Top Stories

Hackers Causing Havoc Again: Apple, Ubuntu and NASDAQ All Breached

Hackers Causing Havoc Again: Apple, Ubuntu and NASDAQ All Breached

It's been a while since we had a good ol' high profile hack. The last major incident that really hit the headlines was probably Anonymous' hit on a bunch of official North Korean websites, defacing images of its 'dear leader' Kim Jong Un and generally making the commies look stupid. But just when we were starting to get complacent – badaa! - along come five major hacks in the space of less than a week. In the last five days dozens of sites, including Ubuntu's community forum, Apple's Developer site, Truecaller and the Nasdaq community forum have been breached, leaving millions... more »
iPads are Only as Good as the Wireless Network

iPads are Only as Good as the Wireless Network

My generation learned much of what it knows from the blackboard. Many kids nowadays have never even seen a blackboard – and not even its successor, the whiteboard – in a classroom. For them it seems archaic. Teaching in the modern classroom is built around the projector and computers, with teachers using electronic media and software to enhance lessons. Educational systems across America are adopting technologies faster than ever. On the horizon is one of today’s most disruptive pairings: mobile devices and WLAN. Get ConnectED   It seems fitting to quote Apple directly: “This changes everything.” Steve Jobs uttered those prophetic words about... more »
LIVE: 70's Cryptography Causing Security Catastrophy

LIVE: 70's Cryptography Causing Security Catastrophy

Updated with full video - see below. Welcome to NewsDesk on SiliconANGLE TV for Monday July 22, 2013. If your identity has been stolen, your phone may have been an accomplice to the crime. Joining us now to explain more is SiliconANGLE Contributing Editor John Casaretto. A German mobile security expert says he has found a flaw in the encryption technology used in some SIM cards, the chips in handsets, that could enable cyber criminals to take control of a person’s phone. Karsten Nohl, founder of Security Research Labs in Berlin, said the encryption hole allowed outsiders to obtain a SIM card’s digital key, a... more »
No thumbnail available

IBM's Ambuj Goyal Declares War in Storage #Edge

Six months after taking leadership of IBM Storage, Ambuj Goyal has declared war on his competitors. "The IT industry is at two major inflection points," he told SiliconAngle in an exclusive interview at IBM Edge 2013. "I have nothing to lose." The inflection points are flash and software-defined storage (SDS) based on open systems, and IBM is going to make a major push in the storage marked based on them. In his presentation at the opening General Session at Edge he said, "Just a few years back storage was an afterthought for IBM. After we sold everything else, we sold storage. No... more »
Facebook Earnings Preview: Will Mobile Ads Finally Pay Off?

Facebook Earnings Preview: Will Mobile Ads Finally Pay Off?

Facebook is one of a number of tech companies set to announce its second-quarter financial results this week, and its earnings are expected to be among the most closely scrutinized as its mobile strategy takes shape. The company will host a conference calls at 2pm PT on Wednesday when it will announce its results, with the proceedings set to be broadcast live on the Facebook Investor Relations website. With regards to its mobile efforts, Facebook’s mobile ad revenues and its mobile-user numbers will both be under the spotlight, with several analysts predicting that this push will help drive double-digit revenues and... more »
SIM Card Vulnerability Puts One Quarter of all Phones At Risk

SIM Card Vulnerability Puts One Quarter of all Phones At Risk

As many as one quarter of all mobile phones in use in the world today could be vulnerable to an SMS attack that allows hackers to gain full control of the phone. The vulnerability was discovered in the outdated, 1970s-era cryptography technique called DES encryption that's still used by around half of all SIM cards. Karsten Nohl, founder of Germany's Security Research Labs, whose previous hacking achievements including cracking transport smartcard keys using a microscope and breaking through GPRS encryption, gave details of the attack to both the New York Times and Forbes. He plans to outline the vulnerability in more... more »
No thumbnail available

Weekly Security Review: Tumblr Exposes Users, Snooping Scandal Continues

This past week featured a number of newsworthy developments in the cybersecurity space. Most notably, a number of new and unsettling details emerged about the Moto X, Tumblr users were greeted by an unwelcome surprise, and the still ongoing NSA snooping scandal took on a new twist. On Monday, SiliconAngle’s Mike Wheatley reported that a new promotional video for Motorola’s upcoming Moto X handset was released by Canadian carrier Rogers. The demo showcases several previously unseen features, including a Siri-like voice command system that’s set to “always on” by default. The clip was released on the heels of an alarming report... more »
MITIQ 2013: Appointing a CDO Can Be a Double-Edged Sword

MITIQ 2013: Appointing a CDO Can Be a Double-Edged Sword

Wikibon co-founder Dave Vellante and Paul Gillin, the former editor-in-chief of Computerworld, kicked off the second day of this week’s MIT Information Quality conference with an in-depth discussion about the pros and cons of appointing a chief data officer. After recapping on their collaborations and the state of the publishing industry, Dave and Gillin address data quality. Dave highlights that information quality has received even less attention than data security up to this point, and notes that most organizations don’t have CDOs. “[Hiring a CDO is a] luxury of the largest companies. There are some very large companies at this conference, a... more »
No thumbnail available

SnapLogic Connects Tableau to the Big Data Universe

SnapLogic has announced the availability of a pre-packaged Snap for Tableau’s newly launched data visualization service. The San Mateo-based cloud integration specialist says that its latest connector supports over 160 data sources, including on-premise apps, popular cloud solutions such as Salesforce and ServiceNow, and major social networking sites. SnapLogic touts that the connector enables users to plug data sources into their Tableau deployments “without deep technical expertise and at a fraction of the cost” of manual integration. They can achieve this using a drag and drop interface and a set of pre-built functions. "Business users need to stay on top of the... more »
No thumbnail available

Security Vulnerabilities In e-Commerce

In just one week, Black Hat USA 2013 will be convening at Caesar’s Palace in Las Vegas. In this series, intended to preview many of the talks and presentations scheduled for the event, SiliconANGLE will focus on the exploitative vulnerabilities associated with big data and how those vulnerabilities can be limited. Today, we will delve into a presentation being offered by two engineers with the e-commerce website, Etsy.com, Kyle Barry and Mike Arpaia. Barry joined Etsy in 2011 and is a senior software engineer on the security team. Specifically, he focuses on security engineering and fraud prevention. Arpaia, also a member... more »

Premium Research

RSS Error: This XML document is invalid, likely due to invalid characters. XML error: Reserved XML Name at line 2, column 38