Other News

The Spectrum of Mobile Risk: Protecting Your Corporate Data

The Spectrum of Mobile Risk: Protecting Your Corporate Data

In-brief: organizations need to better understand mobile risks if they want to protect critical data, writes Aaron Cockerill of the firm Lookout. 

Draft Senate legislation would increase the use of drones and biometric security at the US border.

Report: GOP Border Wish List includes Drones, DNA & Voice Scans

Enlarge / A U.S. Customs and Border Protection officer checks identifications as people cross into the United States from Mexico on September 23, 2016 in San Ysidro, California. (credit: John Moore / Getty Images News)
If a new Senate Republican border security bill is passed as currently drafted, it would dramatically increase the amount of surveillance technologies used against immigrants and, in some cases, American citizens traveling to and from the United States.
The bill, known as the “Building America’s Trust Act,” is authored by Sen. John Cornyn (R-Tex.). It aims for a “long-term border security and interior enforcement strategy,” according to its summary. However, the senators have yet to formally introduce the text of the bill.
So Ars is going to do it for them: we received an advance copy of the bill’s text from an anonymous source, and we are publishing it here before it has been formally introduced in the Senate. Ars repeatedly contacted the offices of all six senators who are listed as co-sponsors for comment—none made anyone available.
Read 19 remaining paragraphs | Comments …read more

Uber’s Endless Summer: FTC Settlement over Bogus Security, Privacy Claims

Uber’s Endless Summer: FTC Settlement over Bogus Security, Privacy Claims

In-brief:  Uber’s Endless Summer continued on Tuesday, when the ride sharing start-up settled with the U.S. Federal Trade Commission (FTC) over charges that the company failed to reasonably secure sensitive consumer data that it collected and stored.

Colleges, universities and K-12 schools collect lots of personal data on students. But how well do they protect it?  (Image: Yale University. Photo courtesy of Library of Congress.)

OSINT University: are Colleges and Universities protecting Student Data?

In-brief: Colleges and universities collect reams of student data – including personally identifying information- as part of their student “directory” files. They then distribute it to – basically – whomever asks. In this podcast, we talk with researcher Leah Figueroa who has researched the issue. Also: where are all those Devil’s Ivy attacks? And: companies are desperate for tools and talent to beat back sophisticated threats. Is artificial intelligence the answer? We talk with Endgame about the results of a new survey. 

The Devil's Ivy flaw was discovered in security cameras made by Axis Communications, but affect a much wider population of devices. (Image courtesy of Senrio.)

Was the Devil’s Ivy Vulnerability a Dud? Don’t Count on It.

In-brief: The Devil’s Ivy vulnerability in the open source gSOAP library is widespread and supposedly trivial to exploit. So why, one month later, haven’t we seen any attacks? Is Devil’s Ivy a dud? ‘Don’t count on it,’ security experts tell us.