At Black Hat, a researcher details how both naive users and hosts of the popular accommodation sharing service could be at risk
News eWeek
Black Hat USA and DefCon: Finding Security Risks in All the Things
PREVIEW: The annual hacker gatherings will bring out new research in car, payment and internet protocol security
Apple Q3 Revenue Down 15% As iPhone Sales Drop Again
Apple's Q3 revenue fell to $42.36B and its net income fell to $7.8B as iPhone sales dropped for the second consecutive quarter.
DNC Email Scandal Shows What Must Be Done to Prevent Breaches, Leaks
ANALYSIS: Once again the Democratic Party has been seriously embarrassed by an email leak scandal. But without the leaks the data breach might have been much worse
Blockchain Moving Beyond Finance; Still in Early Stages
Blockchain is attracting huge interest from financial sector - but it's not the only area that can benefit
Why BlackBerry CEO Chen Doesn’t Worry About Smartphone Market Share
In a Q&A with reporters, BlackBerry's John Chen explained why the company doesn't have to be a big player in smartphones to continue to sell them.
Oracle Issues Its Largest Patch Update Ever
Oracle's July Critical Patch update fixes 276 different vulnerabilities. Will 200-plus flaws be typical for future updates?
Pokemon Go To Add Location Ad Sponsorship In The Ultra-Popular Game
ANALYSIS: Businesses that want to be featured in Pokémon GO will now be able to pay to sponsor the locations used in the game as monetization expands.
Cisco Brings More Security to Its Networking DNA
Cisco Live 2016: Cisco shows off new offerings designed to make it easier for enterprises to address increasing security threats
Firmware Flaw Affects Lenovo ThinkPads, Other PC Makers’ Hardware
ANALYSIS: New zero-day vulnerability may also affect computers from other makers that used similar Intel UEFI reference code to create their BIOS firmware
Will Differential Privacy Give Data-Focused Firms Both Security and Privacy?
Apple will use differential privacy to collect data on groups while keeping individuals anonymous. This emphasises privacy, while giving access to data
Blindspotter Uses Machine Learning To Find Suspicious Network Activity
The use of machine learning to identify suspicious online activity is a new and important capability in securing the network, but privileged users were the weak point until now.
Democratizing Docker: Changing Containers’ Competitive Landscape
ANALYSIS: Some new capabilities landed inside Docker that could create partner friction and more competition if not handled properly
Docker Container Usage Growing
A trio of new reports show positive trends for Docker container adoption, despite concerns Docker too complex to integrate into organisations' environments
Microsoft’s Cloud to Track Legalized Marijuana Sales
Microsoft teams with Kind Financial to help government agencies track the legalized cannabis industry in their jurisdictions.
Cisco Creates £8m Cyber-Security Scholarship Program
The scholarship program and improved certifications are aimed at growing the number of skilled cyber-security experts, officials say
IBM Enhances Support For The Swift Programming Language
At WWDC, IBM extended its already-considerable support for the Swift programming language, particularly for using Swift for server-side development
Microsoft-LinkedIn Deal May Prove Better Fit Than Earlier Buyouts
ANALYSIS: Although more consumers use Microsoft products, enterprises are its most important customers, and owning LinkedIn can help deepen their relationship.
Lessons From Mark Zuckerberg’s Social Networking Account Breach
ANALYSIS: Facebook founder and CEO Mark Zuckerberg made a mistake that many, perhaps most, people make and reused passwords for some social networking sites.
Dell Brings Water-Cooling System to Hyperscale Data Centers
The company is collaborating with Intel to develop the Triton solution, which is aimed at scale-out data center environments.
CoreOS Launches Torus Project for Cloud-Native Storage
While there are already multiple distributed storage systems, Torus aims to be cloud-native and integrate closely with Kubernetes.
Web Publishers Need To Address Reasons Why Readers Install Ad Blockers
ANALYSIS: Newspapers and Web sites of all kinds are fighting the use of ad blockers as a threat to their revenue, but maybe they’re fighting the wrong foe
Windows 10 Preview Build Streamlines Pro-To-Enterprise Upgrades
Users no longer have to reboot their systems if they want to upgrade their PCs from Windows 10 Pro to Enterprise. Meanwhile, Cortana learns new tricks.
What Google’s Victory In Java Case Signifies To The IT World
ANALYSIS: Following court loss to Google over Java and the exit of a key Linux thought leader, Oracle must regain credibility in the open source community
SAP Counting On Customers To Go All-In On Cloud Migration With HANA
ANALYSIS: SAP is counting on its HANA in-memory database to help retain established customers
Security For Google’s New Home Assistant May Get Lost On The IoT
GOOGLE I/O 2016 ANALYSIS: Nobody knows what security is planned for Google Home smart assistant, but buyers need to think about security no matter Google provides
Why VCs Have Invested More Than $200M in Container Tech
ANALYSIS: Last week alone, investors—aiming to profit from the new approach to building, deploying and managing apps—poured $63M into container vendors.
Apple Updates OS X 10.11.4 And iOS 9.3 To Boost Security
Among the security updates is a critical vulnerability in Apple's Messages app that could have exposed users to risk
Mozilla Firefox 45 Removes Tab Groups, Provides Security Updates
Mozilla provides 21 security advisories for its Firefox 45 browser. New features in the browser include improvements to the Firefox Hello communication tool.
Aruba Shows Off HPE Integration With New Networking Offerings
At Aruba's user conference, officials unveil a range of integrated wired and wireless that take advantage of the best of both companies