3.1 C
London
Friday, November 17, 2017

Aereo CEO: No “Plan B” for court loss

CBS counters that it will move broadcast service online if Aereo prevails.

Senator who called for a US ban on Bitcoin now backs...

Manchin tells WashPost: "The whole thing lent itself to a lot of improprieties."

Piracy notwithstanding, MPAA enjoys a “very strong year”—again

China, that "most notorious" market, sees legit sales rise 27 percent.

Ongoing health exchange tech problems force enrollment deadline extension

HHS loosens rules to accommodate those still stuck in enrollment-site hell.

Judge denies gov’t request to search suspect’s iPhone in ricin case

Georgetown U student told FBI he learned to make the poison via his iPhone.

BlackBerry Secure Work Space for iOS, Android Gets FIPS-Certified

BlackBerry's Android-supporting solution is now secure enough for the White House. (Oops.) In other security news: BlackBerry suffered a break-in. BlackBerry's Secure Work Space for iOS and Android has received Federal Information Processing Standards (FIPS) 140-2 certification. Secure Work Space is a containerization solution for supporting multiple mobile platforms that is managed through BlackBerry Enterprise Service 10 (BES10). It ensures that data is protected—on the device and while in transit—even on employee-owned smartphones and tablets. IT administrations can configure, secure, wipe and interact with content only within the Secure Work Space. The FIPS 140-2 certification makes the BlackBerry solution secure enough for use by even the most security-focused organizations, including the U.S. and Canadian governments, BlackBerry said in a March 26 statement.   The White House, and the team responsible for President Obama's communications, have been testing solutions from Samsung and other vendors, giving rise to talk that BlackBerry's highest-profile user could some day follow the mass trend and make the switch to Android. BlackBerry told eWEEK in a March 21 statement, "Governments test new technologies frequently, but nonetheless the U.S. government continues to choose BlackBerry for its unmatched security and cost effectiveness."  BlackBerry CEO John Chen recently visited the White House. While the media framed the visit as Chen doing his best to ensure his highest-profile customer remains a customer, Chen characterized the visit, during a Bloomberg Television interview, as a "customer outreach" effort, adding that White House officials "were nice enough to share some of their thoughts with me." President Obama is the first U.S. president to carry a smartphone—a specially equipped BlackBerry unit that in the early days of his presidency was dubbed the "BarackBerry." When Curiosity Turns Criminal In other BlackBerry security news, someone has gotten hold of secret product news, and CEO Chen is fighting mad. "One of the most frustrating things for all of us at BlackBerry is when a critical and confidential project is reported in the media before we are ready to discuss it," Chen said in a March 26 blog post. "Leaks are, at their best, distracting, and at their worst downright misleading to our stakeholders. The business implications of a leak are seldom advantageous." Chen went on to explain that someone "falsely posed as an employee of one of our carrier partners," obtained access to secured networks, got hold of confidential information about a future BlackBerry product and made that news public. The company is now pursing legal action (which isn't its first legal effort since Chen became CEO), just as it will always go after folks, within or outside the company, who leak information. The result may be fewer reports of leaked BlackBerry images or data, said Chen. "But rest assured that we're committed to communicating our biggest updates to you early and often—when they are ready to be shared." Follow Michelle Maisto on Twitter. 

Ninety-six per cent of UK charities struggling to manage customer data...

