/ Security Assessments News /

Enlarge / Graffiti urging people to use Signal, a highly encrypted messaging app, is spray-painted on a wall during a protest on February 1, 2017 in Berkeley, California. Elijah Nouvelage | Getty Images US Attorney General William Barr today launched a new front in the feds’ ongoing fight against consumer encryption, railing against the common …

/ Security News /

Google has reportedly suspended all businesses with the world’s second-biggest smartphone maker, Huawei, and revoked its Android license effective immediately—a move that will have a drastic impact on Huawei devices across the globe. Revoking Android license means Huawei future smartphones will no longer have access to Android updates and apps like Gmail or the Play …

/ Security News /

The Georgia Institute of Technology, well known as Georgia Tech, has confirmed a data breach that has exposed personal information of 1.3 million current and former faculty members, students, staff and student applicants. In a brief note published Tuesday, Georgia Tech says an unknown outside entity gained “unauthorized access” to its web application and accessed …

/ Security News /

Facebook has admitted that the company gave dozens of tech companies and app developers special access to its users’ data after publicly saying it had restricted outside companies to access such data back in 2015. It’s an unusual clear view of how the largest social networking site manages your personal information. During the Cambridge Analytica …

/ Security News /

Blockchain startups are cropping up left and right aiming to disrupt existing services and business models. These range from the trivial to potentially game-changing solutions that can revolutionize the internet as we know it. Among those that promise to change the world, most are attempting to reconstruct the entire internet infrastructure into something that is …

/ Security News /

The group of unknown hackers who hijacked CCleaner’s download server to distribute a malicious version of the popular system optimization software targeted at least 20 major international technology companies with a second-stage payload. Earlier this week, when the CCleaner hack was reported, researchers assured users that there’s no second stage malware used in the massive …

/ Security News /

Tech companies have a “social responsibility” to filter information on their feeds and to provide encryption access to authorities, former US director of national intelligence James Clapper said in an interview on Wednesday. In an address given to the National Press Club in Canberra, Australia on Wednesday, Clapper, who was the head of intelligence under …

/ Security News /

Image: iStock/Jirsak Randomly selected technology executives attending Landmark Ventures’ CIO Summit in New York on Thursday participated in an unscientific survey by this reporter. Each person was asked what they feel storage vendors need to better understand and, generally, which new technologies are most exciting to them. We also asked if their organizations have cyberinsurance. …

/ Security News /

Deidre Diamond, center, founded the STEAM-Con Connection as part of her #brainbabe platform. It aims to replace booth babes with STEAM students. Image: #brainbabe If you’ve been to a major tech trade show, you’ve seen them: Scantily clad young women beckoning attendees to visit the booth of the vendor who hired them—who likely don’t know …