IANS Blog RSS Feed

http://www.iansresearch.com

Poulin to CSO: We Hacked a Smart Building Using ?Old-School? Techniques

- Thu, 11 Feb 2016 00:00:00 GMT

The ?smarter? buildings get, the easier they are to hack? Maybe. IANS Faculty Chris Poulin, research strategist for IBM?s X-Force ethical hacking team, recently spoke to CSO?s Maria Korolov about a penetration test in which his team was able to gain access to all of the buildings operated by a building management company.

Privacy, Security Concerns Rise as States Mull Encryption Backdoor Requirements

- Wed, 27 Jan 2016 00:00:00 GMT

National Data Privacy Day (January 28th) certainly comes at an interesting time this year, as legislators in two of the most technology-centric U.S. states recently introduced similar bills that would force smartphone manufacturers to include encryption backdoors in their devices.

Fledgling Cyber-Insurance Market Tested by Early Denials, Lawsuits

- Wed, 20 Jan 2016 00:00:00 GMT

Cybersecurity insurance policies may be relatively new, but they have one important thing in common with established, legacy business coverage: They live and die in the fine print.

Hacker-Caused Ukrainian Power Outage Marks First Known Attack With Immediate, Direct Public Impact

- Tue, 05 Jan 2016 00:00:00 GMT

Security researchers have confirmed that a recently updated version of the highly destructive BlackEnergy malware package infected the systems of at least three power authorities in Ukraine, causing a massive outage that left thousands of homes in the Ivano-Frankivsk region of the country without electricity.†

Top 10 IANS Insights from a Tumultuous 2015

- Mon, 28 Dec 2015 00:00:00 GMT

Another year is in the books and what a year it was for infosec pros. From the Ashley Madison hack to the OPM breach, to Jeep commandeering and mysterious backdoors in popular networking gear, every week brought a new security twist that forced us all to keep our heads on swivels.

Herold: Misguided CISA Heightens Security, Privacy Concerns

- Mon, 21 Dec 2015 00:00:00 GMT

The controversial Cybersecurity Information Sharing Act (CISA) is now the law of the land, slipped into an eleventh-hour†spending bill designed to keep the federal government running through 2016.

Patch Now: Rogue Code Leaves Gaping Hole in Juniper Gear

- Fri, 18 Dec 2015 00:00:00 GMT

Juniper Networks says unauthorized code could allow attackers to gain administrative access to its NetScreen appliances and decrypt VPN connections without leaving any trace of their actions. Users are urged to apply fixes immediately.

Poulin: Time to Realistically Acknowledge Vehicle Vulnerabilities

- Wed, 16 Dec 2015 00:00:00 GMT

The images and breathless banter were difficult to ignore: celebrity security researchers gaining remote command of an automobile, disrupting on-board systems before forcing the vehicle and its helpless driver into a ditch.

NIST to Infosec Pros: How Is Our Framework Working?

- Mon, 14 Dec 2015 00:00:00 GMT

The National Institute of Standards and Technology is asking infosec practitioners in the public and private sectors to comment on the efficacy of its cybersecurity framework as it prepares to update the popular, two-year-old document.

As Ransomware Attacks Evolve, Security Teams Must Prepare For New ?Drive-By? Tactics

- Thu, 10 Dec 2015 00:00:00 GMT

Another week, another evolution of the popular ransomware attacks. When we last wrote about it, researchers had discovered a new iteration ? ?Linux.Encoder.1? ? that enabled attackers to inject malware into Linux-powered websites and encrypt all files in the home and backup directories. Now, it appears the popular exploit kit Angler is being used to spread the latest version of CryptoWall and other ransomware on websites as part of ?drive-by? campaigns that begin with the deployment of password-stealing malware.†

Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

W97M.Downloader.J

- Thu, 23 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Cryptlocker!g64

- Wed, 22 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g218

- Wed, 22 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g220

- Wed, 22 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heuristic.150

- Wed, 22 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g210

- Wed, 22 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g240

- Wed, 22 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g246

- Wed, 22 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g307

- Wed, 22 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g251

- Wed, 22 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g268

- Wed, 22 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g280

- Wed, 22 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g319

- Wed, 22 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g320

- Wed, 22 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Tapin!gen1

- Wed, 22 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspLaunch!g12

- Wed, 22 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen58

- Wed, 22 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MSWord!g7

- Wed, 22 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g325

- Wed, 22 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MSWord!g5

- Wed, 22 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Backdoor.Dexbia

- Mon, 20 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AZ

- Sat, 18 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W97M.Dropper

- Thu, 16 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Shimrat

- Thu, 16 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Trafic1.RGC!g6

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic2.RGC!g5

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic2.RGC!g1

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Shimrat

- Thu, 16 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.SuspTempRun

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.OF!g4

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.CM!g7

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.CM!g11

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g201

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen54

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen24

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g171

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g107

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Coinbitminer!g1

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.BC.Trojan!g1

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.CM!g2

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.CM!g18

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.BC.SuspBeh!g3

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g150

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.CM!g4

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.PS!g3

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g180

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.CM!g14

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.PS!g2

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.JSDownloader!g2

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Limitail!gen6

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MSWord!g2

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic1.RGC!g12

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.TCP!gen5

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.TCP!gen3

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.SH!g2

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g190

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

JS.Racryptor

- Thu, 16 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4171

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AR

- Thu, 16 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AS

- Wed, 15 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Bayrob!gen9

- Fri, 27 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

JS.Ransomcrypt.B

- Tue, 14 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

JS.Ransomcrypt.B!php

- Tue, 14 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-0196

- Sun, 12 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Munidub

- Sat, 11 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-0174

- Sun, 12 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-0176

- Sun, 12 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-0189

- Sun, 12 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-0191

- Sun, 12 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-0193

- Sun, 12 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AY

- Thu, 9 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ranscrypt.AY!gm

- Thu, 9 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Heur.RGC!g189

- Tue, 7 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.OF!g1

- Tue, 7 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MSWord!g4

- Tue, 7 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Ransom.AK!gen1

- Tue, 7 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic1.RGC!g4

- Tue, 7 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic2.RGC!g11

- Tue, 7 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Contwoo!g1

- Wed, 8 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Steladok!g1

- Tue, 7 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptlock.AH!gm

- Tue, 7 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Cryptdefense!g4

- Tue, 7 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.BC.SuspBeh!g5

- Tue, 7 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g49

- Tue, 7 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

W97M.Incompat

- Tue, 7 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Cryptlocker!g56

- Tue, 7 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g104

- Tue, 7 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g198

- Tue, 7 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.CM!g9

- Tue, 7 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Backdoor.Steladok

- Mon, 6 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Hookaberg

- Mon, 6 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AX

- Mon, 6 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AW

- Sat, 4 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Hynet

- Sat, 4 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Uverat.B

- Thu, 2 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Gatenori

- Thu, 2 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ascesso!gm

- Wed, 1 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-2545

- Wed, 1 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

MSH.Downloader

- Wed, 1 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Enfourks

- Tue, 31 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Shopperzads

- Mon, 30 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Incompat

- Mon, 30 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

Don?t fall prey to this clever piracy extortion scam

- Fri, 24 Jun 2016 16:35:52 -0400

For as detestable as they are, scammers are undeniably clever and resourceful. In the most recent example which highlights the lengths to which scammers will go to swindle people out of the hard-earned money, Torrent Freak directs us to a new phishing scheme where ISPs are the primary target. DON'T MISS:† iPhone 7 will be Apple?s riskiest iPhone release yet According to the report, an individual or group of individuals are†masquerading as representatives from IP Echelon, the IP tracking arm of Lionsgate. These malicious actors are reaching out to ISPs with takedown notices which are then passed along to consumers, and bundled with such notices are fines which users are encouraged to pay in order to avoid legal proceedings. And because the consumer sees correspondence from their official ISP, they assume that it is 100% legitimate: TorrentFreak was alerted to a takedown notice Lionsgate purportedly sent to a Cox subscriber, for allegedly downloading a pirated copy of the movie Allegiant. Under threat of a lawsuit, the subscriber was asked to pay a $150 settlement fee. ... For a phishing scam the fake DMCA notice does its job well. At first sight the email appears to be legit, and for Cox Communications it was real enough to forward it to their customers. The report notes that U.S. law enforcement agencies are already looking into the matter. In the meantime, you should independently reach out to the legitimate rightsholder if you receive such a notice, rather than just paying up directly.

HTC?s LG Nexus 5X successor will not kill the headphone jack

- Fri, 24 Jun 2016 14:40:41 -0400

There?s much ado about a certain headphone jack these days. The iPhone 7 is expected to ditch the standard 3.5mm port, just like Motorola?s 2016 flagship devices that were announced a few weeks ago . But not all phones will stop supporting the audio standard, and at least one of the two upcoming HTC-made Nexus devices is rumored to have a headphone jack. In fact, a new leak gives us a preview of the rumored hardware of the smaller 2016 HTC Nexus handset. DON?T MISS: Galaxy Note 7 shaping up to be Samsung?s most powerful smartphone yet A trusted source shared with Android Police the supposed†specs of the HTC Sailfish, which is the codename of the 5-inch Nexus handset made by the Taiwanese handset maker this year. HTC is rumored to have partnered with Google to launch two distinct Nexus devices this year , likely the successors of the LG Nexus 5X and the Huawei 6P. The HTC Sailfish will reportedly feature a 5-inch Full HD display, 64-bit 2.0GHz quad-core processor, 4GB of RAM, 32GB of storage, 12-megapixel rear camera, 8-megapixel front camera, Bluetooth 4.2, rear fingerprint reader, USB-C port, at least one speaker on the bottom, and the headphone jack on top. It?s not clear at this time what type of mobile processor the HTC Nexus will get, whether the phone will have any other storage versions, or whether it?ll have dual speakers on the bottom. But the headphone jack is explicitly mentioned. Information regarding pricing and release dates has not been leaked, and there are no images available for the handset. The specs for the HTC Marlin Nexus handset have not leaked.

DOJ's refusal to turn over code complicates child porn cases

- Fri, 24 Jun 2016 12:18:00 -0400

SEATTLE (AP) ? The Justice Department's refusal to disclose information about a software weakness it exploited during a major child pornography investigation last year is complicating some of its prosecutions arising from the bust.

