Post-Snowden, Americans Leery on Web Privacy

Posted In Data, Living in Tech
Pew Research Center Survey
The Edward Snowden revelations about the extent of the U.S. government’s electronic surveillance are no longer breaking news, which means it’s time to see whether those disclosures had a long-term effect on how Americans perceive their privacy, and how they protect their data online. Fortunately, some new survey data from the Pew Research Center provides insight into those very questions. While a majority of Americans (9 in 10) have heard about the U.S. government’s extensive surveillance programs, only a third… continue…

Meet BlackBerry’s $2,360 Tablet

Posted In Living in Tech, Mobile
Screen Shot 2015-03-16 at 11.34.55 AM
BlackBerry is getting back into the tablet game with a $2,360 device that— Wait, what? That price wasn’t a typo: Even as the tablet market stagnates, and brands rush to price smartphones and tablets as low as possible, BlackBerry has decided to go ultra-ultra-ultra premium with its latest device. Why? Because the so-called SecuTablet is (supposedly) secure enough for a broad range of government and enterprise work. In terms of hardware, the SecuTablet is a modified Samsung Galaxy Tab S… continue…

Interview Tips for Data Security Analysts

Posted In Data, Looking in Tech
shutterstock_Maksim Kabakou
It’s easy to argue that the most significant issue facing technology today is the security of online data. As demonstrated by recent mega-breaches, IT security pros can barely keep up with increasingly sophisticated threats, and the need for talent with a solid security skill set is therefore great. The security field needs critical thinkers, not just candidates with good resumes. These top-notch practitioners want to know “why” something happened, not just “how,” and they’re not always comfortable following a list… continue…

Getting Rid of Lenovo’s Superfish Vulnerability

Posted In Data, Living in Tech
As you may have heard by this point, Lenovo loaded an adware package called Superfish Visual Discovery onto many of its devices. Annoying? Absolutely: Nobody likes an add-on that inserts sponsored links into your search results. But Superfish became downright dangerous when security researchers realized it could easily double as a handy tool for a man-in-the-middle attack, thanks to its ability to always appear as a “Trusted Party” to websites. The revelations have left Lenovo scrambling to repair the damage.… continue…

10 Reasons Why You Need a Cybersecurity Plan

Posted In Data
shutterstock_Sergey Nivens
Over the past year, we’ve witnessed all the hype surrounding cybersecurity finally transform into a frightening new reality, one where corporate and government organizations seem helpless to stop cyberincursions. No need to list statistics or polls anymore to try to quantify the threat: Cyberattacks have become nonstop headline news. The transformation from perceived threat to actual headlines has occurred for the following reasons: Hacking, cracking and other forms of cybermischief have reached a level of sophistication equaling (and in many… continue…

Auto-Deleting Emails: The Next Hot Feature?

Posted In Data
The ability to archive and search through email is a valuable business tool: Who hasn’t cycled back through a year’s worth of messages to find an important piece of data? But email, despite all its obvious value, also has a downside: If unauthorized users gain access to the server holding all those messages, they can quickly learn your secrets. Just look at what happened to Sony after a few determined hackers penetrated its IT security: Not only did a trove… continue…

How I Made the Leap to IT Security

Posted In Data
Fifteen years ago, the landscape of IT was so fluid you could almost pick your specialty and start working. The need for computer engineers was so great, that anyone with some ambition could go far reasonably fast. Document services specialists—who type for a living—were moving into application deployment. A night security guard who spent his time studying Novell became a certified Novell administrator. I worked in a copy center in a small law firm and became their network administrator literally… continue…

SourceForge Q&A: Open-Source Antivirus Engine

Posted In Programming
SourceForge’s February “Community Choice” Project of the Month is ClamAntiVirus, a GPL antivirus toolkit for UNIX that integrates with mail servers. The ClamAV team sat down with SourceForge’s editors to share their thoughts about the project’s history, purpose, and direction. Check out the latest open source development jobs. Tell me about the ClamAV project, please. ClamAV is an open source (GPL) anti-virus engine used in a variety of situations including email scanning, Web scanning, and end point security. It provides… continue…

White House Issues Report on Big Data, Privacy

Posted In Data
shutterstock_Orhan Cam
In early 2014, following months of revelations about the degree of NSA spying on Americans’ electronic communications, President Obama ordered a government review of how “Big Data” will affect how people live and work. Check out the latest Big Data jobs. Roughly a year later, a report has arrived (PDF), with recommendations for preserving Americans’ online privacy protections. According to the report’s authors, “technology alone cannot protect privacy absent strong social norms and a responsive policy and legal framework.” The… continue…

Google Paying Out Grants to Bug-Hunters

Posted In Data
For security researchers who specialize in hunting down bugs, Google just made the profession a tad more lucrative. Over the past five years, Google has paid out more than $4 million to roughly 200 security researchers who have discovered bugs in its software. (In total, those researchers have discovered more than 500 bugs.) For some bug-hunters, that work has opened the door to a full-fledged career: George Hotz, a 25-year-old hacker, earned the largest award ($150,000) in 2014 for discovering… continue…