Comments

The anti-secrecy group WikiLeaks raised the prospect Wednesday of sharing sensitive details it uncovered about CIA hacking tools with leading technology companies whose flagship products and services were targeted by the U.S. government’s hacker-spies. If that sharing should take place, the unusual cooperation would give companies like Apple, Google, Microsoft, Samsung and others an opportunity to identify and repair any flaws in their software and devices that were being exploited by U.S. spy agencies and some foreign allies, as described in nearly 9,000 pages of secret CIA files WikiLeaks published on Tuesday.

More

An alleged CIA surveillance program disclosed by WikiLeaks on Tuesday, March 7, 2017, purporte… WASHINGTON – The anti-secrecy group WikiLeaks raised the prospect Wednesday of sharing sensitive details it uncovered about CIA hacking tools with leading technology companies whose flagship products and services were targeted by the U.S. government’s hacker-spies. If that sharing should take place, the unusual cooperation would give companies like Apple, Google, Microsoft, Samsung and others an opportunity to identify and repair any flaws in their software and devices that were being exploited by U.S. spy agencies and some foreign allies, as described in nearly 9,000 pages of secret CIA files WikiLeaks published on Tuesday.

WikiLeaks CIA files: Are they real and are they a risk?13 minutes ago

WikiLeaks has published thousands of documents that the anti-secrecy organization said were classified files revealing scores of secrets about CIA hacking tools used to break into targeted computers, cellphones and even smart TVs. The CIA and the Trump administration declined to comment on the authenticity of the files Tuesday, but prior WikiLeaks releases divulged government secrets maintained by the State Department, Pentagon and other agencies that have since been acknowledged as genuine.

Google Invites Open Source Devs to Give E2EMail Encryption a Go

Google last week released its E2EMail encryption code to open source as a way of pushing development of the technology. “Google has been criticized over the amount of time and seeming lack of progress it has made in E2EMail encryption, so open sourcing the code could help the project proceed more quickly,” said Charles King, principal analyst at Pund-IT .

Security flaw hits popular websites

Security firm Cloudflare disclosed late Thursday that a long-running bug in its security systems may have leaked information, including potentially personal information, from thousands of sites including Uber, Fitbit and OK Cupid. The problem was first uncovered by Google security expert Tavis Ormandy, who let Cloudflare know about the issue on Feb. 18. But the service had been leaking information for months in a way that allowed search engines to pick it up, according to Cloudflare.

Crime scene tape wrapped around a computer keyboard

“It’s beautiful, it’s elegant, it’s convincing,” Markus Jakobsson gushes, describing the fake email used to hack into the personal Gmail account of Hillary Clinton’s presidential campaign chairman. Sent on March 19, 2016, to the chairman, John Podesta, the email landed in the spam folder of his account.

PCI Security Standards Council Issues Guidance For E-Commerce Security

The PCI Security Standards Council has released an update of its 2013 guidance on e-commerce that offers practical advice to merchants on understanding and maintaining a secure e-payment platform. Best Practices for Securing E-commerce is the result of a comprehensive study on payment security challenges by a Special Interest Group that included merchants, financial organizations, and service providers.

PCI Security Standards Council Issues Guidance For E-Commerce Security

The PCI Security Standards Council has released an update of its 2013 guidance on e-commerce that offers practical advice to merchants on understanding and maintaining a secure e-payment platform. Best Practices for Securing E-commerce is the result of a comprehensive study on payment security challenges by a Special Interest Group that included merchants, financial organizations, and service providers.

PCI Security Standards Council Issues Guidance For E-Commerce Security

The PCI Security Standards Council has released an update of its 2013 guidance on e-commerce that offers practical advice to merchants on understanding and maintaining a secure e-payment platform. Best Practices for Securing E-commerce is the result of a comprehensive study on payment security challenges by a Special Interest Group that included merchants, financial organizations, and service providers.

PCI Security Standards Council Issues Guidance For E-Commerce Security

The PCI Security Standards Council has released an update of its 2013 guidance on e-commerce that offers practical advice to merchants on understanding and maintaining a secure e-payment platform. Best Practices for Securing E-commerce is the result of a comprehensive study on payment security challenges by a Special Interest Group that included merchants, financial organizations, and service providers.

Microsoft Asserts Clients’ Rights in Fbi E-Mail Searches Fight

Microsoft Corp.’s effort to halt the FBI’s so-called sneak-and-peek searches of e-mails may ride on whether it’s allowed to defend its customers’ constitutional rights. The judge who will decide whether the case can go ahead told the company’s lawyers to be ready in court Monday to address earlier rulings that undercut their arguments.

Google reveals its servers all contain custom security silicon

Google has published a Infrastructure Security Design Overview that explains how it secures the cloud it uses for its own operations and for public cloud services. Revealed last Friday, the document outlines six layers of security and reveals some interesting factoids about the Alphabet subsidiary’s operations, none more so than the revelation that “We also design custom chips, including a hardware security chip that is currently being deployed on both servers and peripherals.

Apple shows why no robot can replace cashiers

Ever since Amazon.com debuted a grocery store without a checkout line, the world has been forced to ponder a jobless future. Located in the company’s home town, Seattle, Amazon Go looks every bit like a 7-Eleven, selling bread, milk, and cheese as well as pre-made snacks and fresh meals, except there are no cashiers or checkout lines.

Google open-sources test suite to find crypto bugs

Working with cryptographic libraries is hard, and a single implementation mistake can result in serious security problems . To help developers check their code for implementation errors and find weaknesses in cryptographic software libraries, Google has released a test suite as part of Project Wycheproof .