Clinton failed to hand over key email to State Department

- Fri, 24 Jun 2016 03:36:26 -0400

FILE - In this March 12, 2012 file photo, then-Secretary of State Hillary Rodham Clinton checks her mobile phone after her address to the Security Council at United Nations headquarters. Newly released emails show State Department staffers wrestled in December 2010 over a serious technical problem with then-Secretary of State Hillary Clinton's home email server. They temporarily disabled security features, which left the server more vulnerable to hackers. Weeks later, hackers attacked the server so seriously it was shut down. (AP Photo/Richard Drew, File)WASHINGTON (AP) ? Former Secretary Hillary Clinton failed to turn over a copy of a key message involving problems caused by her use of a private homebrew email server, the State Department confirmed Thursday. The disclosure makes it unclear what other work-related emails may have been deleted by the presumptive Democratic presidential nominee.


FBI did not need warrant to hack child porn suspect's computer -court

- Thu, 23 Jun 2016 19:07:20 -0400

The FBI did not need a search warrant to hack a suspect's computer during an investigation of a large child pornography website, a U.S. judge has ruled, in a decision one group of private advocates called "dangerously flawed." In a decision unsealed on Thursday, U.S. District Judge Henry Morgan in Newport News, Virginia, rejected a bid to suppress evidence against Edward Matish, one of at least 137 defendants charged in the probe of the website Playpen. Morgan noted the widespread nature of hacking today, and compared the hacking of Matish's computer to a police officer looking through someone's broken window blinds, which the Supreme Court has said does not violate the U.S. Constitution. As a result, he said, a computer normally afforded protection in other circumstances against unreasonable searches "is not protected from Government actors who take advantage of an easily broken system to peer into a user's computer." The ruling drew sharp criticism from Mark Rumold, a senior staff attorney Electronic Frontier Foundation, who in a blog post called the decision "dangerously flawed." "To say the least, the decision is bad news for privacy," he wrote.

Banks are killing the password, and they can thank the iPhone for that

- Thu, 23 Jun 2016 18:30:37 -0400

Many distinct entities are looking to kill the password, or replace it with better, more secure ways of logging into several online services. Banks are among them, and it?s easy to understand why. They want to protect their money. In light of the many security breaches that have put at risk the identities and online assets of millions of users, banks are encouraging customers to sign up for in-app biometric authentication methods. Scanning a fingerprint, the eye, or recording voice is a lot easier, and more secure, than logging into online banking services using credentials that hackers can steal or social engineer. And the iPhone is a big reason why banks are looking to kill the password. DON?T MISS: Galaxy Note 7 shaping up to be Samsung?s most powerful smartphone yet In an extensive piece, The New York Times explains the various password alternatives banks use, all related to a certain extent to biometrics. Bank of America, JPMorgan Chase, and Wells Fargo have millions of customers who log into their bank accounts using fingerprints on mobile phones, a feature iPhone introduced with the iPhone 5s, and which later became an integral part of the Apple Pay wireless payments feature. Apple equipped smartphones with fingerprint sensors all the way back to 2013, and many competitors followed suit. A year later, Apple opened Touch ID to developers and launched Apple Pay. However, it?s only recently that banks have released apps that can take advantage of the feature. Other biometrics used include eye scans (Wells Fargo), voice (Citigroup), and facial contours (USAA). It?s important to note that banks are worried that regular username and password logins aren?t secure because of all the many breaches in the last few years that allowed hackers to steal millions of credentials for various services as well as other identifiable information such as social security numbers. Financial institutions have toyed for years, with the idea of adding biometric-based security layers to customer accounts but the available technology was cumbersome and expensive. The iPhone and other devices solved that problem, making smartphones practically ubiquitous. Smartphones are advanced enough to let apps read fingerprints, scan eyes, and record voice in crystal clear quality. Also, smartphones also act as a second layer of protection. ?If you have your phone and you are authenticating with your fingerprint, it is very likely you,? Twin Mill founder and biometrics security expert Samir Nanavati told the Times . The problem with biometric-based logins is that customers have to agree to make fingerprints, eye scans, and voice accessible by banks. And there?s always the theoretical possibility that clever hackers might find ways to compromise this type of security as well. But banks to not store actual fingerprints or eye patterns. Instead, they?re keeping templates made of hard-to-predict numerical sequences. Other safeguards are also in place, including voice prompts that ensure the user isn?t playing a voice recording to log in. Eye-scanning apps tell users to blink and/or move the eyes to avoid someone using a photo to log into an account. Wells Fargo teamed up with EyeVerify, whose technology creates a maps of the veins in the whites of the eye. In addition to securing accounts better than passwords, biometrics can also transform the entire banking experience, making it faster than before. However, while logins are almost instant, certain operations, like transferring funds, might still require good-old passwords, at least for the time being. The Times ? full article on the matter is worth a read and it?s available at the source link.

Bankruptcy filing by Brazil's Oi rattles global supply chain

- Thu, 23 Jun 2016 18:01:01 -0400

By Brad Haynes and Ana Mano SAO PAULO (Reuters) - Brazil's biggest bankruptcy filing ever is sending shockwaves far beyond the recession-hit country's borders as operator Oi SA seeks creditor protection from global telecoms suppliers and export banks around the world. Oi is seeking protection on over 500 million reais ($150 million) of accounts payable to international providers from Nokia Corp and Ericsson to IBM Corp and Alcatel-Lucent SA, according to court documents reviewed by Reuters. The biggest Brazilian fixed-line carrier also owes about $1 billion to foreign development banks in China, Finland, Canada and Germany, which encouraged exports to Brazil during a recent surge in spending on wireless and broadband networks.

