RIP Raimund Genes, Trend Micro CTO

I learned this past Saturday that my good friend and Trend Micro CTO, Raimund Genes, passed away suddenly last week.  Raimund was only 54.If you were lucky enough to cross paths with Raimund, you probably share my profound sorrow at his passing.  For those who never had the pleasure of a meeting, allow me to provide a few thoughts about him: I first met Raimund at an industry event where he was supposed to go through a PowerPoint presentation with me.  Upon shaking my hand, he said something like, “let’s skip the formalities of a canned presentation, go to the bar, get a drink, and just talk.”  We did have a drink at the bar that day, but what I remember most was an hour of insightful and entertaining banter.  He was both informal and informative simultaneously and we immediately connected. One of the things that I love about my job is that I get to speak to some of the smartest cybersecurity people – professionals, researchers, technology vendors, legislators, etc. – on a regular basis.  Out of this exceptional population however, some people stand out.  I call these folks my “beacons” in that I’m more engaged when I speak with them and I always feel like I learned something when the conversation ends.  Raimund was one of my beacons. Raimund used his knowledge, charisma, and humor when delivering a presentation, and I found him to be one of the best presenters around.  He entertained and educated at the same time, a rare gift.  Heck, even his slides were often part of his overall shtick.  Raimund could be jet lagged and the last presenter of the day and he still always seemed to wow any audience.     Raimund didn’t have the public visibility of people like Dmitri Alperovitch (Crowdstrike), Eugene Kaspersky (Kaspersky Lab), or Kevin Mandiant (FireEye) but boy did he know his stuff!  Off the top of his head, he could tell you about the latest security breaches, new strains of malware, recently developed exploit kits, or hacker banter on the dark web.  He was continually working on something with law enforcement organizations like the FBI or Interpol so he couldn’t always share details, but even his high-level cybercrime descriptions could make the hair on your neck stand up.  Raimund was a true citizen of the world.  It seemed like every time I saw him, he had just flown in from a trip that included a worldwide tour.  This gave him a broad perspective on cybersecurity issues and strategies and a gift for sharing these experiences.  He taught me about cybersecurity education in Korea, cybercrime in Brazil, and regulations in Europe.  For example, last October he educated a group of American cybersecurity analysts on impending requirements around GDPR.  Since this visit, many of his predications have come true and his recommendations were always sound. In spite of his knowledge, CTO position, and global schedule, Raimund was completely down-to-earth and a straight shooter.  As money and hyperbole flowed into the cybersecurity technology market, Raimund wasn’t afraid to call BS.  He would always tell you what he thought and why without any hint of industry or organizational spin.  And Raimund didn’t take himself too seriously.  He could talk about polymorphic malware in one sentence and then leave you laughing with a joke in the next. Raimund was the whole package – extremely smart, charming, energetic, fun, and engaging – which is why you couldn’t help but like him, appreciate his knowledge, and enjoy his company.  He was a great ambassador for the cybersecurity professional diaspora. To read this article in full or to leave a comment, please click here

Posted on: 28 March 2017 | 2:36 pm

9 biggest information security threats through 2019

The information security threat landscape is constantly evolving. To help you navigate the terrain, each year the Information Security Forum (ISF) — a nonprofit association that researches and analyzes security and risk management issues on behalf of its members — puts out its Threat Horizon report to provide members with a forward-looking view of the biggest security threats over a two-year period. What follows are the nine biggest threats on the horizon through 2019 that your organization may have to manage and mitigate.Theme 1: Disruption from an over-reliance on fragile connectivity Organizations today depend of instant and uninterrupted connectivity, smart physical devices and trustworthy people. But that dependence makes them vulnerable to attacks on core internet infrastructure, devices used in daily business and key people with access to mission-critical information.To read this article in full or to leave a comment, please click here

