Brian Levine

151 Flips | 4 Magazines | 154 Likes | 42 Following | 61 Followers | @BrianLevineW | Chief Security Officer

Be Afraid! 8 New Hacks From the Black Hat Conference That Should Scare You.

5 min read<p>Opinions expressed by <i>Entrepreneur</i> contributors are their own.<p>At least 11,000 hackers from more than 108 countries descended on Las Vegas this week for the 19th annual Black Hat conference. The message for everyone: You should be worried about cyber-security.<p>The hackers came together to …

Cybersecurity

Microsoft and Google’s new pact could signal the beginning of the end for personal privacy

The recent peace pact between Google and Microsoft, first reported in the Wall Street Journal on April 23 and then with a bit more flare in The Guardian on May 2, might someday be seen as a turning point in modern human history. Over the past decade, Microsoft has been the largest and most …

Windows 10

Opening a PDF on your iPhone could infect it with malware

... unless you've updated to iOS 9.3.<p>Author:<p>Published<p>in Adobe, Apple, iOS, Malware, <span class="caps">PDF</span>, Vulnerability 0<p>There is a lot of …

IT security

A New Implementation of Shor's Algorithm Brings Quantum Hacking Closer

Using less qubits for the same computation means larger, faster quantum computing.<p>Much of the disruptive force of quantum computing can be reduced to a single and relatively old idea: Shor's algorithm. Devised in 1994 by MIT mathematician Peter Shor, the algorithm is designed to find the prime …

Simple Ways to Add 2 Hours More to Your Day

Of course, you cannot actually add more time to the 24-hour day or 168-hour week. But talk to productivity experts and highly productive sorts and …

Quantum Computer Comes Closer to Cracking RSA Encryption

Shor's algorithm performed in a system less than half the size experts expected Illustration: Science Photo Library/GettyQuantum computers are often …

Quantum Computing

The next iOS will offer a major new privacy protection to some users

Your iPhone's privacy has been big news recently.<p>Apple and the FBI have been going head to head over whether or not the government has the right to force Apple to assist in unlocking the iPhone belonging to the suspected San Bernidino shooter Syed Farook.<p>Apple has taken a strong stance against …

Privacy

RSA Conference Badge-Scanning Smartphones Exhibit Poor Security

Well, as <i>The Register</i> reports, the Samsung smartphones are supposed to be locked down into “kiosk” mode – only capable of scanning visitors’ badges, …

Information Security

Amazon Quietly Removes Encryption Support from its Gadgets

As Apple fights for encryption, Amazon disables it.<p>While Apple is fighting the FBI in court over encryption, Amazon quietly disabled the option to use encryption to protect data on its Android-powered devices.<p>The tech giant has recently deprecated support for device encryption on the latest version …

Facebook Exec Jailed in Brazil as Court Seeks WhatsApp Data

Brazilian police arrested a senior Facebook Inc (fb) executive on Tuesday as a dispute escalated over a court’s demand that the company provide data …

The government just admitted it will use smart home devices for spying | Trevor Timm

Many consumers are wholly unaware that the smart devices making their home more custom and responsive are making data that can be hacked or collected<p>If you want evidence that US intelligence agencies aren’t losing surveillance abilities because of the rising use of encryption by tech companies, …

Surveillance

Why Amazon's Cloud Numbers May Be the Only Ones That Count

Nothing is, er, cloudier, than the cloud sales, revenue, and usage numbers put out by information technology giants.<p>Aside from Amazon (amzn) Web …

What I learned from studying Zappos CEO Tony Hsieh's schedule for a year

Amidst the growing numbers of tasks, relationships, and operations to manage, ecommerce leaders still only have the same number of hours in a given day.<p>Through my work at Exact Media, I've worked with some of the brightest leaders in the ecommerce space.<p>To better understand them, their needs, and …

