Euro 2016 app leaking private user data
I’ve been trying not to think about Euro 2016 after England’s whimpering exit on Monday night, but new research from mobile security and management firm Wandera has grabbed my attention.
According to analysis of data traffic patterns from enterprise mobile devices, the official UEFA Euro 2016 Fan Guide App is leaking user’s personal information -- including usernames, passwords, addresses and phone numbers -- over unsecure internet connections.
What makes an adversary profile invaluable?
One of the most common questions I am asked when collaborating with customers is "…what makes a useful adversary profile?" The easy answer is any summary that allows your team to make faster and more accurate decisions when push comes to shove, but the deeper answer is more artful than scientific. Adversary profiles are the intelligence intersection across a team’s defensive efforts and can demonstrate a distinction from teams who have made a conscious decision to transform from 'whack-a-mole' to 'know thy enemy'.
So…What makes an invaluable adversary profile? Here are a couple points you should consider when structuring an adversary blueprint.
Most enterprises use Internet of Things devices
HPE will lose its CTO and COO by 2017
Hewlett Packard Enterprise (HPE) will be losing its CTO Martin Fink and its COO John Hinshaw at the end of 2016. Fink, who was the head of HP Labs, is set to retire after spending over 30 years at the company.
In a corporate blog post, Meg Whitman, the CEO of HPE wrote: "Martin has had a remarkable career, driving some of our most important initiatives including our cloud, open source and Linux strategies and leading the Business Critical Systems division".
IT pros training CEOs to spot phishing attacks
Out of 300 IT professionals attending the Infosecurity Europe conference, almost half (49 percent) believe their CEO has fallen victim to a targeted phishing attack.
The results have been published in a new paper by unified security management and crowd-sourced threat intelligence company, AlienVault.
Public Wi-Fi is unsecure
People are aware of the risks that come with using Wi-Fi, but generally believe public hotspots, like those on airports, are secure. Those are the results published in Norton’s latest Wi-Fi Risk Report 2016, which said 64 percent of UK’s adults assume public Wi-Fi is safe enough to use.
However, Norton says this couldn’t be further from the truth.
Workers find meetings productive
You’ve probably heard it a million times, how meetings are actually a waste of time and do little good. You’ve also heard how people usually browse social media and look at the ceiling during these meetings, and that it would be more productive watching paint dry.
Turns out, this couldn’t be further from the truth. Unified communications solutions company ShoreTel conducted a research into what the current workforce thinks about meetings, and the overall opinion is vastly positive.
Apple pays just £12.9 million in UK taxes
By booking sales through its international headquarters in Ireland, Apple was able to only pay £12.9 million in UK corporate tax during 2015. This is a nine percent increase from the previous year, in which it paid £11.8 million.
The European Commission has been investigating Apple’s tax arrangements in Ireland for two years now and the results of the probe are set to be released as early as next month. If the company’s tax arrangements are found to be unlawful, it could end up repaying billions to the Irish state.
Security researchers find major vulnerabilities in Uber
A group of hackers from a security company in Portugal managed to hack into Uber and get their hands on a bunch of data that should remain hidden.
The team of three experts, Vitor Oliveira, Fábio Pires and Filipe Reis from Integrity, found a total of six flaws: they managed to use promotion codes, found private emails using UUID, found users’ phone numbers, created driver accounts, validated them, found where you went, who your driver was, and who you are and, ultimately, date of the trip, driver name and picture, the ID and the cost of the trip. The route map was also disclosed.
Organizations must transition from legacy 'wet ink' signatures to a 'digital' format
Even in today’s highly digital, technology-driven business environment, many organizations demand wet ink signatures for important business critical documentation. This is when, say a contract in an electronic format for a new deal could be signed and sent via email within minutes -- compared to wet inking it, scanning (sometimes running into 100s of pages), and posting to the other party, who then would follow the same process to send a signed copy back.
It’s a hugely inefficient, time consuming and inconvenient process. But it’s a corporate policy that many businesses insist on.
IBM Summit will be the world's fastest supercomputer
After it was reported that China has the world’s fastest supercomputer, IBM unveiled a few details about its upcoming behemoth, which is already branded as the computer that will dethrone the Chinese Sunway TaihuLight.
IBM's supercomputer is called Summit. It is expected to reach US Department of Energy’s Oak Ridge National Laboratory in early 2018, and should have a quarter more computational power than originally intended.
Intel Security is up for sale
Intel is looking for a buyer for its Intel Security. Intel Security, previously called McAfee, was bought from the security firm McAfee back in 2011 for $7.7 billion (£5.75bn).
Intel rebranded the company as Intel Security, and aimed to implement its security features at chip level, giving cyber-security a whole new dimension. It seems, though, six years later, the plan had failed.
Crucial introduces NVDIMM persistent server memory
There’s a new type of server memory which might speed up backup restore and recovery, as well as help with salvaging any data left unsaved during a power outage.
Memory and storage upgrade company Crucial has announced its Nonvolatile DIMM (NVDIMM) server memory. The company says this type of memory is a better choice for servers because it offers better read and write speeds than HDD or SSD disks, allowing for speedy backups and recoveries.
Choosing an enterprise mobility program -- it's about combining ease with benefits
Technology is moving at warp speed, and any business who chooses to side-step the most-current innovations in that field is, quite literally, choosing to be left behind. Thousands of companies have successfully built their own apps through the use of an enterprise mobility platform.
Here, we will discuss what features to look for when choosing the best enterprise mobility platform for your business' particular needs.
Red Hat buys API management company 3scale
The open source software company Red Hat has just announced that it will acquire 3scale for its software which manages application programming interfaces (APIs).
The deal is not crucial to Red Hat though it does plan to "open source the code in the Red Hat way", according to a blog post from the vice president and general manager of middleware at the company, Mike Piech. The company also said that its GAAP operating expenses will increase by $7 million during the 2017 fiscal year.
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.