For years, Apple QuickTime has hovered between a nuisance install bundled with iTunes and a necessary application for various third-party software tools, some of which rely on QuickTime for audio or video playback. The US government and TrendMicro are both recommending that all Windows users uninstall QuickTime immediately thanks to critical vulnerabilities that Apple has no intention of fixing.
To help prepare schools and universities for this explosion in technology, iSheriff, a leading cyber security company, today released its latest white paper Is Your School Ready for Education 3.0?. Education 3.0 is an all-encompassing term for how new technologies, such as cloud computing, online video, and mobile devices are changing the way educators teach and students learn. Education 3.0, like other technology-driven changes from e-commerce to social networking, has powerful benefits, but also new concerns.
Education technology company Clever has created a simpler way for students in K-2 classrooms to log into their computers, a process that it says will cut down on the time teachers have to spend before actually diving into the day’s lesson plan. Called Clever Badges, it lets students take physical badges and scan them with the computer’s camera to instantly gain access.
Called the Commission on Enhancing National Cybersecurity, it will be co-chaired by former IBM CEO Sam Palmisano and Tom Donilon, the President's former national security adviser. The aim is to fend off not just attacks on US government computers, but also private sector hacks like the infamous Sony Pictures breach.
Speaking at a Q&A in Manhattan hosted by Hearst Magazines, Smith talked about the benefits of adding technologists to the federal workforce as well as the Obama administration's stance on encryption. A big focus for her, though, was highlighting women technologists and scientists to help inspire the next generation of female engineers and mathematicians.
Modern cars contain tens of specialized computers that control everything from infotainment functions to steering and brakes. The pressing need to protect these computers from hackers will likely open up a new market for car-related software security products. Karamba Security, a start-up based in Ann Arbor, Michigan, is one of the companies that has stepped up to answer this demand.
At a time of increasing threats of cyberattacks on critical infrastructure, theis having trouble recruiting much-needed computer experts because it cannot match the pay of the private sector and does not have the same allure as intelligence agencies.
Procrastination. Fidgeting. Biting your nails. These are all bad habits, but none so bad that they could bring a company to its knees. When it comes to security, however, some bad habits could be devastating, leaving your company vulnerable to hacks, data loss or theft or some similar type of security breach. The good news is that there are some simple steps IT can take to educate users on security best practices and make them part of the solution instead of the problem.
The first sign seems innocuous enough if you don't know what you're looking at: Files in the computer appear as decrypt.html, or decrypt.txt instead of their usual names. Then, you click. A box pops up that gives you an ultimatum: Want the file? You'll have to pay up, and probably in bitcoin. That is what happened at U.S. hospitals in the past month in California, Kentucky, Maryland and the District of Columbia.
U.S. hospitals appear to be under a new type of IT hacking attack: crypto-ransomware. Hackers have changed their approach and instead of stealing patient data, they are now locking down the computer systems of hospitals and asking for a ransom, in bitcoin, in order to allow hospitals to have access to their own computers.