NSA ends surveillance tactic that pulled in citizens’ emails, texts

The U.S. National Security Agency will no longer sift through emails, texts and other internet communications that mention targets of surveillance. The change, which the NSA announced on Friday, stops a controversial tactic that critics said violated U.S. citizens’ privacy rights. The practice involved flagging communications where a foreign surveillance target was mentioned, even if

Continue Reading

Sift Science uses machine learning to help businesses reduce fraud without impacting the user experience  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.   Companies that provide online transactional services to consumers or other businesses have to be concerned about fraud. Whether it is renting hotel rooms to travelers, selling books to avid readers, arranging shipping services for hard goods, or any

Continue Reading

Network management vulnerability exposes cable modems to hacking

Hundreds of thousands of internet gateway devices around the world, primarily residential cable modems, are vulnerable to hacking because of a serious weakness in their Simple Network Management Protocol implementation. SNMP is used for automated network device identification, monitoring and remote configuration. It is supported and enabled by default in many devices, including servers, printers, networking

Continue Reading

Users have little confidence their company can protect their mobile device

A survey sponsored by Check Point Software Technologies Ltd. found that 64 percent of respondents are doubtful that their organization can prevent a mobile cyberattack, leaving employees’ personal information vulnerable to theft. Alvaro Hoyos, chief information security officer at OneLogin, said that number does not surprise him. He said the employees might not know the

Continue Reading

Book Review: Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

The overall equation is pretty simple: If you want to understand network traffic, you really should install Wireshark. And, if you really want to use Wireshark effectively, you should consider this book. Already in its third edition, Practical Packet Analysis both explains how Wireshark works and provides expert guidance on how you can use the

Continue Reading

Cloudflare wants to secure IoT connections to the internet

Many people are worried about putting smart internet-connected devices in their homes or offices because of flaws that could allow attackers into their private networks. Web optimization and security firm Cloudflare is trying to alleviate those fears with a new service that could allow internet-of-things manufacturers to protect devices from attacks and deploy patches much

Continue Reading