Security News

Amazon, Apple, Wells Fargo fueling tech hiring resurgence after coronavirus economic damage
2020-06-24 17:27

Tech companies like Amazon, Apple, Wells Fargo, Salesforce, and IBM have continued to hire in cities across the country despite the economic downturn. Amazon, Deloitte, Bloomberg, and Wells Fargo were all hiring widely for tech positions in New York city.

Microsoft Chief Says EU 'Most Influential' on Tech Rules
2020-06-23 18:18

Microsoft president Brad Smith on Tuesday said Europe was the global leader on setting rules for big tech, two years after the EU implemented the GDPR, its landmark data privacy law. Smith spoke at an online debate with European Commission vice president Vera Jourova, the top EU official who was in charge of the data privacy rules when they became reality in 2018.

UK police's face recognition tech breaks human rights laws. Outlaw it, civil rights group urges Court of Appeal
2020-06-23 16:30

Automated facial recognition use by British police forces breaches human rights laws, according to lawyers for a man whose face was scanned by the creepycam tech in Cardiff. Squires is barrister for one Ed Bridges, who, backed by human rights pressure group Liberty, wants to overturn a judicial review ruling from 2019 which failed to halt facial recognition tech use against him by South Wales Police.

Unbound Tech launches solution addressing need for password-free security
2020-06-19 02:30

Unbound Tech announced the advancement of its Crypto-of-Things solution - an endpoint security solution which removes dependence on traditional authentication methods, based on Unbound's NextGen Key Orchestration Platform. Now, businesses relying on hardware tokens, software tokens, and passwords can secure high-risk operations and authenticate transaction approvals without the typical security, usability, and cost trade-offs associated with those methods.

New Security Tech in Intel CPUs Protects Systems Against Malware Attacks
2020-06-15 14:57

Intel on Monday unveiled a new security technology for its processors that will help protect systems against attack methods commonly used by malware. Intel CET has two main components: indirect branch tracking, which should provide protection against jump oriented programming and call oriented programming attacks; and shadow stack, which provides return address protection against return-oriented programming attacks.

RIP ROP, COP, JOP? Intel to bring anti-exploit tech to market in this year's Tiger Lake chip family
2020-06-15 13:00

Known as Control Flow Enforcement Technology, or CET, the protections are designed to prevent miscreants from exploiting certain programming bugs to execute malicious code that infects systems with malware, steals data, spies on victims, and so on. There are various mitigations in place on modern systems, such as Data Execution Prevention, that stop hackers from injecting and executing malicious code into a program when a victim opens a specially crafted document or connects to a remote service.

Microsoft Joins Ban on Sale of Facial Recognition Tech to Police
2020-06-12 17:30

Microsoft is joining Amazon and IBM when it comes to halting the sale of facial recognition technology to police departments. "We will not sell facial recognition tech to police in the U.S. until there is a national law in place We must pursue a national law to govern facial recognition grounded in the protection of human rights," Smith said during a virtual event hosted by the Washington Post.

GitLab Acquires Security Companies Peach Tech and Fuzzit
2020-06-11 13:59

DevOps company GitLab on Thursday announced the acquisition of software security testing firms Peach Tech and Fuzzit in an effort to expand its DevSecOps offering. Seattle-based Peach Tech has developed two major products: Peach Fuzzer, which helps developers find vulnerabilities in their code, and Peach API Security, which provides automated security testing for web APIs.

Readers of a certain age will remember GPRS: Old insecure tech from turn of millennium still haunts 5G networks
2020-06-10 14:20

Researchers with Positive Technologies say that a legacy standard known as GPRS Tunneling Protocol is the culprit behind security issues that will leave many of the early 5G networks open to attacks such as spoofing, man-in-the-middle, and denial of service. Introduced during the earliest upgrades to 2G broadband networks and used through the current 4G standard, GTP allows for data packet transfer between various wireless networks and carriers.

Return to work: Three tech jobs that companies will be trying to fill
2020-06-03 09:17

Cybersecurity, remote IT troubleshooting and cloud support will be the most sought-after skills for businesses in the months following the COVID-19 pandemic, according to a survey of CIOs and tech executives. In a survey of IT leaders from companies including Deloitte, Citi, Microsoft and Salesforce, 98% said cybersecurity talent would be "Extremely important" to businesses over the next six to 18 months as they entered the next phase of recovery from global lockdowns.