IT News, Solutions and Support

Proactive Computing | Optimizing IT for usability, performance and reliability since 1997

Month: February 2015 (page 1 of 2)

Obama’s New Order Urges Companies to Share Cyber-Threat Info With the Government

Obama’s New Order Urges Companies to Share Cyber-Threat Info With the Government

President Barack Obama announced a new Executive Order today aimed at facilitating the sharing of information about cyber-threats between private sector companies and the government. Speaking at a cybersecurity summit convened by the White House at Stanford University, Obama signed the order on stage to promote information sharing both within the private sector and between […]

The post Obama’s New Order Urges Companies to Share Cyber-Threat Info With the Government appeared first on WIRED.

That ;) You Type Can and Will Be Used Against You in a Court of Law

That ;) You Type Can and Will Be Used Against You in a Court of Law

On January 15, Osiris Aristy opened up Facebook, posted a photo of a gun and wrote, “feel like katxhin a body right now.” Later that night, he added, “Nigga run up on me, he gunna get blown down” and followed that with an emoji of a police officer and three gun emoji pointing at it. After […]

The post That 😉 You Type Can and Will Be Used Against You in a Court of Law appeared first on WIRED.

A Crypto Trick That Makes Software Nearly Impossible to Reverse-Engineer

A Crypto Trick That Makes Software Nearly Impossible to Reverse-Engineer

Software reverse engineering, the art of pulling programs apart to figure out how they work, is what makes it possible for sophisticated hackers to scour code for exploitable bugs. It’s also what allows those same hackers’ dangerous malware to be deconstructed and neutered. Now a new encryption trick could make both those tasks much, much harder. At […]

The post A Crypto Trick That Makes Software Nearly Impossible to Reverse-Engineer appeared first on WIRED.

Facebook Unveils Tool For Sharing Data On Malicious Botnets

Facebook Unveils Tool For Sharing Data On Malicious Botnets

Facebook noticed the attack first. But Mark Hammell and his team couldn’t stop it without help from Tumblr, Pinterest, and others. This was about a year ago, and basically, a new botnet was using various social networking services—including Facebook, Tumblr, and Pinterest—to push malicious software onto machines across the net. “It was using a variety […]

The post Facebook Unveils Tool For Sharing Data On Malicious Botnets appeared first on WIRED.

Did NSA and the UK’s Spy Agency Launch a Joint Cyberattack on Iran?

Did NSA and the UK’s Spy Agency Launch a Joint Cyberattack on Iran?

An NSA document newly published today suggests two interesting facts that haven’t previously been reported. The Intercept, which published the document, highlighted that in it the NSA expresses fear that it may be teaching Iran how to hack, but there are two other points in the document that merit attention. One concerns the spy tool […]

The post Did NSA and the UK’s Spy Agency Launch a Joint Cyberattack on Iran? appeared first on WIRED.

NSA Acknowledges What We All Feared: Iran Learns From US Cyberattacks

NSA Acknowledges What We All Feared: Iran Learns From US Cyberattacks

A newly revealed NSA document warns that Iran and other adversaries learn techniques from U.S. cyberattacks and use them against us.

The post NSA Acknowledges What We All Feared: Iran Learns From US Cyberattacks appeared first on WIRED.

DARPA Is Developing a Search Engine for the Dark Web

DARPA Is Developing a Search Engine for the Dark Web

A new search engine being developed by DARPA aims to shine a light on the dark web and uncover patterns and relationships in online data to help law enforcement and others track illegal activity. The project, dubbed Memex, has been in the works for a year and is being developed by 17 different contractor teams […]

The post DARPA Is Developing a Search Engine for the Dark Web appeared first on WIRED.

Here’s The Full Senate Report Shaming Automakers On Security

Here’s The Full Senate Report Shaming Automakers On Security

A new senate report reveals that most modern cars are vulnerable to hacking and that the industry is not even close to having a grasp on what to do about it.

The post Here’s The Full Senate Report Shaming Automakers On Security appeared first on WIRED.

Ross Ulbricht Didn’t Create Silk Road’s Dread Pirate Roberts. This Guy Did

Ross Ulbricht Didn’t Create Silk Road’s Dread Pirate Roberts. This Guy Did

As Ulbricht’s trial unfolded over the last month, one character appeared again and again in the chat logs prosecutors pulled from the laptop seized at the time of Ulbricht’s arrest: a character calling himself Variety Jones, and later, cimon.

The post Ross Ulbricht Didn’t Create Silk Road’s Dread Pirate Roberts. This Guy Did appeared first on WIRED.

UK Tribunal Declares NSA’s Data-Sharing with British Intel Illegal

UK Tribunal Declares NSA’s Data-Sharing with British Intel Illegal

A British tribunal has ruled that data sharing between the NSA and the UK spy group known as GCHQ was illegal for years. Why? Because it was done in secret. The Investigatory Powers Tribunal in the UK ruled today (.pdf) that British intelligence services acted unlawfully when they accessed the private communications of millions of […]

The post UK Tribunal Declares NSA’s Data-Sharing with British Intel Illegal appeared first on WIRED.

Older posts