The RSA Conference next month will be missing “booth babes”.
According to a post by security expert Bill Brenner on the LiquidMatrix blog:
“All Expo staff are expected to dress in business and/or business casual attire. Exhibitors should ensure that the attire of all staff they use at their booth (whether the exhibitor’s direct employees or their contractors) be considered appropriate in a professional environment. more»
Biometric systems, particularly in relation to smartphones, look like they’re going to boom during this year.
ABI Research, a market analysis company, said that worldwide revenues for such systems will deliver $3.1 billion this year.
The systems will be targeted not only at home users but at authentication systems for the enterprise market, according to ABI. more»
For years the most basic method of super security for a computer was to unplug it from the network or internet.
However a team of security experts from Ben-Gurion University of the Negev (BGU) have discovered a new method to breach air-gapped computer systems. more»
Search engine Google is furious that an Egyptian networking company managed to clone its security certificate.
According to Google’s bog, the search engine became aware of unauthorised digital certificates for several Google domains. The certificates were issued by an intermediate certificate authority apparently held by a company called MCS Holdings. more»
Francis Maude, minister for the Cabinet Office in matters of cyber security, said that the UK and Israel have established three collaboration ventures to get government funding for cyber security.
The governments will contribute £1.2 million of funding to create a bilateral cyber research programme, he said. more»
The Ponemon Institute and IBM have jointly released a report which they said displays “the alarming state” of mobile insecurity.
According to the research, 40 percent of large companies – including many in the Fortune 500 – aren’t protecting the mobile apps they build. more»
Opera Software bought a Canadian company called SurfEasy, for an undisclosed amount.
SurfEasy has a VPN (virtual private network) system aimed at securing smartphones, tablets and PCs, Opera said.
A VPN adds an extra level of net security to filter traffic between the web nd devices. more»
FORMER NSA and NASA staffer Patrick Wardle, who heads up research at security start-up Synack, he has found a way to bypass protections in Apple Macs without getting caught.
Download files, known as .dmg files, for products including Kaspersky, Symantec, Avast, Avira, Intego, BitDefender, Trend Micro, ESET and F-Secure are all sent over unencrypted HTTP lines, rather than the more secure HTTPS. more»
A report from IBM’s security division estimates that in 2014 “at lease” a billion records of people across the world were leaked.
That’s about one in seven of this planet’s humanoid population.
IBM released its X-Force quarterly report and relays information about over 9,000 security “vulnerabilities” affecting over 2,600 vendors in 2014. more»
Qualcomm has announced details of its Ultrasonic Finger Print Reader which is part of its new Snapdragon processor.
The idea is that the tech can be used by smartphone ODMs and OEMs to provide ultrasecurity for their phones.
Qualcomm’s tech uses ultrasonic waves to scan all of the ridges and wrinkles of your fingers. more»
A move that would allow the US government to share cyber information with private companies has been given the nod by a key committee.
The US Senate Intelligence Committee voted 14-1 on Thursday to approve a bill intended to enhance information sharing between private companies and intelligence agencies about cybersecurity threats. more»
While every tech company and its dog is trying to slam their technology into cars, it is starting to look like the automotive industry can’t cope with the need for security.
A Dallas law firm has filed a lawsuit against three major automakers claiming they have failed to take basic measures to secure their vehicles from hackers. more»
Security outfit Tor has said it wants to wean itself off US government cash.
In 2013, Tor received more than $1.8 million from the US government, about 75 percent of the $2.4 million in total annual expenses, according to their latest publicly available tax returns. more»
A security firm made the alarming assertion that Lenovo had pre-installed software on notebooks it sells that makes them more likely to be hacked.
The program called Superfish, which Lenovo installed on computers intended for home use was software that auto-displays adverts. more»
US defence contractor Lockheed Martin sees cyber security as its number one growth area over the next three to five years.
Although it is better known for its jet aircraft, Lockheed Martin is the main provider of IT technology to the US government, said expects double-digit growth in its overall cybersecurity business over the next three to five years. more»