Companies complacent about data breach preparedness

The likelihood that companies will experience a security incident continue to rise every year. While most organizations have put a data breach preparedness plan in place to combat such incidents, most executives aren't updating or practicing the plan regularly, according to study released earlier this month."When it comes to managing a data breach, having a response plan is simply not the same as being prepared," Michael Bruemmer, vice president at Experian Data Breach Resolution (which sponsored the study) said in a statement. "Unfortunately many companies are simply checking the box on this security tactic. Developing a plan is the first step, but preparedness must be considered an ongoing process, with regular reviews of the plan and practice drills."To read this article in full or to leave a comment, please click here

After DDOS attack, senator seeks industry-led security standards for IoT devices

Last week’s massive distributed denial-of-service attack has prompted an urgent focus on the need for industry-led cybersecurity standards for internet of things devices.U.S. Sen. Mark Warner, (D-Va.) said Thursday that he favors an industry-based approach before seeking some form of government regulation of IoT security.“Last week’s attack does reveal a new level of vulnerability, and I’m trying to make it clear ... that this is not a problem that the government ought to be the first actor in solving,” he said in a telephone interview.To read this article in full or to leave a comment, please click here

After DDOS attack, senator seeks industry-led security standards for IoT devices

Last week’s massive distributed denial-of-service attack has prompted an urgent focus on the need for industry-led cybersecurity standards for internet of things devices.U.S. Sen. Mark Warner, (D-Va.) said Thursday that he favors an industry-based approach before seeking some form of government regulation of IoT security.“Last week’s attack does reveal a new level of vulnerability, and I’m trying to make it clear ... that this is not a problem that the government ought to be the first actor in solving,” he said in a telephone interview.To read this article in full or to leave a comment, please click here

FBI to probe new emails related to Clinton’s private server

The FBI has uncovered new emails related to Hillary Clinton's use of a private email server, prompting federal authorities to investigate them. The FBI discovered the emails as part of an "unrelated case," FBI Director James Comey said in a letter to a congressional committee that was later tweeted on Friday. These emails "appear to be pertinent" to the FBI's original investigation into Clinton's private server use, which the agency wrapped up back in July, Comey said. Clinton, now the Democratic nominee for U.S. president, used the privacy server while she served as secretary of state.To read this article in full or to leave a comment, please click here

FBI to probe new emails related to Clinton’s private server

The FBI has uncovered new emails related to Hillary Clinton's use of a private email server, prompting federal authorities to investigate them. The FBI discovered the emails as part of an "unrelated case," FBI Director James Comey said in a letter to a congressional committee that was later tweeted on Friday. These emails "appear to be pertinent" to the FBI's original investigation into Clinton's private server use, which the agency wrapped up back in July, Comey said. Clinton, now the Democratic nominee for U.S. president, used the privacy server while she served as secretary of state.To read this article in full or to leave a comment, please click here

Coca-Cola headlines a fast-turning CIO carousel

The Coca-Cola Company yesterday said that it has promoted Barry Simpson to CIO. Simpson, who will oversee the company’s global IT strategy, services and operations, had served as interim CIO since July, when he replaced the late Ed Steinike. Coca-Cola CompanyCIO Barry Simpson. “Given the significant amount of change under way as we transform our business for the future, it’s important that we have an IT function positioned to protect our information technology and accelerate our growth around the world,” said Coca-Cola President and COO James Quincey in a statement.To read this article in full or to leave a comment, please click here

Microsoft’s $300 Windows VR headsets: 6 things we know (and 1 big question)

Everybody expected mixed-reality technology to play a part in Microsoft’s big Windows 10 event on Wednesday—but nobody expected what we got. Rather than showing yet another HoloLens demonstration, Microsoft instead announced a small army of virtual reality headsets unlike anything available today, and they’re all powered by the forthcoming Windows 10 Creators Update.The demo raised more questions than it supplied answers, but there was still plenty of info to glean if you were paying attention. Here’s everything we know about Microsoft’s Windows 10 VR headsets—and one massive question spurred by their mere existence.To read this article in full or to leave a comment, please click here