Google?s two biggest partners are both working toward ditching Android

- Thu, 23 Jun 2016 10:23:25 -0400

Today, Google's Android platform and Apple's iOS platform dominate the mobile landscape. It's difficult to imagine that ever changing considering how far behind other platforms are at this point, but people said the same thing more than a decade ago when operating systems†like Symbian and Windows Mobile ruled the world. Things change and what goes up must come down. What's interesting, however, is that major Android vendors are already starting to prepare for life after Android despite the platform's strong position at the moment. MUST READ:† Why the boring iPhone 7 is the smartest thing Apple has done in years According to market research firm Gartner, Android's worldwide smartphone market share was 84.1% in the first quarter of 2016. The next closest platform was iOS at just 14.8%, which was down from 17.9% in the same quarter a year earlier. No other mobile platform had a market share that even reached the single digits of a percent ? Microsoft's Windows Mobile/Phone was closest at a pathetic 0.7% In other words, it's Android's world and we just live in it. Despite Android's firm grasp on the smartphone and wider mobile markets, the platforms biggest partners are also working toward someday abandoning the platform. Samsung, the world's biggest Android vendor by a massive margin, has developed its own open source Tizen operating system and it sells phone models that run Tizen in a few regions. Now, a new report reveals that Huawei is following suit. Huawei was the third-largest smartphone vendor in the world in the first quarter of the year, with estimated handset†shipments that totaled 28.7 million units. According to The Information , Huawei has a team of engineers that is†currently beginning to build a new mobile operating system. Details are scarce for the time being but the report says that this small team is based in†Scandinavia and it includes some former Nokia engineers.†Hopefully it's not the same team that built†MeeGo. This is absolutely something that Google needs to keep an eye on. The company's two biggest Android partners are now both taking steps to dial back their reliance on Google's mobile platform, and perhaps someday abandon it entirely.

Emails: State Dept. scrambled on trouble on Clinton's server

- Wed, 22 Jun 2016 19:49:28 -0400

FILE - In this March 12, 2012 file photo, then-Secretary of State Hillary Rodham Clinton checks her mobile phone after her address to the Security Council at United Nations headquarters. Newly released emails show State Department staffers wrestled in December 2010 over a serious technical problem with then-Secretary of State Hillary Clinton's home email server. They temporarily disabled security features, which left the server more vulnerable to hackers. Weeks later, hackers attacked the server so seriously it was shut down. (AP Photo/Richard Drew, File)WASHINGTON (AP) ? State Department staffers wrestled for weeks in December 2010 over a serious technical problem that affected emails from then-Secretary Hillary Clinton's home email server, causing them to temporarily disable security features on the government's own systems, according to emails released Wednesday.


U.S. SEC accuses U.K. man of hacking, fraudulent trades

- Wed, 22 Jun 2016 18:15:45 -0400

The headquarters of the U.S. Securities and Exchange Commission are seen in WashingtonBy Jonathan Stempel NEW YORK (Reuters) - The U.S. Securities and Exchange Commission sued a U.K. man it said hacked into online brokerage accounts of several U.S. investors, placed unauthorized stock trades, and within minutes made profitable trades in the same stocks in his own account. A federal judge issued an emergency order freezing assets belonging to the defendant, Idris Dayo Mustapha, the SEC said on Wednesday, shortly after filing its civil lawsuit with the U.S. District Court in Manhattan. It was unclear whether Mustapha had a lawyer.


Bangladesh unlikely to extend FireEye contract for heist probe

- Wed, 22 Jun 2016 17:27:42 -0400

FireEye logo is seen outside the company's offices in Milpitas, CaliforniaBy Sanjeev Miglani and Serajul Quadir DHAKA (Reuters) - Bangladesh's central bank is unlikely to extend the contract of U.S. cyber security firm FireEye to investigate the electronic theft of $81 million of its money, sources at the bank said on Wednesday, citing high costs as one of the factors. The move comes as law enforcement in Bangladesh and the United States have reported little progress in identifying the criminals more than four months after one of the biggest cyber heists to date. FireEye's Mandiant forensics division was hired by Bangladesh Bank weeks after the cyber heist in early February.


World's Smartest Companies: The Chinese Are Rising

- Tue, 21 Jun 2016 15:27:00 -0400

China?s companies are getting smarter, beating their Japanese and Korean counterparts and catching up with their American counterparts.† According to recent MIT Technology Review?s †annual listing of the ...

Reports claims Samsung?s Galaxy S8 will feature a 4K display and a (shocker) dual camera

- Tue, 21 Jun 2016 10:56:25 -0400

We're still several months away from the unveiling of Samsung's Galaxy S8, but rumors are†already cropping up on what seems like a weekly basis. Earlier this month, Samsung showed off a 5.5-inch 4K UHD display at a trade show in California, leading some to believe that it would be the display featured on the company's next flagship smartphone. Now Chinese tech blog NetEase is making a similar claim, providing even more credence to the rumor. DON'T MISS:† A week with iOS 10: It?s fantastic, and I?m bored Although 4K may sound like overkill for a smartphone display, it could be invaluable for smooth virtual reality content. Samsung has already†made strides in that field with the launch of the Gear VR headset, but if the quality of the content is ever going to come close to that of the Oculus Rift or the HTC Vive, Samsung needs an incredibly sharp mobile display to work with. As CNET notes , if Samsung were to go with a 4K display, it would put an enormous strain on the battery, forcing the company to use†a higher-capacity†battery in the Galaxy S8. Might this affect the overall design of the phone? Later in the same report, NetEase claims that, much like the iPhone 7 Plus , the Galaxy S8 will feature a dual-lens rear camera. There appears to be even less evidence backing up this tidbit than there is for the 4K display, but it wouldn't be a stretch for Samsung to follow the likes of LG and Huawei in 2017, especially if Apple is going to include a dual camera on its own high-end iPhone 7 Plus.

