IANS Blog RSS Feed

http://www.iansresearch.com

Hackers Release More Ashley Madison Data

- Mon, 24 Aug 2015 00:00:00 GMT

Even if you have been living under a rock, you?ve probably heard about the hack and subsequent data dump targeting Ashley Madison, a controversial online dating service for married individuals.

Newly Discovered ?Stagefright? Bug the Worst Android Vulnerability Yet

- Wed, 29 Jul 2015 00:00:00 GMT

A researcher has discovered a massive security flaw impacting Android mobile devices that potentially allows hackers to gain remote code execution privileges simply by knowing the targeted individual?s phone number.

Officials: United Airlines, NYSE Shutdowns Not Caused by Hackers

- Thu, 09 Jul 2015 00:00:00 GMT

Speculation and conspiracy theories were running wild one day after United Airlines, the New York Stock Exchange and the Wall Street Journal unexpectedly shut down as a result of what government and company officials are calling technical glitches.

Surveillance Software Maker ?Hacking Team? Victimized in Data Breach

- Mon, 06 Jul 2015 00:00:00 GMT

What happens when the hackers get hacked? We?re quickly finding out, as an Italian company that sells surveillance software to government agencies recently fell victim to what appears to be a significant data breach.

Cisco to Purchase OpenDNS in $635 Million Deal

- Tue, 30 Jun 2015 00:00:00 GMT

Cisco?s efforts to add a cloud security layer took a major step forward this week, as the technology giant has announced it plans to acquire San Francisco-based cloud security firm OpenDNS.

Millions of Samsung Galaxy Phones Vulnerable to Keyboard Software Flaw

- Wed, 17 Jun 2015 00:00:00 GMT

A security flaw in the pre-installed keyboard software on Samsung Galaxy mobile devices could potentially give hackers system user level privileges, enabling them to install malicious apps and even eavesdrop on phone calls.

LastPass Breach Exposes User Emails, Password Reminders

- Tue, 16 Jun 2015 00:00:00 GMT

It?s commonly stated that no matter how diligent one is when it comes to information security, it?s impossible to ever be 100 percent protected, and a recently disclosed breach of a password manager provided a stark reminder of this reality.

Federal Union: OPM Breach Far More Extensive Than Initially Disclosed

- Fri, 12 Jun 2015 00:00:00 GMT

The union representing government employees claims the hackers who breached the Office of Personnel Management (OPM) gained access to far more data than the office has disclosed.

Kaspersky: Nation-State Attack Targeted Hotels Hosting Iran Nuclear Negotiations

- Thu, 11 Jun 2015 00:00:00 GMT

Cybersecurity firm Kaspersky says it has uncovered a cyberattack likely perpetrated by a nation state that targeted hotels where negotiations over the Iran nuclear deal were being held.

IANS Los Angeles Mobile Security Symposium Recap

- Wed, 10 Jun 2015 00:00:00 GMT

During the IANS LA Mobile Security Symposium, IANS Faculty Aaron Turner facilitated a discussion on real-world vulnerabilities that can impact how enterprises rely on mobile technologies.

Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

Trojan.Kotver

-

Risk Level: Very Low. Type: Trojan.

W32.Cridex!gen5

- Thu, 27 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Worm.

JS.Downloader!gen5

- Fri, 28 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Uwarrat

- Wed, 26 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen38

- Tue, 25 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen471

- Tue, 25 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen312

- Tue, 25 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen444

- Tue, 25 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.PUA!gen7

- Tue, 25 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Mimikatz!gen3

- Tue, 25 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Gatak!gen5

- Tue, 25 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Trojan.LH2

- Tue, 25 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Downloader.Upatre!g18

- Mon, 24 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Infostealer.Canfili

- Tue, 25 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Emdivi!gm

- Fri, 21 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Duuzer

- Fri, 21 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.Z

- Tue, 18 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.Y

- Tue, 18 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

W32.Ransomlock.AO!inf3

- Mon, 17 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Virus.

W32.Ransomlock.AO!gen2

- Mon, 17 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Virus.

Trojan.Sofacy.C

- Sat, 15 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.X

- Sat, 15 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptlock.X!gm

- Sat, 15 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Ranscrypt.T!gm

- Thu, 13 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

W32.Greypac!gen1

- Wed, 12 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Worm.

Trojan.Aniralia!gm2

- Wed, 12 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Linux.Pinscan

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen307

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen466

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen540

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g13

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g15

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspLaunch!gen6

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen488

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen391

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen316

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MultiExt!gen2

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Tapaoux.C

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomlock!g79

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Linux.Pinscan.B

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

W32.Ransomlock.AQ!inf

- Mon, 10 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Virus.

