Archive for February, 2012

h1

RSA Unveils Industry-Leading Capabilities For Threat Information Sharing

February 28, 2012

“A shortage of specialized security expertise is a serious challenge for most organizations dealing with advanced threats,” says Bret Hartman, RSA’s chief technology officer. “Collaboration with outside partners is often the most efficient and convenient way to scale advanced threat capabilities and talent. Technology solutions such as RSA’s experimental collaboration platform will help companies with limited experience in advanced threats augment their capabilities, and will enable broader sharing of threat intelligence across the industry. We’d like others in the global security community to join us in exploring new methods, such as this type of framework, to share threat information on a much larger scale.”

h1

Facebook Profiles Accurately Predict Job Performance [STUDY]Facebook Profiles Accurately Predict Job Performance [STUDY]

February 22, 2012

Do you want to know how that applicant you just interviewed will actually perform on the job? Check out her Facebookprofile.

That’s the advice of a new study from the Northern Illinois University, the University of Evansville and Auburn University. The researchers recruited a group of four Facebook-savvy human resources professionals and students to evaluate the Facebook profiles of 56 users. The four perused each of the profiles for about 10 minutes each before grading them according to the so-called Big Five personality traits (openness, conscientiousness, extraversion, agreeableness and neuroticism).

h1

Cyber experts show vulnerability of GSM networks

February 21, 2012

A group of cyber experts stunned a conference here when they showed the vulnerability of GSM mobile networks which can be easily exploited by hackers enabling them to impersonate a user’s identity and make calls from his account without a clue to the consumer.

The ethical group — matrix shell — gave a demonstration of the hacker’s technique on a live network of a leading mobile service provider in which they managed to make a call using the number of a audience member without actually using his phone or SIM.

h1

Enterprise Application Storefront

February 18, 2012

Enterprise mobile devices and applications must be secured and managed.  A secure enterprise application storefront is the key.

1. Decide on mobile applications and update as needed

2. Secure all devices

3. Block the users from downloading applications if not secure or approved.  

IT needs to be able to authenticate the device and the user. IT must also know the state of the device’s security. Is it running a recent OS or an older one. Does it have encryption? Has it been compromised?

Any mobile application that is not tied to mobile device management and enterprise security is insecure.

h1

FBI says social media monitoring won’t infringe privacy rights

February 15, 2012

The FBI today said that its proposed plans to monitor social media sites as part of a broader strategy to improve real-time situation awareness will be fully vetted by the agency’s Privacy and Civil Liberties Unit.

The unit will review the legal implications of the monitoring application and ensure that it meets all privacy and civil rights obligations before it is implemented, the agency said in a statement emailed to Computerworld “Although the FBI has always adapted to meet changes in technology, the rule of law, civil liberties, and civil rights, will remain our guiding principles,” the agency said.

h1

Google offering to pay web users to track their every move

February 14, 2012

Less than a month after announcing a controversial new privacy policy that shares user data across all its sites with no opt-out option, Google is introducing a system to monitor all online activity of those who participate in a program called Screenwise.

In exchange for unrestricted access to information on your every online move, the search and software giant is offering financial compensation.

Do you want to sell your privacy?

h1

Definitions of Privacy

February 10, 2012

Doctoral student Craig Blaha dissertation work on privacy. You can read his overview on Definitions of Privacy on his blog.