Independent

ComputerWorldIndependent

Smart lighting security flaw illuminates risk of IoT

Credit to Author: Jonny Evans| Date: Fri, 07 Feb 2020 06:35:00 -0800

The latest smart home security nightmare sheds light on the risk you take each time you add another connected item to your home, office or industrial network – and even market leading brands make mistakes.

The story of Hue

Philips Hue smart lighting systems are probably among the most widely installed smart home solutions in the world, so plenty of people deserve to learn about the latest Check Point research which warns of a major security flaw in them.

To read this article in full, please click here

Read More
ComputerWorldIndependent

U.S. Air Force to pilot blockchain-based database for data sharing

Credit to Author: Lucas Mearian| Date: Thu, 06 Feb 2020 13:23:00 -0800

The U.S. Air Force (USAF) is planning to test a blockchain-based graph database that will allow it to share documents internally as well as throughout the various branches of the Department of Defense and allied governments.

The permissioned blockchain ledger comes from a small Winston-Salem, N.C. start-up, Fluree PBC, which announced the government contract this week. Fluree is working with Air Force’s Small Business Innovation Research AFWERX technology innovation program to launch a proof of concept of the distributed ledger technology (DLT) later this year.

To read this article in full, please click here

Read More
ComputerWorldIndependent

Is Apple's iCloud folder sharing a shadow IT problem?

Credit to Author: Jonny Evans| Date: Thu, 06 Feb 2020 06:35:00 -0800

After a long delay, Apple is preparing to introduce iCloud Folder Sharing across both its Mac and iOS platforms. This is a big blessing for collaboration, but is it safe?

What is iCloud Folder Sharing?

iCloud Folder Sharing was first announced at WWDC 2019, but delayed until – well, at present it is still delayed and was only recently made available inside the latest iOS and macOS developer betas. Which means it should be on the way.

Probably.

How it works?

To read this article in full, please click here

Read More
IndependentKrebs

When Your Used Car is a Little Too ‘Mobile’

Credit to Author: BrianKrebs| Date: Thu, 06 Feb 2020 00:44:26 +0000

Many modern vehicles let owners use the Internet or a mobile device to control the car’s locks, track location and performance data, and start the engine. But who exactly owns that control is not always clear when these smart cars are sold or leased anew. Here’s the story of one former electric vehicle owner who discovered he could still gain remote, online access to his old automobile years after his lease ended.

Read More
ComputerWorldIndependent

It’s not too late to get an Extended Security Update license for Windows 7

Credit to Author: Woody Leonhard| Date: Wed, 05 Feb 2020 04:42:00 -0800

Worried about the future of your Win7 machine? Welcome to the family.

Right now, we have a promise that Microsoft will fix the “Stretch” wallpaper bug it rolled out last month, and there’s some hope that it will fix the Internet Explorer JScript engine security hole CVE-2020-0674 noted last month in Security Advisory ADV200001. We don’t know how/when the fix(es) will be distributed, or if Microsoft will soften its “no free Win7 patches after January 14” edict in some other way.

To read this article in full, please click here

Read More
IndependentKrebs

Booter Boss Busted By Bacon Pizza Buy

Credit to Author: BrianKrebs| Date: Tue, 04 Feb 2020 23:05:08 +0000

A Pennsylvania man who operated one of the Internet’s longest-running online attack-for-hire or “booter” services was sentenced to five years probation today. While the young man’s punishment was heavily tempered by his current poor health, the defendant’s dietary choices may have contributed to both his capture and the lenient sentencing: Investigators say the onetime booter boss’s identity became clear after he ordered a bacon and chicken pizza delivered to his home using the same email address he originally used to register his criminal attack service.

Read More
ComputerWorldIndependent

Iowa Caucus chaos likely to set back mobile voting

Credit to Author: Lucas Mearian| Date: Tue, 04 Feb 2020 12:51:00 -0800

A coding flaw and lack of sufficient testing of an application to record votes in Monday’s Iowa Democratic Presidential Caucus will likely hurt the advancement and uptake of online voting.

While there have been hundreds of tests of mobile and online voting platforms in recent years – mostly in small municipal or corporate shareholder and university student elections – online voting technology has yet to be tested for widespread use by the general public in a national election.

“This is one of the cases where we narrowly dodged a bullet,” said Jeremy Epstein, vice chair of the Association for Computing Machinery’s US Technology Policy Committee (USTPC). “The Iowa Democratic Party had planned to allow voters to vote in the caucus using their phones; if this sort of meltdown had happened with actual votes, it would have been an actual disaster. In this case, it’s just delayed results and egg on the face of the people who built and purchased the technology.”

To read this article in full, please click here

Read More