Posted on: 28 March 2017 | 2:33 pm

Refurbishing Samsung Note7s for resale is a 'disastrous' plan, analyst says

Just two days before Samsung's launch of the Galaxy S8 on Wednesday, the company announced it will consider using some recalled Galaxy Note7 smartphones for re-sale as refurbished or as rental phones.One analyst bashed the plan as "disastrous," while another said Samsung is performing a "balancing act" following the Note7 fallout when some units overheated and caught fire.Samsung also said in a statement on Monday that it could detach salvageable components from the Note7s for reuse. It may also extract metals like copper, gold, silver and nickel from the devices using environmentally friendly methods.To read this article in full or to leave a comment, please click here

Posted on: 28 March 2017 | 2:31 pm

Report: Samsung’s flagship smartphones tank just before Galaxy S8 launch

A financial report cited by South Korea’s Yonhap News says that Samsung’s higher-end smartphones are accounting for a rapidly decreasing share of the company’s sales.Premium smartphones account for just 29% of Samsung’s smartphone sales, down from 75% in mid-2013, Yonhap quotes a Hana Financial Investment report as saying. The disastrous battery problems experienced by the Samsung Galaxy Note 7 undoubtedly have a lot to do with the company’s shrinking premium device sales, but the report indicates that those sales were already in decline before the Note 7 incidents began to attract widespread negative publicity.To read this article in full or to leave a comment, please click here

Posted on: 28 March 2017 | 2:30 pm

Amazon Connect brings contact centers to the cloud

Amazon today released Connect, a contact center as a service offering hosted in the Amazon Web Services cloud.The move represents AWS attempting to jump into a burgeoning market for cloud-based contact center software, while continuing to push AWS into the enterprise communications market. Just last month AWS announced Chime, a cloud-based Unified Communication as a Service (UCaaS) offering.+MORE AT NETWORK WORLD: Amazon Web Services vs. Microsoft Azure vs. Google Cloud Platform | This is not the sort of publicity Avaya was seeking +To read this article in full or to leave a comment, please click here

Posted on: 28 March 2017 | 2:08 pm

Being a Linux user isn't weird anymore

A few days ago, I was down at the Starbucks in my local bookstore—sipping on a hot chocolate, using the free (but rather pokey) Wi-Fi, and getting some work done.This is pretty typical for me. Since I work from home, it’s nice to get out of the house and shake things up a little bit. Working for a few hours at a coffee shop tends to be just about right. I’m not the only person in the world who uses coffee shops as short term offices—it’s become so normal, it’s almost a cliché.The one thing that typically sets me apart from the other people working from any given coffee shop is my computer. I run Linux (currently openSUSE with GNOME). And often, I’ll have some sort of unusual Linux-powered gadget with me (such as my PocketCHIP or my trusty old Nokia N810). To read this article in full or to leave a comment, please click here

Posted on: 28 March 2017 | 1:50 pm

The insecurities list: 10 ways to improve cybersecurity

A friend asked me to list all of the cybersecurity things that bug me and what he should be diligent about regarding user security. We talked about access control lists, MAC layer spoofing, and a bunch of other topics and why they mattered. You should come up with a list of head-desk things.After a bit of thought, here’s a list. It’s by NO means comprehensive, and it’s not an organized best practices document. Instead, these are marbles that roll around in my head and bother me a lot.1. Ban and route to null t.co, bit.ly, and other URL shorteners Why? Especially in phishing emails, a user has no idea where the link is going, what’s behind that link, or what kind of benevolent or conversely malicious payload is going to load in the default browser. Sure, your anti-malware or antivirus tool, or even the browser’s own instinct, might prevent a page load that opens a back door into your network. Maybe.To read this article in full or to leave a comment, please click here

