Security

Google Building Kid-Friendly YouTube, Chrome

Posted In Living in Tech
shutterstock_michaeljung
Google wants to make a selection of its products more kid-friendly. In an interview with USA Today, Google Vice President of Engineering Pavni Diwanji suggested that versions of Google search, Chrome, and YouTube designed for the 12-and-younger set could appear within the next year. “We want to be thoughtful about what we do, giving parents the right tools to oversee their kids’ use of our products,” she told the newspaper. “We want kids to be safe, but ultimately it’s about… continue…

Google Wants to Nuke CAPTCHA for Good

Posted In Living in Tech
Google recaptcha API
We’ve all filled out those CAPTCHA tests that websites place at the end of online forms to determine whether we’re human or a bot. Pretty much everyone can agree those tests are annoying—who wants to spend even a few seconds peering at a mush of distorted letters, trying to figure out whether a particularly troublesome one is an “a” or an “o”? Click here to find bot-related jobs. Google’s reCAPTCHA project wants to save the Web from CAPTCHA. The underlying… continue…

Daily Tip: Never Use These Passwords

Posted In Living in Tech
shutterstock Ditty_about_summer
Sony suffered a massive hack late last month, which resulted in a hacker collective not only dumping five of the company’s unreleased films online, but also leaking internal documents. Those documents contained salary data and other employee information. According to Mashable, the hacked files included a folder marked “Passwords,” containing employee usernames and passwords in plain text. Some of the passwords in that folder are truly awful: “Password,” “s0ny123,” and so on. (It’s unclear whether the hackers used that information… continue…

Developers: Stop Using Buggy Code

shutterstock_spaxiax
As researchers uncover one serious flaw after another in widely used software, it’s increasingly clear there are lots of vulnerabilities, everywhere. While there are efforts underway to identify and fix these issues before criminals exploit them, the bigger challenge is stopping developers from using buggy code. There is no such thing as perfect software, but developers can reduce the number of bugs by following secure coding practices. There are also tools which can analyze individual libraries—both open-source and commercial—included in… continue…

Certifications With the Highest Demand

Posted In Looking in Tech
shutterstock_pepgooner
For years, cynical IT pros have maintained that certifications aren’t worth the paper they’re printed on. But recruiters and analysts report a growing interest in IT certification. While it’s true that employers still want to see experience, certification can provide outside validation of your skills… and signal a commitment to furthering those skills. Certifications in these areas are showing some of the sharpest growth in demand: Security The recent breaches at Target, Home Depot and the almost-daily privacy and security… continue…

Best Tips for Secure Data Retention

Posted In Working in Tech
shutterstock Maksim Kabakou
Corporate retailers including Home Depot, Target, Michaels, Dairy Queen, and Kmart have all been victims of security breaches, and are still feeling the aftereffects. In addition to the financial repercussions, even mainstream brands suffer from diminished trust when customer data is compromised. This trust can be difficult to rebuild, and the negative effects are often even more pronounced for small- or medium-sized businesses. To find IT security jobs, click here. Privacy Policies Being upfront with users about how long you… continue…

Americans Fear for Their Privacy Online: Report

Posted In Living in Tech
Pew Word Bubble
Americans fear for their privacy online, according to a new survey of 607 Americans by the Pew Research Center. Given the amount of publicity surrounding last year’s revelations about the extent of the National Security Agency’s spying, it’s no wonder that 87 percent of Americans have heard anywhere from “a little” to “a lot” about the government’s mass collection of electronic communications and telephone calls. (A mere 5 percent had heard “nothing at all.”) For more privacy-related jobs, click here.… continue…

Tech Pros Getting on Cloud 9: Dice Report

Cloud Skills Dice
What’s consistently one of the fastest-growing skills for job postings on Dice, boasts above average salaries, and is changing the way companies—small and large—are thinking about data storage? It’s cloud, and the future for tech professionals with this experience is anything but gloomy. An analysis of searches by hiring managers in the Dice resume database highlighted the key skills companies are looking for from cloud professionals. Not surprisingly, Java is all too important to firms hiring cloud candidates. The programming language and platform… continue…

Observing Shellshock Attacks in the Real World

Posted In Living in Tech
Pavel Ignatov Shutterstock
A look at some of the Shellshock-related reports from the past week makes it seem as if attackers are flooding networks with cyberattacks targeting the vulnerability in Bash that was disclosed last week. While the attackers haven’t wholesale adopted the flaw, there have been quite a few attacks—but the reality is that attackers are treating the flaw as just one of many methods available in their tool kits. Bash is widely used in Linux and Unix systems, and many applications—such… continue…

Penetration Testing Is a White-Hot Industry

Posted In Looking in Tech
Maksim Kabakou Shutterstock
In the wake of high-profile IT breaches at Target and other major corporations, penetration-testing firms are more popular than ever. Companies and government agencies have woken up to the fact that a cyberattack on their data is all but inevitable, and they need employees and contractors capable of discovering vulnerabilities before hackers do. In other words, it’s a potentially lucrative time to explore penetration testing as a career. You could work for the security offshoot of a well-established firm such… continue…