Backdoor access to IT systems can be purchased for $10 on the dark web, McAfee Labs researchers report. Remote desktop protocol access for tens of thousands of compromised systems could be used for system disruption, malware campaigns and other attacks.
Apple added several upgrades to the MacBook Pro laptops, including larger batteries and True Tone technology that automatically adjusts screen color temperature. The updated devices also feature a custom T2, always-on security chip and quieter keyboard.
Adobe is reportedly planning to release a version of Photoshop for the iPad in October, with an app release scheduled for 2019. Experts say the move is part of Adobe's strategy to appeal to casual users as well as professionals.
More than one-third of small- and medium-sized businesses are currently channeling ad spend to Instagram, the real growth driver for parent Facebook. That's a surprisingly high percentage, writes Brian Handly, but it leaves plenty of room for Facebook to convince these advertisers Instagram is a good fit for them.
An appropriation titled "Cyber Coding Cryptology for State Records" allocates more than $5 million to higher education institutions in Colorado to bolster cybersecurity education initiatives. Colorado State University will receive $1.2 million, which will be used to boost cybersecurity research and provide training on cybersecurity policies and procedures.
A data breach at Macy's that was disclosed last week has resulted in a class-action lawsuit. The lawsuit was filed in the US District Court for the Northern District of Alabama and accuses Macy's of failing to protect personal data while also waiting too long to disclose the breach to affected customers.
Hearst Communications on Thursday agreed to a $50 million settlement after it was accused of violating Michigan privacy law by selling the personal information of magazine subscribers without consent. The company was accused of violating the Michigan Video Rental Privacy Act by selling data including income levels, political affiliations and shopping habits to data mining companies.
Election security bills and basic steps that can be taken to avoid issues such as those that occurred in the 2016 election were topics of discussion during a Senate rules committee hearing this week. While the Department of Homeland Security scans election equipment and funding is being given to states to update election systems, more can be done to secure elections, senators say.
As the cost of mini microphones drops and functionality increases, more companies are implementing the components in their products to use voice command technology in everything from wireless headphones to trash cans. Companies are contending with privacy implications; for example, Simplehuman's trash can uses its own microprocessors to avoid connecting to the cloud.
- Page 1