Posted on: 28 March 2017 | 12:56 pm

Windows Insider Program surpasses 10 million users

Microsoft announced that the Windows Insider Program—its global community of testers who run interim builds of Windows 10 and serve as beta testers/guinea pigs for what might be an unstable build on their personal machines—has passed the 10 million mark.It's taken a while to get here after a fast start. The program launched in September 2014 with the modest hopes of getting 400,000 enthusiasts on board. Instead, it hit 1 million after a few weeks. Back in August 2015, the number stood at 6 million people, and less than a month later Microsoft said it was up to 7 million.RELATED: 11 hidden tips and tweaks for Windows 10 Then things got quiet. Clearly an 18-month lag between the 7 million and 10 million mark means things plateaued, and perhaps Microsoft didn't want to admit it. To read this article in full or to leave a comment, please click here

Posted on: 28 March 2017 | 12:04 pm

LastPass is scrambling to fix another serious vulnerability

For the second time in two weeks developers of the popular LastPass password manager are working to fix a serious vulnerability that could allow malicious websites to steal user passwords or infect computers with malware.Like the LastPass flaws patched last week, the new issue was discovered and reported to LastPass by Tavis Ormandy, a researcher with Google's Project Zero team. The researcher revealed the vulnerability's existence in a message on Twitter, but didn't publish any technical details about it that could allow attackers to exploit it.To read this article in full or to leave a comment, please click here

Posted on: 28 March 2017 | 11:49 am

Malware infection rate of smartphones is soaring – Android devices often the target

Smartphones are by far the most popular target of mobile malware, and the infection rate is soaring, according to new research by Nokia.During the second half of 2016, the increase in smartphone infections was 83% following on the heels of a 96% increase during the first half of the year, according to Nokia’s latest Mobile Threat Intelligence Report gathered from devices on which Nokia NetGuard Endpoint Security is deployed in Europe, North America, Asia Pacific and the Middle East.+More on Network World:  Cisco Talos warns of Apple iOS and MacOS X.509 certificate flaw+To read this article in full or to leave a comment, please click here

Posted on: 28 March 2017 | 11:06 am

44% off Smartphone Screen Magnifier with Foldable Stand - Deal Alert

Enlarge your smartphone's display and watch a bigger screen at a longer distance, minimizing eye fatigue. The magnifier with integrated stand is designed to be foldable, lightweight and portable. It currently averages 4.5 out of 5 stars from almost 500 reviewers on Amazon (read reviews), where its list price of $26.99 is currently discounted 44% to just $14.99. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

Posted on: 28 March 2017 | 11:02 am

How politics is impacting your company's productivity

It's difficult to escape politics in America -- the Trump administration dominates the network news cycle, social media feeds and nearly every corner of pop culture. And it's starting to affect the workplace, according to a survey of 500 full-time U.S. employees by Wakefield Research in conjunction with BetterWorks, a company that offers performance management software.The results found that 87 percent of employees "read political social media posts at work," while 80 percent said they have discussed politics with professional contacts or colleagues. Meanwhile, nearly half said they had seen a political conversation turn into an argument at work.To read this article in full or to leave a comment, please click here

Posted on: 28 March 2017 | 10:59 am

What you need to know about Windows 10, UWP and desktop apps

Windows 10 (like Windows 8 before it) isn’t just a new version of Windows. It also comes with a new model for building apps that’s much more like the sandboxed approach of smartphone operating systems.To read this article in full or to leave a comment, please click here(Insider Story)

Posted on: 28 March 2017 | 10:57 am

Study finds devices are not wiped properly

As an individual, you might have an old smartphone or tablet sitting around your house collecting dust. Before recycling it, you hire a company to wipe the drive clean of any personally identifiable information. With the storage on today’s smartphones, there could be credit card information sitting in the background.You feel relieved as you pass off the device to be cleaned. A load off your shoulders, you have taken another item out of your house that was cluttering up the living room. Right? Well the device might be gone, but the data might still live on.The National Association for Information Destruction (NAID) found such in a recent study that revealed 40 percent of the devices the group bought on secondhand markets had PII on them. NAID, which is an international watchdog trade and non-profit trade association for the secure destruction industry, conducting the study in the first quarter of this year.To read this article in full or to leave a comment, please click here

Posted on: 28 March 2017 | 10:56 am

People may have been wrongly imprisoned due to faulty ankle bracelet tracking devices