Ninety-six per cent of the UK's not-for-profit organisations, including Cancer Research UK, are unable to manage increasingly large amounts of customer data, which is hitting fundraising, and potential to expand, as the world moves into the big data age. So says a report from Advanced Computer Software, which also reveals that 75 per cent of these companies say they lack time, skills and funding to even begin to put the situation right. Sixty-five per cent of the 1,000 not-for-profits surveyed said that they cannot name a single accurate source of data that describes the effectiveness of their organisation, while 58 per cent said effectiveness of marketing campaigns could similarly not be nailed down by data insight. Worryingly, 19 per cent of third sector respondees said they had no single accurate data source on their own finances. Eighty per cent of companies in the survey also stated that they have problems producing reports that require data from different systems, while 78 per cent consistently found conflicting data or reports from those different systems. To sum up, 72 per cent of third sector organisations believe decisions are habitually being made without sufficient data to back them up. Lack of spare capacity, lack of money to invest or unwillingness to operate data in siloes were all cited as high-ranking reasons why organisations feel they are unable to repair these gaps in their big data strategies. This week, almost £20,000 was accidentally donated to Unicef instead of Cancer Research, as those choosing to support a "No make-up selfie" campaign ended up sending money to polar bears instead. Typing "donate" rather than "beat" in the donation text was the source of this particular faux pas, as both charities shared the phone number 70099. Anthony Flack, a consultant at Indigo-Blue Consultancy, commented that "not-for-profit organisations seldom collaborate with one another; they see one another as competition," and urged them to change this. "The reality is that they could save a lot of money by collaborating in the back office and sharing back-office services." Stewart Johns, of public sector consulting firm Prederi, stated that a change of culture, as well as technology, could be the key to helping third sector organisations begin to capitalise better on big data. "A real issue is getting people to stop doing what they were previously doing. "Our natural instinct is to carry on doing what we were doing before, but organisations need to be quite aggressive in ensuring that unnecessary manual work has been stopped. In an organisation I was working with, the technology had been put in place to automate a process but I discovered that the people who used to do the process were now using that time to check that the system was producing the correct result."

Full-Disclosure Security List Is Reborn

Barely seven days ago, I was among the many people who were lamenting the loss of the Full-Disclosure security mailing list. Today, I mourn no more as Full-Disclosure has been resurrected. Full-Disclosure is a popular open mailing list for security d...

Brazil caves to Google: New bill drops local data storage requirement

If bill passes, Brazil would become largest country with a net neutrality law.

Meet Snoopy: The DIY drone that tracks your devices just about...

DIY stalker device uniquely IDs people by tracking radio signals they emit.

Obama to ask Congress to end NSA bulk data collection

Senior administration officials in the US government have revealed that President Barack Obama is seeking to "end the aspect that most alarmed privacy advocates" since ex-NSA employee Edward Snowden blew the whistle on such practices in 2013. The offi...

Iboss MobileEther Brings Mobile Device Management to SMBs

The platform shortens the response time to remediation, which can decrease the financial impact of lost, stolen or compromised devices. Web security solutions specialist Iboss Network Security announced the availability of MobileEther, a mobile device management (MDM) solution to extend beyond traditional mobile management and provide organizations with security and compliance capabilities. Features include HTTP/S Web filtering with flexible user access and directory integration; traffic scanning and identification of embedded threats, such as malware, botnets, and new and unknown threats; and identification and securing of unencrypted, sensitive data transmissions like credit card information and Social Security numbers. Rounding out the feature set is sophisticated signature and heuristic-based intrusion prevention and detection and cloud-based email security scans to detect viruses, malware and data loss, and to protect against denial-of-service (DoS) attacks. The platform also shortens the response time to remediation, which can decrease the financial impact of lost, stolen or compromised devices, and ensures that mobile devices in the workplace adhere to Children's Internet Protection Act (CIPA), Health Insurance Portability and Accountability Act (HIPAA), Payment Card Industry (PCI) and Federal Information Security Management Act (FISMA) regulations, among others, along with acceptable use policies. "Smartphones and tablets are considered essential across almost every workforce. However, the need for these devices to meet regulatory compliance is eroding the effectiveness of traditional mobile device management solutions," Paul Martini, CEO of Iboss, said in a statement. "Many organizations resort to deploying two solutions to meet security and compliance needs. MobileEther solves this challenge by providing a unified approach to managing and securing mobile devices in the enterprise." The MobileEther mobile security solution combines traditional MDM, such as data loss prevention, with advanced Web and mobile malware protection, detailed reporting and directory-based user authentication. In December the company released Iboss the Threat and Event console, a core component of the company's Secure Web Gateway platform. The company added functionality that gives enterprises access to possible cyber-security threats, malware breaches on mobile devices and attacks entering the network from social media sites. The Threat and Event console utilizes features such as threat geo-mapping and heat map technology to provide an instant visual pinpoint of threats across a global map. In addition, live dashboards provide information to identify high-risk activities, threats and data movement, allowing for more effective mitigation, and users also have the ability to track data movement to high-risk countries and organizations based on data quantity, type and where the data is originating from. Other features include data collaboration that dynamically maps connections to the organization they represent and then correlates the information to the directory user creating the event, and packet-level visibility across all network activity to identify shadow IT and high-risk user behavior.