Trojan.Aniralia!gm1

- Thu, 6 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Packed.Dromedan!gen17

- Sat, 8 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Korplug!gen10

- Sat, 8 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Cozer.B

- Sat, 8 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Cozer.B!gm

- Sat, 8 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Korplug!gen9

- Thu, 6 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Aniralia

- Thu, 6 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Aniralia!gm

- Thu, 6 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Patchbrowse

- Fri, 7 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Infostealer.Atimpo

- Wed, 5 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-1635

- Wed, 5 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-1732

- Wed, 5 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-1736

- Wed, 5 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-1744

- Wed, 5 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-1750

- Wed, 5 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-1752

- Wed, 5 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-1755

- Wed, 5 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-1687

- Wed, 5 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-1730

- Wed, 5 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-1735

- Wed, 5 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-1737

- Wed, 5 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-1747

- Wed, 5 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-1748

- Wed, 5 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Winnti!gen4

- Wed, 5 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Bloodhound.Exploit.557

- Wed, 5 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

OSX.Sudoprint

- Wed, 5 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-0338

- Tue, 4 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-0339

- Tue, 4 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Fakecrypt

- Sun, 2 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

W32.Potao

- Sun, 2 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Zbot!gen86

- Fri, 31 Jul 2015 00:00:00 -0700

Risk Level: Low. Type: Trojan.

Trojan.Potao

- Fri, 31 Jul 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-2590

- Thu, 30 Jul 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

Uber hires two security researchers to improve car technology

- Fri, 28 Aug 2015 18:23:50 -0400

Uber logo is seen on a vehicle near Union Square in San Francisco, CaliforniaBy Joseph Menn and Heather Somerville SAN FRANCISCO (Reuters) - Uber Technologies Inc [UBER.UL] has hired two top vehicle security researchers, the company said on Friday, high-profile additions that come as the ride-hailing service ramps up its work on technology for self-driving cars. Charlie Miller, who had been working at Twitter Inc, and Chris Valasek, who worked at security firm IOActive, have resigned from their jobs and will join Uber next week. Miller and Valasek won wide attention this month after demonstrating that they could hack into a moving Jeep.


Ashley Madison courted several buyers, landed none before attack

- Fri, 28 Aug 2015 18:17:06 -0400

A photo illustration shows the privacy policy of the Ashley Madison website seen behind a smartphone running the Ashley Madison app in TorontoBy Allison Martell and Alastair Sharp TORONTO (Reuters) - The owner of adultery website Ashley Madison had already been struggling to sell itself or raise funds for at least three years before the publication of details about its members, according to internal documents and emails also†released by hackers as part of their assault on the company in recent weeks. Avid Life Media announced on Friday that CEO Noel Biderman, who founded the website in 2001, had left the company with immediate effect, the latest sign of the wrenching impact on the company of the attack that led to the disclosure of sensitive data about millions of clients.


Exclusive: Russia's Kaspersky threatened to 'rub out' rival, email shows

- Fri, 28 Aug 2015 17:52:09 -0400

Eugene Kaspersky, chairman and CEO of Kaspersky Lab, listens to a question during an interview in New YorkBy Joseph Menn SAN FRANCISCO (Reuters) - In 2009, Eugene Kaspersky, co-founder of one of the world's top security companies, told some of his lieutenants that they should attack rival antivirus software maker AVG Technologies N.V. by "rubbing them out in the outhouse," one of several previously undisclosed emails shows. As previously reported by Reuters, the plan involved creating fake virus samples and malware identifications to fool competitors into disabling or deleting important files, thereby creating problems for their customers.


United Airlines to revamp scheduling to fight flight delays

- Fri, 28 Aug 2015 17:46:35 -0400

United Airlines planes are seen on platform at the Newark Liberty International Airport in New JerseyUnited Airlines plans to change the way it schedules flights and to use new technology to tackle the delays and cancellations that have hurt its competitiveness, company executives told Reuters. The new initiatives aim to narrow the gap in performance between United Continental Holdings Inc and Delta Air Lines Inc , which has the best on-time record of U.S. airlines.


Ashley Madison CEO steps down in wake of hacking

- Fri, 28 Aug 2015 16:16:51 -0400

Hackers Release Confidential Member Information From The Ashley Madison Infidelity WebsiteNEW YORK (AP) ? The CEO of the company that runs adultery website Ashley Madison is stepping down in the wake of the massive breach of the company's computer systems and outing of millions of its members.


Ashley Madison parent CEO quits after huge infidelity data hack

- Fri, 28 Aug 2015 13:22:35 -0400

Ashley Madison founder Noel Biderman poses with a poster during an interview in Hong KongBy Alastair Sharp TORONTO (Reuters) - The chief executive of infidelity website Ashley Madison's parent company Avid Life Media has left, just over a week after hackers leaked data about millions of its clients in a massive cyber assault. Avid Life said on Friday the departure of Noel Biderman was by "mutual agreement" and its existing senior management team would take over until a new CEO is appointed. On Aug. 18, hackers who claimed to be unhappy with its business practices released the Ashley Madison customer data, and police probing the breach said it had sparked extortion attempts and at least two unconfirmed suicides.


