Search Results

Results 1021-1040 of 1979 for John P. Mello Jr.
SPOTLIGHT ON SECURITY

Bug Bounties Entice Researchers to Don White Hats

Bug bounty programs are used by individual software makers to improve the quality of their products, but they can have incidental benefits for all software makers, too. One of those is to encourage bug hunters to wear a white hat instead of a black one ...

Report: Connected Vehicles Vulnerable to Hack Attacks

Motorists in the United States are increasingly at risk of cyberattacks and violations of privacy, as more and more technology is added to their cars ...

FCC Chair Submits New Approach for Net Neutrality

Some proposed rules that the Federal Communication Commission maintains will prevent content discrimination on the Internet drew fire on Thursday from two policy interest groups ...

Promoted Tweets Fly the Coop

With Wall Street breathing down its neck for growth, Twitter on Tuesday launched a new advertising initiative that aims to boost revenues and add to its more than 284 million members ...

SPOTLIGHT ON SECURITY

Is the FTC Jumping the Gun on IoT Security?

For months, the security community has been waving a red flag about how the nascent Internet of Things could become a cybercriminal's paradise. Last week, those admonitions were given some credence when the Federal Trade Commission recommended that the makers of IoT gadgets adopt some "best practices" to protect consumers from potential violations of their privacy and security...

Google Expands Bug Bounty Program

Since 2010, when it began paying security researchers to find flaws in its programs, Google has paid more than US$4 million to bug hunters. Now it's prepared to pay even more ...

Amazon WorkMail Lifts Back-End Email Burden From IT’s Shoulders

Amazon on Wednesday announced WorkMail, a play for the enterprise email market. Offered by Amazon Web Services, WorkMail is aimed at companies that want to move their on-premises email services to the cloud ...

Twitter Adds Cliques and Flicks

Twitter on Tuesday announced two new offerings that could bolster its efforts to compete with Facebook. The new tools will let users create private groups of up to 20 members; they also will be able to shoot, edit and share video from within Twitter's mobile app ...

SPOTLIGHT ON SECURITY

POS Terminals Rich Vein for Gold-Digging Hackers

Hackers are like gold miners. Once they find a rich vein for their malware, they mine it until it's dry.Point-of-sale terminals are such a vein, and it doesn't appear that it's one that's about to run dry any time soon ...

Wikileaks Steamed Over Google’s Lengthy Silence on FBI Snooping

Google may have contributed to violating the First Amendment rights of three journalists working for WikiLeaks two and a half years ago, when it turned over to the FBI all their email, subscriber information and metadata ...

Chen Calls on Congress to Mandate BlackBerry Apps

BlackBerry CEO John Chen set off a barrage of online chatter Wednesday when he proposed that any rules the United States adopts to preserve Net neutrality also should guarantee application neutrality ...

Report: Dumb Password Use on the Decline

Millions of Net surfers use obvious passwords to log on to websites, but their numbers appear to be declining ...

SPOTLIGHT ON SECURITY

Businesses Waste Big Bucks Fighting Phantom Cyberattacks

Businesses spend an average of US$1.27 million a year chasing cyberthreats that turn out to be dead ends. That is one of the findings in a report released last week on the cost of containing malware ...

Apple Stylus Rumor: Taking Care of Business?

Apple will introduce a stylus to accompany its expected new, larger iPad, an analyst with a good scorecard in predicting Apple products wrote in a research note on Sunday ...

Verizon’s Cookies Never Crumble

Verizon advertising partner Turn is using the carrier's Unique Identifier Header, or UIDH, to maintain tracking cookies on smartphones even after privacy-minded users have deleted them, Jonathan Mayer, a computer scientist and lawyer at Stanford University, reported this week ...

Docker Security Questioned

Security questions recently have been raised about Docker, a promising technology for running applications in the cloud. Docker is an open source initiative that allows applications to be run in containers for flexibility and mobility only dreamt of in the past ...

SPOTLIGHT ON SECURITY

Sony Sortie’s Smoking Gun Still Missing

Recent research from security firm Cloudmark has raised doubt about the purported connection between North Korea and last November's intrusion on Sony Pictures Entertainment's computer networks ...

The Convoluted Trail Linking North Korea to Sony

FBI Director James Comey has "very high confidence" that North Korea was behind last November's cyberattack on Sony, he said at a cybersecurity forum held last week at Fordham University. The attack resulted in large amounts of intellectual property, confidential communications and employee data being posted on the Internet for public view ...

Data Breach Law Tops Obama Privacy Initiatives

A proposed national data breach reporting law, aimed primarily at protecting consumer privacy, headlined several initiatives the Obama administration announced Monday ...

Thieves Take $5M Bite Out of Bitcoin Exchange

An estimated US$5.2 million was stolen over the weekend from Bitstamp, a digital currency exchange.It has suspended services pending an investigation ...

LinuxInsider Channels