Data Management

Twitter had a data security problem last week that might sound trivial. Email addresses, phone numbers, and the last four digits of the credit cards used to buy ads on Twitter were left in browser cache after the transaction, and that cache was not secured. This may seem trivial, but the consequence...

Twitter on Tuesday notified business clients that their personal information, including email addresses, phone numbers, and the last four digits of their credit card numbers may have been compromised. Self-serve advertisers that viewed billing information on ads.twitter.com or analytics.twitter.com ...

Two separate teams of academic researchers have published papers describing flaws in Intel's Software Guard Extensions. SGX enhances application security by letting developers partition sensitive information into enclaves with hardware-assisted enhanced security protection. The aim is to protect app...

U.S. government agencies and cloud technology providers are heading toward a reset in how they cooperate on cybersecurity challenges. The expected growth of cloud use will create a more complex federal security landscape, according to a recent report from Thales Group. Federal agencies actually have...

Microsoft and Intel researchers have found a way to combine artificial intelligence and image analysis to create a highly effective means to combat malicious software infections. The researchers call their approach "STAMINA" -- static malware-as-image network analysis -- and say it's proven to be hi...

In what could be a trial run for more of the same, Red Hat held a first-ever virtual technical summit to spread the word about its latest cloud tech offerings. CEO Paul Cormier welcomed online viewers to the conference, which attracted more than 80,000 virtual attendees. The company made several key...

The Linux Foundation will host the Trust over IP Foundation, a cross-industry effort to ensure more secure data handling over the Internet. This new foundation is an independent project enabling trustworthy exchange and verification of data between any two parties on the Internet. The ToIP Foundatio...

The United Kingdom's plans to launch a smartphone application to track potential COVID-19 infections won't include Apple and Google. The country's National Health Service has designed its own mobile software to do contact tracing of people exposed to the coronavirus. The NHS reportedly found that it...

More than any other factor, it is our asset that determines the kind of adversary we face. For most of us, our asset is the corpus of sensitive personal details consequent to online transactions. This all comes down to how much data an adversary can glean from you, and how thoroughly it can analyze ...

Canonical has announced the general availability of Ubuntu 20.04 LTS, codenamed "Focal Fossa." This major upgrade places particular emphasis on security and performance. Released once every two years, the new long-term support version provides a platform for enterprise IT infrastructures and workloa...

Google, Apple and MIT have made headlines with announcements of contact tracing mobile apps in the wings. Their purpose is to identify contacts of people who test positive for COVID-19 so appropriate actions can be taken to stem its spread. However, a Cambridge University professor threw some cold w...

Critical server outages cost businesses an average of $300,000 hourly, with many cases exceeding $5 million. As network demands increase and maximum uptime becomes a necessity, it is crucial to implement the proper processes and systems to ensure organizations constantly are able to mitigate the thr...

As companies send employees home in an effort to curb the spread of COVID-19, cybersecurity experts are warning that telecommuting could be putting company assets and data at risk. There are a number of precautions that employees working from home should consider to ensure that sensitive data isn't ...

A number of VPN and ad-blocking apps owned by Sensor Tower, a popular analytics platform, have been collecting data from millions of people using the programs on their Android and iOS devices, according to a report. The software involved includes Free and Unlimited VPN, Luna VPN, Mobile Data, Adblo...

Technewsworld Channels