OnePlus 3 vs. Galaxy S7 edge speed test, round 2: What happens when 6GB of RAM is unleashed?

- Tue, 21 Jun 2016 09:31:53 -0400

The OnePlus 3 might be one of the best smartphones you can buy without parting with too much cash, but it?s not necessarily the fastest one. Recent real-life speed tests showed that the OnePlus flagship lags behind the Galaxy S7 edge and the iPhone 6s even though it has an outrageous amount of RAM. The OnePlus 3 packs 6GB of RAM, compared to 4GB for the Galaxy S7 edge and 2GB for the newest iPhone. OnePlus addressed the RAM management following these tests, saying that the phone doesn?t keep too many apps in memory to conserve battery life. That said, some intrepid hackers came up with an unofficial "fix" for the issue, prompting a second speed test comparison. DON?T MISS:† This crazy iPhone 6s scam on Amazon isn?t what you think The same C4ETech channel that conducted the previous tests performed this ?revenge? comparison and the results are quite intriguing. The Galaxy S7 edge?s Samsung processor is speedier than the Qualcomm Snapdragon 820 in the OnePlus 3, but the RAM performance is clearly now superior on the OnePlus phone. The Galaxy S7 edge might still be speedier at opening apps, but the OnePlus 3 seems to load them from memory much faster when the 6GB of RAM is unleashed. Compared to Apple's†iPhone 6s, the OnePlus 3 is still slower at opening apps but the RAM fix makes it even faster at loading apps from memory than the iPhone, something that didn?t happen in the first test . That said, it should be noted that the OnePlus 3 in this test is rooted and running custom firmware that "repairs" the default RAM management. OnePlus is yet to roll out similar firmware for the phone, and it might never make these changes in order†to conserve battery life. The OnePlus 3 does have a large 3,000 mAh battery and comes with fast-charging technology, so why is†OnePlus so worried†about battery life that it decided to†throttle RAM performance? The full video is embedded below. https://www.youtube.com/watch?v=np3wfpTq_2Y

Proposals to curb online speech viewed as threat to open internet

- Tue, 21 Jun 2016 06:28:56 -0400

Protesters from the Anonymous India group of hackers wear Guy Fawkes masks as they protest against laws they say gives the government control over censorship of internet usage in MumbaiBy Yasmeen Abutaleb and Alastair Sharp SAN FRANCISCO/ TORONTO (Reuters) - At least a dozen countries are considering or have enacted laws restricting online speech, a trend that is alarming policymakers and others who see the internet as a valuable medium for debate and expression. Such curbs are called out as a threat to the open internet in a report on internet governance set to be released today at an Organization for Economic Cooperation and Development meeting in Cancun, Mexico. The report, reviewed by Reuters, warns of dangers for the global internet, including intrusive surveillance, rising cybercrime and fragmentation as governments exert control of online content.


Chinese economic cyber-espionage plummets in U.S.: experts

- Tue, 21 Jun 2016 04:54:21 -0400

A hand is silhouetted in front of a computer screen in this picture illustration taken in BerlinBy Joseph Menn and Jim Finkle SAN FRANCISCO (Reuters) - The Chinese government appears to be abiding by its September pledge to stop supporting the hacking of American trade secrets to help companies there compete, private U.S. security executives and government advisors said on Monday. FireEye Inc, the U.S. network security company best known for fighting sophisticated Chinese hacking, said in a report released late Monday that breaches attributed to China-based groups had plunged by 90 percent in the past two years. FireEye's Mandiant unit in 2013 famously blamed a specific unit of China's Peoples Liberation Army for a major campaign of economic espionage.


Bangladesh central bank officials to meet New York Fed over stolen funds

- Tue, 21 Jun 2016 04:44:48 -0400

Commuters pass by the front of the Bangladesh central bank building in DhakaBy Sanjeev Miglani and Ruma Paul DHAKA (Reuters) - Bangladesh central bank officials will hold a meeting with the New York Federal Reserve next month to try and speed up efforts to recover $81 million stolen by hackers from its account at the Fed, officials in Dhaka said. More than four months after the hackers broke into the computer systems of Bangladesh Bank and transferred money into bank accounts in Philippines using the SWIFT payment network, there is no breakthrough yet in investigations. Most of the money has disappeared into casinos in the Philippines and remains missing.