New Windows code injection method could let malware bypass detection

Security researchers have discovered a new way that allows malware to inject malicious code into other processes without being detected by antivirus programs and other endpoint security systems.The new method was devised by researchers from security firm Ensilo who dubbed it AtomBombing because it relies on the Windows atom tables mechanism. These special tables are provided by the operating system and can be used to share data between applications."What we found is that a threat actor can write malicious code into an atom table and force a legitimate program to retrieve the malicious code from the table," Ensilo researcher Tal Liberman said in a blog post. "We also found that the legitimate program, now containing the malicious code, can be manipulated to execute that code."To read this article in full or to leave a comment, please click here

New Windows code injection method could let malware bypass detection

Security researchers have discovered a new way that allows malware to inject malicious code into other processes without being detected by antivirus programs and other endpoint security systems.The new method was devised by researchers from security firm Ensilo who dubbed it AtomBombing because it relies on the Windows atom tables mechanism. These special tables are provided by the operating system and can be used to share data between applications."What we found is that a threat actor can write malicious code into an atom table and force a legitimate program to retrieve the malicious code from the table," Ensilo researcher Tal Liberman said in a blog post. "We also found that the legitimate program, now containing the malicious code, can be manipulated to execute that code."To read this article in full or to leave a comment, please click here

IDC to Samsung: Put Note7 fiasco to rest by focusing on Galaxy S8

Market research firm IDC says the best thing Samsung can do to put the fiery Note7 recall behind it is to come out with a really great Galaxy S8 smartphone next year.Samsung indeed has already started to tease that new Android phone, including during an analyst call this week in which the company detailed the big financial hit it has suffered from recalling the Note7 due the phablet's overheating battery issues (See also: "Samsung issues elaborate fireproof boxes for Note7 returns")To read this article in full or to leave a comment, please click here

Uber drivers in the UK are employees, court rules

Uber should treat its drivers in the U.K. as employees, paying them at least minimum wage from the moment they are available to work until they log off and providing them with paid time off, a London employment tribunal has ruled.The drivers and Uber must now make proposals to the judge how they will comply with the ruling, made following a preliminary hearing.What they agree will have consequences for Uber and businesses like it across the U.K. It could push costs up, increasing Uber's incentive to develop its own self-driving car.To read this article in full or to leave a comment, please click here

15% off Logitech Harmony Companion Remote for Smart Home and Entertainment Devices – Deal Alert

With the Logitech Harmony Companion remote, you can control home automation devices such as Philips hue lights, Nest Learning Thermostat, August door locks and more—plus advanced home entertainment devices like Apple TV, Roku, or Sonos and game consoles such as Xbox One, Xbox 360, PlayStation3 or Wii. Touch an Activity button like “Watch TV” and all the right devices change to the right settings. Get your lighting, locks, thermostat and more to work together for one-touch experiences like 'welcome home' or 'good night', or set room lighting to automatically dim when you start a movie. The included Harmony Hub sends commands from the remote or Harmony App to your devices using IR, Wi-Fi or Bluetooth wireless signals, so you can control devices or online entertainment services behind closed cabinet doors. Full support for Alexa included, and with the Harmony app anyone in the house can turn their iOS or Android device into a full-featured universal remote as well. A lot of features here for the currently discounted price of $128. See the highly rated and discounted Logitech Harmony Companion remote on Amazon.To read this article in full or to leave a comment, please click here

Security apps you need on your new Pixel

Google's new Pixel phoneImage by GoogleAll the brand new features of the Pixel will not protect it from increasingly frequent security threats: each user should take necessary precautions in order to protect their data, passwords or any sensitive online transactions. A new smartphone is also an attractive one-stop location for hackers who'd like to access personal bank account data, credit card passwords, name, address, social media accounts and so on.To read this article in full or to leave a comment, please click here