Security

A digital forensic analysis conducted by business advisory firm FTI Consulting concludes with "medium to high confidence" that Amazon CEO Jeff Bezos' smartphone was hacked through a malicious file sent from the WhatsApp account of Saudi Arabian crown prince Mohammed bin Salman. The malware was in an...

Apple shelved plans to give iPhone users control over encrypted backups stored on the company's iCloud service over concerns raised by the FBI and internal sources, according to a report. The company made the decision two years ago, but it came to light just recently. The plan would have removed App...

The United States Congress made some significant progress this session when it comes to data privacy, but cybersecurity remains a blind spot for lawmakers. Congress currently is considering a national privacy law that mirrors legislation enacted in the European Union. It would allow people to access...

Sundar Pichai, CEO of Google and parent company Alphabet, called for government regulation of artificial intelligence technology in a speech at Bruegel, a think tank in Brussels, and in an op-ed. There is no question in Pichai's mind that artificial intelligence should be regulated, he said. The que...

The CCPA -- widely considered to be the toughest law in the U.S. regulating the collection, storage and use of personal information -- went into effect on Jan. 1. Rather than preparing for it, however, many businesses have taken a wait-and-see approach. This could be a serious mistake. The new law i...

After 10 years of fully supporting Windows 7, Microsoft ended its official support for the out-of-date Windows operating system on Tuesday. The popular classic Windows 7 OS still runs on some 200 million PCs around the globe, according to industry estimates. Users include small business owners, some...

As most security pros know, application containers -- Docker, rkt, etc. -- and the orchestration elements employed to support them, such as Kubernetes, are used increasingly in many organizations. Often the security organization isn't exactly the first stop on the path to deployment of these tools.

No matter how good a product or service is, the e-commerce Web and mobile design surrounding it will play a key role in maintaining engagement and ensuring consumers complete their shopping journey. Even the slightest friction, such as poor load speeds, can drive users away from a site, resulting in...

TECHNOLOGY LAW CORNER

Is Privacy Possible in 2020?

The California Consumer Protection Act goes into effect in 2020, and other state and federal laws are on the horizon -- but is it possible that these state laws will really provide us privacy?

Amazon, Apple, Google and the Zigbee Alliance are teaming up on a new IP-based standard for smart home device connectivity. Connected Home over IP will be an open source project. A working group will define a specific set of networking technologies to enable communication across smart home devices, ...

Google has released an update to its Chrome browser with a slew of new features that are heavy on security. The new version offers improved password protection over earlier versions, real-time phishing protection, and predictive phishing tools. Fifty-one security fixes is high compared with past Chr...

Apple's Intelligent Tracking Prevention feature has made it difficult for online advertisers to use cookies to target Safari users based on their browsing habits. Third-party cookies "serve as the foundation for almost all advertising use cases," noted Jordan Mitchell, head of consumer privacy, iden...

As consumers start to tackle their holiday shopping lists, retailers are scrambling to finish preparations for what's likely to be a record-breaking year. Total sales could break through the $1.1 trillion mark for the first time in history. Cyber Monday alone racked up an estimated $9.4 billion in s...

OPINION

Consider Service Mesh as a Security Tool

If you're like most security pros, chances are pretty good that you're starting to get frustrated with microservices a little bit, or maybe a lot. Microservice architectures -- that is, architectures that leverage REST to build a number of small, distributed, modular components -- are powerful from...

E-Commerce Times Channels