Republican Rubio attacks China's Xi ahead of visit

- Fri, 28 Aug 2015 12:37:45 -0400

Republican presidential candidate, Senator Marco Rubio participates in "Restoring American Leadership: A Conversation with Senator Marco Rubio" at the 3 West Club in New YorkBy Alistair Bell WASHINGTON (Reuters) - Republican presidential candidate Marco Rubio on Friday accused Chinese President Xi Jinping, who is scheduled to make a state visit to Washington next month, of stepping up a campaign to push the United States out of Asia. Rubio, a foreign policy hawk, called on President Barack Obama "to speak bluntly to this authoritarian ruler" and downgrade Xi's visit by scrapping a planned state dinner at the White House. Rubio, a U.S. senator from Florida, accused Xi of trying to undermine U.S. influence in Asia by asserting Chinese control over disputed territories in the East and South China Seas.


Investors still in the dark as cyber threat grows

- Fri, 28 Aug 2015 10:38:01 -0400

An illustration picture shows projection of binary code on man holding aptop computer in WarsawBy Simon Jessop and Ross Kerber LONDON/BOSTON (Reuters) - Investors are being poorly served by a haphazard approach from fund managers to the growing threat of cyber crime damaging the companies in which they invest, with a lack of clarity from the businesses themselves compounding the problem. Banks have led the way in developing cyber defenses and some top fund managers have ramped up pressure on companies to do more, but the broader picture is less encouraging. "I don't see any visible stand asset managers are taking, like they do on other social responsibility items," said Malcolm Harkins, information security chief at U.S. cyber security start-up Cylance Inc. The soft underbelly of companies outside the banking sector was exposed again this month when hackers leaked details of nearly 37 million clients of Ashley Madison.


US national security adviser in China ahead of Xi's US trip

- Fri, 28 Aug 2015 08:51:38 -0400

U.S. National Security Advisor Susan Rice, left, shakes hands with Chinese President Xi Jinping prior to their meeting at the Great Hall of the People in Beijing Friday, Aug. 28, 2015. Rice met with Xi amid final preparations for the Chinese leader's visit to Washington next month, with both sides expressing optimism despite their differences. (Jason Lee/Pool Photo via AP)BEIJING (AP) ? The U.S. national security adviser met with President Xi Jinping on Friday amid final preparations for the Chinese leader's visit to Washington next month, with both sides expressing optimism despite their differences.


U.S., China stress positives ahead of Xi trip

- Fri, 28 Aug 2015 07:07:18 -0400

Chinese President Xi Jinping applauds during the opening ceremony of the 15th IAAF World Championships at the National Stadium in BeijingChina and the United States stressed the positives in their complex relationship on Friday during meetings between U.S. National Security Adviser Susan Rice and Chinese officials ahead of a U.S. visit by Chinese President Xi Jinping next month. While the world's two largest economies have important mutual interests, like trying to rein in North Korea's nuclear program, deep disagreements exist over everything from Internet security to China's claims in the South China Sea. "We have seen our bilateral relationship evolve and strengthen in recent months.†And we have found areas of broadened and deepened cooperation that we are certainly looking forward to building upon," Rice told China's top diplomat, State Councillor Yang Jiechi, who outranks the foreign minister.


Huawei brings online smartphone brand Honor to Europe

- Fri, 28 Aug 2015 05:55:22 -0400

A worker adjusts the logo at the stand of Huawei at the CeBIT trade fair in Hanover((This August 27 has been corrected to mention June 30 in fifth paragraph)) LONDON (Reuters) - Huawei Technologies Co Ltd [HWT.UL] brought its youth-focused mobile phone brand Honor to Europe on Thursday with the launch of the Honor 7, a handset that has chalked up sales of more than 1.5 million in China since June. Huawei, the world's number three smartphone maker according to Gartner, has invested heavily in the past couple of years to establish Honor as a standalone brand challenging Beijing-based Xiaomi Inc [XTC.UL] in appealing to digitally savvy consumers. George Zhao, president of Huawei's Honor brand, said the handsets would be mainly promoted and sold online in Europe, as they were in China.