If you were required to wear an ankle bracelet tracking device for electronic monitoring purposes, can you imagine how the conversation with police or probation officers would go down if the device falsely notified them that you had tried to tamper with the strap to remove it, when in fact you had not? It’s doubtful you would be believed if you tried to blame it on glitchy or defective technology. Yet in the UK, some offenders may have been wrongly sent back to prison after defective ankle bracelets alerted the authorities that they had been tampered with.The UK government admitted that ankle bracelets “used to electronically monitor offenders and suspects with a curfew” may have given false tamper reports to authorities and resulted in some people being wrongly imprisoned.To read this article in full or to leave a comment, please click here

Posted on: 28 March 2017 | 10:22 am

Excel for Windows finally gets real-time collaboration

Microsoft has brought live, collaborative editing to its Excel app for Windows through a beta update it launched on Tuesday. The new feature lets testers collaborate with one another on the same file from inside the app.Live collaboration has been a major focus of Office 2016, which Microsoft released roughly a year and a half ago. The suite first offered real-time co-authoring for the desktop version of Word, then expanded those capabilities to PowerPoint. It’s a major change for Microsoft’s client applications, which previously kept editing to a fairly solitary experience.To read this article in full or to leave a comment, please click here

Posted on: 28 March 2017 | 10:21 am

IDG Contributor Network: Chaos in the enterprise: How digital transformation drives agility, continuous development

In today’s data-driven economy, consumer expectations for services anywhere, anytime have led to a need for organizations to become more agile and increase their speed of deliver exponentially. Gone are the days when product and service updates were delivered on a monthly basis, instead we have reached a point where an environment of continuous development is becoming required to meet the ever-evolving needs of users.+ Also on Network World: Digital transformation progress. Or not… + There’s no doubt that digital transformation is a major driver in this change in development methodology, partly as a response to the threat posed by agile startups that are disrupting markets globally. Most organizations have begun their digital transformation journey, but for many it’s still in its infancy. However, there is no doubt that for enterprises across a wide range of sectors, multiple IT technologies, processes, applications, systems and protocols need to be adopted and updated on a regular basis in order for businesses to remain competitive.To read this article in full or to leave a comment, please click here

Posted on: 28 March 2017 | 9:50 am

IDG Contributor Network: Turning everyday objects into radio stations

Capturing radio signals that are already in the air, then adding data and reflecting the combination back to passersby’s smartphones is how marketing and smart city communications should take place in the future, say researchers.By doing so, one can use everyday objects as radio stations, say scientists from University of Washington. A kind of smart-poster would be one use for the technology, they say.Bus stop billboards, for example, would be able to broadcast a message to be picked up by a transit customer’s FM radio already built into their smartphone. The “singing poster,” as they call it, wouldn’t need to be powered with any great oomph—the radio signal reflective technology consumes “close to zero power,” the researchers claim in an article on the university’s website.To read this article in full or to leave a comment, please click here

Posted on: 28 March 2017 | 9:05 am

9% off Nyko Rechargeable Power Station for Xbox One Controllers - Deal Alert

The Power Station from Nyko attaches to the side of the Xbox One console and charges 2 included rechargeable batteries for use in Xbox One Wireless Controllers, for up to 25 hours of play time. It's powered by USB so there are no visible cords, and is designed to look like a natural extension of your console. The Power Station averages 4 out of 5 stars from over 190 people on Amazon (read latest reviews here), where its typical list price has been reduced 9% to just $15.97. See this deal on Amazon.To read this article in full or to leave a comment, please click here

