12 Things You (Probably) Didn’t Know About Online Security

At the RSA Conference in San Francisco last week, I got the chance to sit down with Stephen Cobb, a distinguished security researcher for the IT security company ESET. We talked about a lot of things, including Android security issues and how walled gardens have their uses.It was a great conversation, touching on a wide variety of fascinating aspects of online and mobile security, and I wanted to share as many of them as possible.This list seemed like the best way to do that. And while not every one of the dirty-dozen points presented here may surprise you, I can pretty much guarantee that few people will already know – or agree with – everything on the list:1. Big Data is not new to the anti-virus industry. Turns out the anti-virus companies have been doing traffic analysis, incident sharing and code sharing for decades, Cobb claims. They just didn’t call it Big Data until the term become fashionable.2. Anti-virus companies have been practicing co-opetition since the 1980s, when they realized there was no percentage in one company being able to stop one virus while you needed another company to stop a different virus. They quietly began sharing virus signatures and other information, Cobb says.3. All the major Web browsers share information on malware sites and other threats. Chrome, Internet Explorer, Firefox and the others all share which URLs to flag, for example. That’s why when NBC.com was hacked recently and started spewing malware, everybody was able to block it almost immediately.

4. One of the hardest parts of securing Big Data is knowing where the data is actually stored. In the old days, when data was collected and stored, it didn’t really move much. Now, in the cloud, Cobbs says we don’t really know where data is stored. Malware creators are intent on exploiting that, but what form that will take remains to be seen.

5. One reason more high-value targets haven’t been hacked is that there is still so much low-hanging fruit for the bad guys to go after. According to Cobb, so far, there hasn’t been much need to try and crack the hardest targets.

6. Most attacks take the form of malware or hacking. Of the hacking attacks, Cobb says, 80% go after passwords that are either non-existent, guessed or stolen.

7. Anti-virus hasn’t been about matching virus signatures for years. Some people say the anti-virus model doesn’t work because so much new malware is coming out all the time that anti-virus solutions can’t possibly keep up. But Cobb protests that most anti-virus software is continually detecting previously unseen malware.

8. People who know what they’re doing on the Internet might be able to get by with no anti-virus software. But Cobb says people are fooling themselves when they claim: “I don’t run anti-virus software and I’ve never been hacked.” “Are you really OK telling everyone you know – your mom, for instance – not to run anti-virus software?” he asks.

9. There’s still an incredible amount of spam out there. You don’t see it, but it’s still there. It’s using a a huge amount of datacenter power to block it, but it’s built into the network security appliance and you don’t have to deal with it.

10. The overall trend is for increasing levels of security to be compressed into the core, to become part of a standard install. That’s happened to anti-spam, to firewalls and it’s happening to anti-virus, too.

11. It’s a lot harder to write 64-bit malware than it is to write 32-bit malware. And that could help lower the number of attacks on 64-bit systems.

12. In many ways, hacking behavior seems to have gotten better over the years – at least in the United States, Cobb says. But we are now increasingly exposed to other, more dangerous places. The globalization of the Net has caught up with us even as the value of hacking has one way up. Today, hackers aren’t just messing with us, Cobb notes, they’re stealing from us. And that’s a big new incentive.

Kids Code the Darndest Things: 10 Amazing Youth Innovators

Kids deserve more credit than they get. They’re observant, incredibly intuitive and can sometimes figure out what the world needs faster than adults can. Here are 10 youth innovators, from ages seven to 15, particularly worth noting and working on projects ranging from games to anti-bullying apps.

With rapid advancements in technology, and coding education geared toward youth, it comes as no surprise that there are kids pushing innovation out there, and creating apps and programs at astonishingly young ages. Here are 10 youth innovators, from ages seven to 15, particularly worth noting and working on projects ranging from games to anti-bullying apps.

Meet Maddie, the Acrobatic Dog Who Launched a Dream

Typically, we think of dogs as sidekicks, best friends, perhaps even confidantes. But rarely do we discover a dog who is a also a lucrative business partner.Maddie the Coonhound is already famous in the Instagram community, where her owner and photographer Theron Humphrey posts photos of Maddie to over 180,000 eager followers. She even has her own website, Maddie on Things, as well as a forthcoming book, wherein she smiles with squinty eyes and obliging patience.

It’s precisely her calm composure that makes 2.5-year-old Maddie so famous. Well, that and some mad acrobatic skills.

One day on the road, Humphrey decided to pose Maddie atop his truck, hoping she would oblige long enough to capture a quick photograph. He quickly realized he had underestimated his dog.

‘Star Trek’ Mobile App Kicks Off Super Bowl Campaign

The app was designed to be a one-stop shop for Star Trek fans. It includes a news feed feature that shows off Star Trek news articles from around the web. When the film gets closer to release, users will also be able to pre-order tickets for the app from Fandango.In addition to information, the app also has a series of various “missions” that fans can participate in to unlock access to exclusive images, video clips and the chance to win Star Trek prizes.

One mission is to watch the Star Trek Into Darkness teaser trailer. Using the app, users press a “listen” button and when held up against a computer screen or TV. The app then scans the soundwaves and unlocks content for users.