Google and Samsung have challenged university researchers who claimed to have found a major flaw in Knox, Samsung's Android security platform.
The National Security Agency (NSA) is due for an interesting day. Bloggers have received disturbing intelligence that the shadowy agency possesses an ability to monitor off-line computers utilizing small radio transmitters.
While intercepting strong signals from bloggers and news outlets, the agency will also have to decode the recommendations of a FISA review panel. Recommendations that are expected to be announced by American President Barack Obama later today.
In IT Blogwatch, bloggers are bugged by computers and Capitol Hill.
Target loses again.
U.S. retailers Target (NYSE:TGT) and Neiman Marcus have revealed that sensitive credit card and other personal information has been stolen by a gang of "cyber-criminals" that could affect as many as 110 million people. A number which happens to equal one-third of the population of the United States.
But the fun and wargames don't stop there, hack announcements from other retailers are expected to impact any minute now. Explosive as a 20 megaton warhead, the news is alarming consumers, with DEFCON levels escalated by angry Congressmen and bloggers alike.
In IT Blogwatch, bloggers stoically monitor their server logs and bank balances.
Study finds hacked versions of the most popular apps on Google Play and the App Store are also sold on third-party sites.
iSight fright might blight your night.
Apple (NASDAQ:AAPL) webcams are vulnerable to silent malware attack. It's long been believed that nobody can turn on your iSight webcam without the light illuminating. However, security researchers have shown that to be false. They say the design flaw isn't only limited to the earlier models that they demonstrated it on. In IT Blogwatch, bloggers reach for the electrical tape.
Samsung's Knox security platform isn't ready for prime time, and customers are not happy.
With the number of Internet-enabled devices growing by the billions, now is the time to refuse to buy insecure products.
Rather than treat security on smartphones and tablets as something new, companies should see it as an extension of the same tactics used for years to lockdown data.
A new iPhone/Mac app called Knock is a solution in search of a problem that could cause some embarrassing situations for users.
Are you drawing the right conclusions from your favorite security vendor’s 2013 threat report? I hope so, but I talk with a lot of security executives that miss the opportunity to use these reports as stimulus to re-examine their security strategies. The importance of threat reports what the trends mean to your security practices and not-so-much the details of individual threats.