Last week here in Backspin I discussed how real-world "things" that aren't easily augmented with digital instrumentation, such as bicycles, cars and even dogs, can be indirectly connected to the Internet of Things (IoT) using physical ID tags and online proxies. This is, as I pointed out, a...
What could be better than a portable hard drive? A battery-powered portable hard drive that provides its own Wi-Fi hotspot, of course. Corsair's Voyager Air and Seagate's Wireless Plus command hefty price premiums compared to more ordinary drives, but they are also extremely convenient.
The recent RSA conference in San Francisco was awash in talk of big data, but it was clear there was some disagreement about what people mean by big data and some outright skepticism about it being the answer.
Any business that anticipates using cloud-based services should be asking the question: What can my cloud provider do for me in terms of providing digital forensics data in the event of any legal dispute, civil or criminal case, cyberattack or data breach?
In another breakthrough for China's anti-piracy efforts, four major record labels have signed a deal to license music to a Chinese Internet firm in exchange for royalties, after the company had previously been accused of hosting links to illegal music downloads.
It may be time to brace yourself for the post-crypto world, according to Adi Shamir, one of the founding fathers of public-key cryptology. Shamir's comments came at this week's RSA Security conference.
Symantec today began offering multi-algorithm SSL certificates for Web servers that go beyond traditional crypto to include what's known as the Elliptic Curve Cryptography (ECC) Digital Signature Algorithm (DSA), which the firm says will be 10,000 times harder to break than an RSA-bit key....
RSA, the security division of EMC, today announced Security Analytics, its tool for real-time analysis of large amounts of data from security and business information to determine if an organization is being attacked, especially by stealthy threats intent on stealing sensitive information.
Cryptography Research, known for its crypto system-breaking stunts, will be at it again at the RSA Conference in San Francisco next month when it shows a way to steal encryption keys off hardware chips and smart cards.
RSA, the security division of EMC, is looking to big data for the future of security, arguing that applying analytics to massive amounts of data related to users, their devices and network management will be increasingly important to detect fraud and cyberattacks.
The Security for Business Innovation Council, comprised of IT security professionals from 19 companies worldwide, called cloud computing the main disruptive force for 2013. In its report, "Information Security Shake-Up," the group said it was evident many organizations are preparing to move more...
The concept of the Internet of Things is a powerful one. You take a device that can be monitored and or controlled in the physical world and connect it to the 'Net such that it has a virtual doppelganger online. This not only allows for things in the real world to be controlled by computers, it...
To hear Rod Canion and his fellow co-founders of Compaq Computer Corporation tell it, Compaq was an amazing company during its 20-year existence. From humble beginnings on farmland north of Houston to the Fortune 500 list, Compaq was the undisputed global leader of the PC industry for a number of...
The questions are being asked more often: When a cyberattack hits your network, is it right to launch a counter-attack of some type to try to at least identify the source if not stop it? Since the wheels of justice do indeed grind slowly, should frustrated IT professionals with security skills take...
RSA, the security division of EMC, today announced a security product intended to protect simple passwords stored within businesses for authentication purposes, by splitting these passwords in two pieces kept separately, in theory making it harder for hackers to get hold of them.
RSA is readying a product it calls Security Analytics whose purpose is basically to transform the company's traditional security information and event management (SIEM) product, EnVision, into a hunter of stealthy attackers, and a forensics tool to analyze attacks.
Industrial Ethernet switches and other devices produced by industrial networking equipment manufacturer RuggedCom contain a vulnerability that could be exploited to compromise SSL-based communications between them and their users, according to a security researcher from security startup Cylance.
RSA Wednesday introduced a service at the Black Hat Conference to monitor far and wide for signs of phony corporate mobile apps, and to work with Google Play, Apple iTunes and other major app stores to remove them quickly.
Horace Dediu writes data-driven analyses on a wide range of mobile industry topics. He is the founder and author of Asymco, a blog for "curated market intelligence," and previously worked for eight years at Nokia, as an industry analyst and business development manager.
Get it while you can, is the cry from the denizens of the Russian-speaking malware underworld regarding the Citadel Trojan, offered openly for $2,500, plus more for plug-ins and a monthly fee for "membership" in Citadel's crimeware syndicate. But now the Citadel gang is taking the malware off the...
Five years ago today, the original iPhone went on sale. Since then, to its growing legions of users, the iPhone has become less a gadget or machine, and more a personal means of relating to a wider and richer world.
Cisco's Linksys brand of home wireless networking routers today joined other vendors in coming out with 802.11ac equipment, as well as enabling a cloud-based platform for configuration and control of its "Smart Wi-Fi Routers."
The larger and more complex an organization's processing environments are, including cloud instances, the more challenging the process of application deployment. Automation tools support the best practice of keeping these apps updated for peak performance, capability and security.
According to reports, Apple doesn't want to hand over depositions from late CEO Steve Jobs and vice president of internet software and services Eddy Cue, as part of a class action case against Universal Music Group.
Attackers used smaller businesses with less stringent security as gateways to their ultimate targets -- large corporations or governments that hold valuable secrets, according to a Symantec report on Internet security.
LightSquared has a further two years in which to seek regulatory approval for its LTE mobile network in the U.S. before it must begin making payments to its radio spectrum supplier Inmarsat, the companies announced Friday.
Managing the petabyte-scale and larger data stores that are a fact of life with Big Data is a different beast than managing traditional large-scale data infrastructures. Online photo site Shutterfly--which manages more than 30 petabytes of data--shares its strategy for taming the storage beast.
Email phishing scams have grown more sophisticated since they first began popping up in corporate inboxes in the 1990s. Early phishing emails were relatively easy to detect as they were characterized by poor grammar and spelling. No legitimate business would send an email to customers chockfull of...
As Congress wrestles over cybersecurity legislation related to securing critical infrastructure and the electric power grid, arguments are surfacing on whether the power companies should handle any new federally mandated network protections or whether the U.S. government -- in particular the...
The leaders of the Department of Defense and the Federal Bureau of Investigation this week separately expressed concern over the increasing numbers of cyberattacks, with FBI Director Robert Mueller saying that while terrorism remains the FBI's top priority, "in the not too distant future, we...
Concern about cyberterrorism was evident this week among security experts at the RSA security conference in San Francisco, who find that some people with extremist views have the technical knowledge that could be used to hack into systems.
They're out there, says security researchers: the Chinese hackers attempting to break into U.S. enterprises, and jihadist terrorists that brazenly post videos of sniper killings, while stealing credit-cards to launder money for funding nefarious campaigns in Mideast or Caucasus hot spots.
Consumer desire for unnecessary features has encouraged the development of insecure and unreliable software products, said Tenable Network Security CSO Marcus Ranum, during a debate on Wednesday about software liability at the RSA security conference in San Francisco.
Over 90 percent of data breaches are the result of external attacks and almost 60 percent of organizations discovered them months or years later, Verizon said in a report released at the RSA security conference on Wednesday.
Is the RSA cryptosystem flawed or is the recent sharp criticism of it the result of poor — or even malicious — implementation of key-generation techniques that appear to have rendered some RSA-based encryption keys crackable?
On June 2nd, 2011, the antisec hacker group known as LulzSec launched a web site. Although they had been an active hacking group for several weeks, the creation of Lulzsecurity.com was their first official web presence other than the Twitter account they had been using.