Posted on: 28 March 2017 | 9:04 am

Hadoop fails to live up to the promise and the hype

Hadoop, the open source big data framework first developed at Yahoo for analyzing large data sets, is a total failure that costs too much and is too much of a headache to implement, say people in the field. In a lengthy and in-depth piece on Datanami, big data experts describe Hadoop as too primitive for any kind of complex processing work or interactive, user-facing applications. At best, it's a batch process job, which is how Hadoop started out. It doesn't seem to have grown beyond it. “I can’t find a happy Hadoop customer. It’s sort of as simple as that,” Bob Muglia, CEO of Snowflake Computing, told Datanami. Snowflake develops and runs a cloud-based relational data warehouse product. “It’s very clear to me, technologically, that it’s not the technology base the world will be built on going forward.” To read this article in full or to leave a comment, please click here

Posted on: 28 March 2017 | 8:41 am

Trump son-in-law Jared Kushner did not just delete his tweets, says Wayback Machine

Yesterday’s post about the relative tweeting habits of President Trump and his son-in-law Jared Kushner has inadvertently gotten swept up in a widely reported yet apparently false allegation that Kushner has recently deleted all his tweets, allegedly out of concern over what they might reveal relative to Russian interference in November’s election.And while I am loath to defend anyone on Team Trump, the alleged mass deletion of tweets did not happen, at least according to the indispensable Internet Archive Wayback Machine, which has screen captures of Kushner’s Twitter page dating back to 2014. Those screen captures show that Kushner only tweeted three times – in 2011 and about innocuous matters. And while those tweets are indeed no longer visible on Kushner’s verified Twitter account, they haven’t been documented there since March 5, 2014.To read this article in full or to leave a comment, please click here

Posted on: 28 March 2017 | 8:38 am

Netgear doubles down on Orbi wireless gear

Netgear today announced some new products in its Orbi line of wireless products – aka “whole-home coverage” or “wireless system” space. The new products – the RBK30 and RBK40 systems include routers and satellite devices to help owners cover more of their home with Wi-Fi than with a traditional router, or even a router-and-extender option. Netgear says the new systems are aimed at consumers that need smaller whole-home coverage – the original system (now called the RBK50) covers homes up to 5,000 square feet, while the newer ones cover up to 3,500 square feet (RBK30) or 4,000 square feet (RBK40).To read this article in full or to leave a comment, please click here

Posted on: 28 March 2017 | 7:30 am

Microsoft paces delivery of Windows 10 upgrades

If Microsoft orchestrates next month's Microsoft Windows 10 upgrade as it did 2016's mid-year Anniversary Update refresh, it will take about three months for the latest version to reach most eligible devices.According to advertising network AdDuplex, 60 days after the Aug. 2, 2016, introduction of Windows 10 1607 -- aka Anniversary Update -- just 35% of measured Windows 10 PCs were running the upgrade. By the 90-day mark, however, that number had soared to 80%, showing that Microsoft, after a purposefully slow start, had stomped on the update accelerator.[ Related: Windows 10 Redstone: A guide to the builds ] There has been no sign from Microsoft that Creators Update, the company's label for April's feature upgrade, will be deployed any differently.To read this article in full or to leave a comment, please click here

Posted on: 28 March 2017 | 6:53 am

Ignore that call from “Apple” about an iCloud breach

Earlier on Monday, my wife let me know that “Apple Support” had called about iCloud security. She was dubious, and rightly so. “Apple” then called five more times (and counting). Suffice it to say, it wasn’t Apple, but fraudsters trying to piggyback on reports that a major breach of iCloud credentials could render hundreds of millions of accounts vulnerable.Apple says no such breach occurred, and security researchers, like Troy Hunt of HaveIBeenPwned.com, say the group trying to extort Apple likely has reused credentials from other sites’ password leaks. (We recommend turning on two-factor authentication at iCloud regardless.)To read this article in full or to leave a comment, please click here

Posted on: 28 March 2017 | 6:51 am

How to respond to device and software backdoors inserted or left by vendors

It’s bad enough when black hat hackers insert malicious backdoors into systems and software after vendors/makers have sold these into the marketplace. It is another matter when the vendors who create these devices and programs unwittingly or purposely leave backdoors inside their products.To read this article in full or to leave a comment, please click here(Insider Story)

Posted on: 28 March 2017 | 6:47 am