Indonesia, South Korea central bank websites hit by cyber attacks; no losses

- Tue, 21 Jun 2016 03:04:24 -0400

The logo of the Bank of Korea is seen on the top of its building in SeoulBy Hidayat Setiaji JAKARTA (Reuters) - The central banks of Indonesia and South Korea have been hit by cyber attacks on their public websites since activist hacking group Anonymous pledged last month to target banks across the world, senior officials in the two countries told Reuters. In response to the attempted hacks, Bank Indonesia (BI) has blocked 149 regions that don't usually access its website, including several small African countries, Deputy Governor Ronald Waas said in an interview late on Monday. Central banks have been on high alert in the wake of revelations that hackers issued fraudulent money transfers to steal $81 million from the Bangladesh central bank in February.


Ringleader pleads guilty in StubHub ticket cybertheft case

- Mon, 20 Jun 2016 19:45:32 -0400

NEW YORK (AP) ? A Russian ringleader of a group that fraudulently bought some of the hottest tickets in music, sports and theater by sneaking into StubHub users' accounts pleaded guilty Monday in a scheme involving over $1 million worth of tickets.

Keyboard warriors: South Korea trains new frontline in decades-old war with North

- Mon, 20 Jun 2016 02:18:48 -0400

A student sits in front of a computer while demonstrating softwares during an interview with Reuters at War Room at The Korea University in SeoulBy Ju-min Park SEOUL (Reuters) - In one college major at Seoul's elite Korea University, the courses are known only by number, and students keep their identities a secret from outsiders. The Cyber Defense curriculum, funded by the defense ministry, trains young keyboard warriors who get a free education in exchange for a seven-year commitment as officers in the army's cyber warfare unit - and its ongoing conflict with North Korea. North and South Korea remain in a technical state of war since the 1950-53 Korean War ended in an armed truce.


Top Asian News 3:53 a.m. GMT

- Sat, 18 Jun 2016 23:53:51 -0400

CANBERRA, Australia (AP) ? Opposition leader Bill Shorten has used his center-left Labor Party's official campaign launch to cast July 2 general elections as a referendum on the future of Australia's universal health care system. A Labor government introduced government-funded Medicare in 1983 to provide free or subsidized health care for all Australian citizens and permanent residents. Shorten argued on Sunday that the conservative coalition plans to privatize Medicare ? a claim Prime Minister Malcolm Turnbull denies. Six weeks after the election campaign started, Shorten launched his campaign in western Sydney where Labor hopes to win several seats from the government.

Apple ordered to suspend iPhone 6 sales in Beijing

- Sat, 18 Jun 2016 05:30:28 -0400

Customers look at Apple iPhone 6S models on display at an Apple Store in Beijing, Saturday, June 18, 2016. A Chinese regulator has ordered Apple Inc. to stop selling two versions of its iPhone 6 in the city of Beijing after finding it looks too much like a competitor, but Apple says sales are going ahead while it appeals. (AP Photo/Mark Schiefelbein)BEIJING (AP) ? A Chinese regulator has ordered Apple Inc. to stop selling two versions of its iPhone 6 in Beijing after finding they look too much like a competitor, but Apple says sales are going ahead while it appeals.


Hackers find security gaps in Pentagon websites

- Fri, 17 Jun 2016 18:00:23 -0400

WASHINGTON (AP) ? High-tech hackers brought in by the Pentagon to breach Defense Department websites were able to burrow in and find 138 different security gaps, Defense Secretary Ash Carter said Friday.

Teen hacks Pentagon websites, gets thanked for finding 'bugs'

- Fri, 17 Jun 2016 17:53:00 -0400

An illustration picture shows projection of binary code on man holding aptop computer in WarsawBy Idrees Ali WASHINGTON (Reuters) - High school student David Dworken spent 10 to 15 hours between classes on his laptop, hacking U.S. Defense Department websites. Instead of getting into trouble, the 18-year-old who graduated this week was one of two people praised by Secretary of Defense Ash Carter at the Pentagon on Friday for finding vulnerabilities before U.S. adversaries did. "We know that state-sponsored actors and black-hat hackers want to challenge and exploit our networks ... what we didn't fully appreciate before this pilot was how many white hat hackers there are who want to make a difference," Carter said at a ceremony where he also thanked Craig Arendt, a security consultant at Stratum Security.


The Latest: Putin hopes for 'solution' for Russian athletes

- Fri, 17 Jun 2016 16:31:30 -0400

Russian President Vladimir Putin speaks at a joint news conference with Italian Premier Matteo Renzi at the St. Petersburg International Economic Forum in St. Petersburg, Russia, Friday, June 17, 2016. (Sergei Savostyanov/TASS News Agency Pool Photo via AP)VIENNA (AP) ? The Latest on the IAAF's meeting on Russia (all times local):


How excited would you be if your iPhone looked like this?

- Fri, 17 Jun 2016 10:13:23 -0400

On Thursday we shared some great news that made Apple fans around the world giddy with anticipation. Dark Mode, the most sought-after iOS feature following rumors ahead of WWDC 2016, was found hiding in iOS 10 . Developers always snoop around the code in new iOS beta releases in search of clues that might reveal unannounced iOS features, and that's exactly what they found in iOS 10. Want to see what Dark Mode looks like in iOS 10? You can check out actual screen shots of Dark Mode enabled on an iPhone in this post . Want to see what Dark Mode should look like in iOS 10? We've got you covered. MUST SEE:† Video shows us 50 new features that are hidden in iOS 10 First things first: you know all the iOS 10 videos and screenshots you see on every tech blog on the internet right now? That's not what iOS 10 will look like when it's released to the public this fall. Yes, the general design will be the same, but there will be tons of visual tweaks between now and then. So when you see how hideous widgets look on the lock screen, for example, you definitely shouldn't start to panic just yet. Of course, we can only hope that the finished design is even half as sleek and gorgeous as these concept images. Reddit user "ThaArtist" dropped by the iPhone subreddit yesterday evening and posted images of his vision for Dark Mode. Specifically, he mocked up the widget view on the lock screen using dark graphics that match the look and feel of iOS perfectly. Widgets are a pretty big mess visually right now, so maybe Apple will use this sweet mockup for inspiration. Here are ThaArtist's renders:

WADA appoints German to head investigative unit

- Fri, 17 Jun 2016 07:39:08 -0400

MONTREAL (AP) ? A German official who helped investigate doping in Russia has been appointed as the World Anti-Doping Agency's director of intelligence and investigations.

CIA director: US hasn't been able to curb IS global reach

- Thu, 16 Jun 2016 17:48:26 -0400

CIA Director John Brennan testifies on Capitol Hill in Washington, Thursday, June 16, 2016, before the Senate Intelligence Committee hearing on the Islamic State. Brennan said that the Islamic State remains "formidable" and "resilient," is training and attempting to deploy operatives for further attacks on the West and will rely more on guerrilla-style tactics to compensate for its territorial losses in the Middle East. (AP Photo/J. Scott Applewhite)WASHINGTON (AP) ? The U.S. battle against the Islamic State has not yet curbed the group's global reach and as pressure mounts on the extremists in Iraq and Syria, they are expected to plot more attacks on the West and incite violence by lone wolves, CIA Director John Brennan told Congress on Thursday.


Convicted lottery computer manager argues Iowa court appeal

- Thu, 16 Jun 2016 17:36:08 -0400

FILE - In this Sept. 9, 2015, file photo, former Multi-State Lottery Association security director Eddie Tipton leaves the Polk County Courthouse in Des Moines, Iowa, after his sentencing in a jackpot-fixing scandal. Tipton's attorney is arguing to the Iowa Court of Appeals that his client's conviction last year on fraud charges should be thrown out. Tipton, is appealing his July 2015 convictions related to fixing an Iowa Hot Lotto game in 2010, which resulted in a 10-year prison sentence. (AP Photo/Charlie Neibergall, File)DES MOINES, Iowa (AP) ? The attorney for a former lottery official accused of fixing jackpots in several states argued Thursday that his client's conviction last year on fraud charges should be thrown out.


'Lone hacker' claims responsibility for cyber attack on Democrats

- Wed, 15 Jun 2016 23:13:00 -0400

The headquarters of the Democratic National Committee is seen in Washington(Reuters) - A "lone hacker" has taken responsibility for a cyber attack on the U.S. Democratic National Committee, which the DNC and a cyber-security firm have blamed on the Russian government. The DNC and cyber firm CrowdStrike disclosed the attack on Tuesday, saying that hackers working for Russia broke into the DNC's computer network, spied on internal communications and stole research on presumptive Republican presidential nominee Donald Trump. On Wednesday, an individual using the moniker Guccifer 2.0 took responsibility for the attack in a post on the blogging site WordPress.com, saying the DNC was "hacked by a lone hacker." The DNC did not respond to a request for comment late on Wednesday evening on Guccifer 2.0's claim.


Gawker posts anti-Trump playbook; was it stolen from DNC?

- Wed, 15 Jun 2016 21:40:52 -0400

A man takes a selfie as Republican presidential candidate Donald Trump greets supporters after speaking at a rally at the Fox Theater, Wednesday, June 15, 2016, in Atlanta. (AP Photo/John Bazemore)WASHINGTON (AP) ? The website Gawker on Wednesday published what it said appears to be the Democratic National Committee's anti-Donald Trump playbook, which was accessed by hackers in a data breach.


The Latest: Gawker posts anti-Trump playbook; is it DNC's?

- Wed, 15 Jun 2016 21:36:02 -0400

Republican presidential candidate Donald Trump greets former Georgia football coach Vince Dooley during a rally at the Fox Theater, Wednesday, June 15, 2016, in Atlanta. (AP Photo/John Bazemore)WASHINGTON (AP) ? The Latest on campaign 2016 (all times Eastern):


A hacker has leaked the Democrats? dirt file on Trump

- Wed, 15 Jun 2016 16:38:42 -0400

Yesterday, news leaked that the Democratic National Committee's opposition research file on Trump had been hacked by Russian state-sponsored hackers. Today, what appears to be that same file -- 200+ pages on how to take down Trump -- has been leaked to news outlets by a self-proclaimed hacker. Both Gawker.com and The Smoking Gun have published the same file today. They say they were sent it by a hacker calling himself "Guccifer 2.0," a reference to the infamous Romanian hacker who penetrated the networks of senior politicians (including Hillary Clinton) in 2013, and is now in the custody of the FBI. According to Gawker, his motive is to be†?a fighter against all those illuminati that captured our world.? The document published by Gawker is a detailed, 200-page dossier on Trump. It outlines Trump's past statements, including anything that could be used against him, or to undermine his current policy positions. It also compiles a list of strategies and weak points that can be targeted, none of which are particularly surprising or novel. It's difficult to say exactly who this document is more damaging for. The dossier doesn't have a lot of "dirt" -- on first glance, everything is a matter of public record, and there's no smoking gun to fraud or fake hair extensions. But for the DNC, evidence of a serious hack would be embarrassing, to say the least. The authenticity of the document is still in question, but Gawker says it also received a number of other documents from the hacker, which look to also be from the DNC. In total, the hacker is claiming to have 100GB of data from the DNC. Given Clinton's background with cybersecurity, a leak from the DNC -- even if it's not an organization directly under her control -- is going to be bad PR. If the remainder of the documents leak (and there's anything juicy in there), this could turn into a full-blown disaster for the Democrats.

