshold.

By Ian Barker -
ransomware key

Ransom32 is JavaScript-powered ransomware affecting Windows, Mac and Linux

Cross-platform viruses and malware are something of a rarity, but now there's a first-in-its-class JavaScript-based ransomware that can infect Mac, Windows and Linux. Ransom32 uses the Node.js runtime environment running on the NW.js platform to burrow into the target operating system and hold files to ransom.

While on the face of it, this is just another example of ransomware that encrypts files and seeks Bitcoin payments to decrypt them, it is more than that. The NW.js framework not only allows for cross-platform infections, but also means it is harder to detect. Ransom32 bears some resemblance to CryptoLocker and has been dubbed Ransomware-as-a-Service.

By Sofia Elizabella Wyciślik-Wilson -
wild_west_gun

New World Hackers take Trump offline -- but when does hacking vigilantism infringe on free speech?

My colleague Brian Fagioli has referred to the web being rather like the Wild West. I'm inclined to agree, but that's not to say that we have reached the same conclusion for the same reasons. For me, the web -- like the Wild West -- is not a world filled with danger, but one occupied by vigilantes. As a proponent of free speech, I find this concerning. One of the most highly-lauded of vigilantes is the disparate group marching under the ragged banner of Anonymous.

One of its taglines is 'We Are Anonymous', a phrase that can be uttered by anyone as there is no membership process -- if you say you are part of Anonymous, you are part of Anonymous. The group is not, for the most part, organized. Individuals and factions can fight for or against whatever cause they want, just like real-world vigilante groups. But Anonymous is not alone. There are hacking collectives and other online crusaders who see fit to take the law into their own hands. This might sound wonderful, but it's not necessarily a good thing. As New World Hackers demonstrate, attacks can target the wrong people and restrict free speech.

By Sofia Elizabella Wyciślik-Wilson -
vulnerability

Windows doesn't top the vulnerability list for 2015, but Microsoft as a whole does

Software vulnerabilities are a daily event it seems, but some systems just have more of them. When we think of this a couple of names usually spring to mind -- Flash and Java. However, according to the new list being published by CVE Details, they aren't quite at the top, nor is Microsoft's oft-maligned operating system.

Basing its numbers on "distinct" vulnerabilities, the security firm has released its top 50 naughty list of 2015. Leading the way was, in fact, Apple, which claimed the top two spots -- Mac OS X with a number of 384 vulnerabilities, closely followed by iPhone OS (or iOS as most people like to call it) with 375.

By Alan Buckingham -
Load More Articles