Protecting a world in which critical infrastructure runs Linux—not to mention protecting journalists and political dissidents—begins with protecting the kernel. The way to do that is to focus on squashing entire classes of bugs, so that a single undiscovered bug would not be exploitable, even on a future device running an ancient kernel. … [Read more...] about Unsafe at any clock speed: Linux kernel security needs a rethink
End point security
Part of the problem is that there's very little incentive for most OEMs and carriers to keep their handsets up to date after they leave store shelves. In both the iPhone and iPad lineups, Apple typically keeps a version of an older product around to sell as lower-priced models, rather than coming out with two or three new models targeted to specific market segments. This means that continued software updates for those products don't just benefit existing users, but they also ensure that those lower-priced phones that are still on store shelves continue to look appealing to new buyers. The market for Android devices is considerably more competitive than that for iOS, and new phones aren't always intended to replace the top-end model, which ensures that no one phone or tablet is on store shelves making money for its manufacturer for very long. … [Read more...] about What happened to the Android Update Alliance?
Only a few months later we are seeing how realistic these insights were. Cyberwarfare avoids the physical toll and casualties, but in the end, it can be just as destructive and dangerous. Being able to peer into the infrastructure of a government through a computer monitor and bring it to a screeching halt is a truly disturbing vision. One that countless governments and agencies around the world are working to prevent as they help their nation-states employ cyberwarfare defences and initiatives that protect their businesses and their citizens in equal measure. Businesses must continue to plan for cyber attacks, security breaches, data loss, and system infection. … [Read more...] about The age of cyber-warfare