Home Depot: US credit card firms slow to upgrade security

- Wed, 15 Jun 2016 14:24:00 -0400

Home Depot: US credit card firms slow to upgrade securityVisa and MasterCard are using security measures prone to fraud, putting retailers and customers at risk of thieves, The Home Depot Inc. says in a new federal lawsuit. Last month, Arkansas-based Wal-Mart Stores Inc. sued Visa Inc. over similar issues. Atlanta-based Home Depot says new payment cards with ?chip? technology remain less secure in the U.S. than cards used in Europe and elsewhere in the world.


The Latest: Clinton aide notes 'positive' talk with Sanders

- Tue, 14 Jun 2016 23:14:35 -0400

Democratic presidential candidate Sen. Bernie Sanders, I-Vt., center, accompanied by his wife Jane, center right, leaves through the lobby of the Capitol Hilton after meeting with Democratic presidential candidate Hillary Clinton, in Washington, Tuesday, June 14, 2016. (AP Photo/Andrew Harnik)WASHINGTON (AP) ? The Latest on campaign 2016 (all times Eastern):


The Edge: Don't Worry, D.C., You're Last, but Not ... Oh

- Tue, 14 Jun 2016 17:34:00 -0400

Today in One Paragraph Washington, D.C., holds its Democratic primary. President Obama denounced Donald Trump?s rhetoric in light of the Orlando nightclub attack, and House Speaker Paul Ryan stood by his criticism of Trump?s proposed Muslim ban. Hackers connected to the Russian government stole opposition research on Trump from the Democratic National Committee, according to security experts. The U.S. Senate passed the annual defense bill, which includes a provision requiring women to register for the draft. And in a win for net neutrality, the D.C. Court of Appeals ruled to define broadband internet as a utility.

Russians steal research on Trump in hack of U.S. Democratic Party

- Tue, 14 Jun 2016 16:42:28 -0400

A woman is silhouetted during the DNC Rules and Bylaws Committee meeting in WashingtonBy Dustin Volz and Emily Stephenson WASHINGTON (Reuters) - Hackers believed to be working for the Russian government broke into the Democratic National Committee's computer network, spied on internal communications and accessed research on presumptive Republican presidential nominee Donald Trump, the committee and security experts said on Tuesday. Two separate groups entered the DNC's system, and one read email and chat communications for nearly a year before being detected, according to the committee and CrowdStrike, the cyber firm that helped clean up the breach. Russian spies also targeted the networks of Trump and Democratic presidential candidate Hillary Clinton, as well as the computers of some Republican political action committees, the Washington Post quoted U.S. officials as saying, although details were not available.


Hackers sought to steal over $3 billion through wire-transfer fraud: FBI

- Tue, 14 Jun 2016 16:27:25 -0400

By Jim Finkle NEW YORK (Reuters) - Hackers have sought to steal more than $3 billion from businesses in a pernicious, fast-growing type of scam in which criminals impersonate company executives in emails ordering large wire transfers, the Federal Bureau of Investigation warned on Tuesday. The FBI disclosed the data as it launched a public awareness campaign providing tips on how to defend against such scams. The cases, which are widely known as business email compromise, target businesses and not consumers.

Air, land, sea, cyber: NATO adds cyber to operation areas

- Tue, 14 Jun 2016 15:27:20 -0400

FILE - In this June 13, 2016 file photo, NATO Secretary General Jens Stoltenberg speaks in Brussels. NATO agreed Tuesday, June 14, 2016, to make cyber operations part of its war domain, along with air, sea and land operations, and to beef up the defense of its computer networks. Stoltenberg said the decision to formally consider cyberoperations a military domain is not aimed at any one country. He says the allies need to be able to better defend themselves and respond to attacks on their computer networks. (AP Photo/Virginia Mayo, File)BRUSSELS (AP) ? NATO agreed Tuesday to make cyber operations part of its war domain, along with air, sea and land operations, and to beef up the defense of its computer networks.


Democratic Party's computers breached by Russian hackers

- Tue, 14 Jun 2016 15:23:11 -0400

FILE - In this March 21, 2016 file photo, Democratic National Committee (DNC) Chair, Rep Debbie Wasserman Schultz, D-Fla. is interviewed in New York. Two ?sophisticated adversaries? linked to Russian intelligence services broke into the DNC?s computer networks and gained access to confidential emails, chats and opposition research on presumptive Republican nominee Donald Trump, the party and an outside analyst said Tuesday, June 14, 2016. Wasserman Schultz called the incident "serious." (APAP Photo/Richard Drew, File)WASHINGTON (AP) ? Sophisticated hackers linked to Russian intelligence services broke into the Democratic National Committee's computer networks and gained access to confidential emails, chats and opposition research on presumptive Republican nominee Donald Trump, people familiar with the breach said Tuesday.