Malware Found Inside Downed Ukrainian Grid Management Points to Cyberattack

Although experts say it is likely that the power outage in Ukraine was caused by an cyberattack, there are still plenty of questions to be answered.<p>On December 23, a Ukrainian power company announced that a section of the country had gone dark. This temporary outage was not the result of purely …

Cybersecurity

The FBI director just gave a striking example of how much of a problem encryption has become

And a comment Wednesday from the FBI's director emphasizes how serious the issue has become.<p>At a Senate Judiciary Committee hearing on Wednesday, FBI Director James Comey said encryption is a "big problem" that the US must grapple with, especially in light of recent ISIS-linked terror attacks that …

Microsoft's 'next billion dollar business' is launching today

According to a press release, PowerApps gives developers the ability to build custom native apps that can run across mobile and web.<p>The goal of the service is to let businesses find, and harness, data throughout the organisation — which includes both on-premise and Software-as-a-Service apps — …

Apple's CEO On Encryption: "You Can't Have A Back Door That's Only For The Good Guys"

There’s a burning debate – bordering on a battle – between the U.S. government and technology companies over encryption.<p>The government asserts that encryption – when it is so strong that the police can not eavesdrop on communications in their efforts to catch and prosecute criminals – is a bad …

Views on Hybrid Cloud Data Options in a Post-Safe Harbor World From Brian Levine, Security Compliance Senior Director, Syncplicity

<i>Dictating where data are actually stored when utilizing cloud computing has become even more significant in light of the recent U.S.-EU Safe Harbor</i> …

Edward Snowden says it's your 'duty' to install ad blockers

Edward Snowden's embrace of the free flow of information apparently doesn't apply to online ads.<p>In an interview with <i>The Intercept</i>, the government …

What to do for privacy after Safe Harbor? Syncplicity has an idea

Data privacy law is murky since Europe's highest court struck down the Safe Harbor agreement long used between the U.S. and Europe. Some cloud …

iOS 9 Can Now Finally Be Remotely Jailbroken — but YOU Can’t Do It

Bad news iOS 9 users. Someone has developed a way of jailbreaking your iPhone or iPad and spying on you, in a way that is currently unstoppable. And …

Hackers claim $1 million iPhone zero day bounty

A group of hackers has claimed a $1 million bounty for remotely hacking iOS 9.<p>The bounty for the zero-day exploit was offered by security firm …

iOS

How to Build a Portable Hacking Station with a Raspberry Pi and Kali Linux

Cracking Wi-Fi passwords, spoofing accounts, and testing networks for exploits is all fun enough, but if you want to take the show on the road, …

Still fuming over HTTPS mishap, Google makes Symantec an offer it can’t refuse

Google: Fix ailing certificate business or risk having Chrome flag your credentials.<p>Google has given Symantec an offer it can't refuse: give a …

Let’s talk about Product Management

I spent over a decade as a product manager at a number of different companies. One thing I realized was how little we talked about the job of product …

Product Management

Senate Passes CISA, The Surveillance Bill Masquerading As A Cybersecurity Bill; Here's Who Sold Out Your Privacy

After rejecting all the good privacy amendments to CISA, the Senate has now officially passed the legislation by a 74 to 21 vote. About the only …

Call For Robust Privacy Legislation In Wake Of EU Safe Harbor Strike-Down

A group of U.S. and EU digital rights organizations and consumer NGOs — including the EFF, the U.S. Center for Digital Democracy, the European Consumer Organization and Privacy International — have issued a statement calling for a “meaningful legal framework” to protect fundamental privacy rights …

Privacy

The cofounder of WhatsApp explained why his $19 billion app was built using obscure software development tools

In the interview with Wired's Cade Metz, Acton explained why he and the 50-strong WhatsApp engineering team have been using two relatively unknown software development tools to build the world's most popular messaging platform.<p>WhatsApp, which has billions of messages sent over its platform every …

DOJ unsurprisingly ignores Apple’s encryption arguments

It seems that Apple and the US Department of Justice will once again be butting legal heads this Monday, a hearing that was supposedly set for …

Privacy