The most hilarious revelation about the Ashley Madison hack yet

- Thu, 27 Aug 2015 23:15:57 -0400

Was Ashley Madison a website full of married guys who spent their time trying to hook up with bots and/or other guys whom they thought were women?†Gizmodo has taken a look at some of the leaked data about the website and has found that the reality is it?s ?like a science fictional future where every woman on Earth is dead, and some Dilbert-like engineer has replaced them with badly-designed robots.? RELATED:†Things are getting worse and worse for Ashley Madison Gizmodo took a look at female profiles on the site and discovered that most of them were never used at all after they were created. In fact, the site estimates that roughly 12,000 of the 5.5 million registered female accounts are

Huge leak details another new iPhone 6s feature you?re going to love

- Thu, 27 Aug 2015 17:30:15 -0400

Apple Watch users who are in love with the Motion watch face ? the one where an animation of a flower, butterfly or jellyfish pops up on the screen†each time you check the time†?†should know that Apple is reportedly bringing the same kind of animated UI to the iPhone 6s and iPhone 6s Plus. DON?T MISS:†New free iPhone app will change the way you use email ? watch the video if you don?t believe us Coming from the often accurate Mark Gurman from 9toMac, the report says Apple will offer iPhone 6s buyers a ?spiced up set of animated wallpapers? that will work similarly to what?s available on the Apple Watch. Animated wallpapers have been seen by two sources who

Everything we expect to see at Apple?s big iPhone 6s event

- Thu, 27 Aug 2015 14:54:15 -0400

Apple on Thursday set September 9th as the official date for its fall 2015 iPhone launch. While Apple?s newest smartphone will be the highlight of its event, we?re expecting to see a lot more from the pride of Cupertino this year than just another phone. Below we?ll go over the biggest things we?re likely to see at Apple?s event on September 9th. RELATED:†iPhone 6s: New report reveals every single detail on new 12MP camera The iPhone 6s and the iPhone 6s Plus These are the twin bells of the ball, although we don?t expect them to look too different from the two smartphones Apple released last year. The most recent leaks indicate both smartphones will feature 12-megapixel cameras that can

Report links hacking scheme to Iran

- Thu, 27 Aug 2015 14:53:21 -0400

NEW YORK (AP) ? Researchers have linked a sophisticated hacking scheme targeting Iranian dissidents and at least one freedom of expression activist back to Iran.

Scary iPhone malware can spy on you even after you close infected apps

- Thu, 27 Aug 2015 14:07:21 -0400

A rather scary piece of iPhone malware†would let an attacker spy on a target using an approved App Store app without the person?s knowledge. In fact, the malware app could continue to gather data for the hackers†? or for a spy agency ? even after the infected†app is closed by the user.†Apple apparently fixed this huge vulnerability beginning with iOS 8.4.1, but earlier iOS builds are still affected. DON?T MISS:†New free iPhone app will change the way you use email ? watch the video if you don?t believe us If you stop using an app and minimize it to the background, the app stops working after about†three minutes to save processor power and thus battery life.†But the Ins0mnia bug, discovered

Finland detains Russian accused of U.S. malware crimes

- Thu, 27 Aug 2015 09:23:25 -0400

Finland confirmed on Thursday it has detained a Russian citizen, Maxim Senakh, at the request of U.S. federal authorities on computer fraud charges, in a move that Russia calls illegal. Konstantin Dolgov, the Russian Foreign Ministry's special representative for human rights, said on Wednesday that Senakh's detention was "another demonstration of the illegal practice of detaining Russian citizens abroad launched by U.S. authorities." If Finland had suspicions that Senakh was involved in illegal activity, it would have been more logical to send such information to Russia, Dolgov added in a statement.

Exporters run for high ground as China growth story unravels

- Thu, 27 Aug 2015 07:30:06 -0400

Chinese national flag flutters in front of a construction site in GuangzhouThe alarming scale of China's economic slowdown is pushing European exporters to accelerate a move into premium goods and services, sacrificing volumes if necessary to sustain margins. The move, on the heels of a surprise yuan devaluation two weeks ago, has further unnerved investors who bought into the growth stories of European exporters dependent on China. German industrial group ThyssenKrupp , Dutch healthcare and consumer group Philips and British food ingredients group Tate & Lyle are among those adjusting for lower growth and a new intensity in price wars.


Secrets have long slipped into State Department email

- Thu, 27 Aug 2015 03:04:36 -0400

Democratic presidential candidate Hillary Rodham Clinton speaks at the Des Moines Area Community College, Wednesday, Aug. 26, 2015, in Ankeny, Iowa. The transmission of classified information across Hillary Clinton?s private email is consistent with a culture in which diplomats routinely sent secret material on unsecured email during the Obama and George W. Bush administrations, according to documents previously made public and reviewed by The Associated Press. (AP Photo/Charlie Neibergall)WASHINGTON (AP) ? During the 2012 attack on U.S. facilities in Benghazi, Libya, State Department officials in Washington were emailing one another with updates in real time. Embedded in those messages were nuggets of classified information, including an apparent reference to a CIA facility that was a closely guarded secret.


British hacker for Islamic State killed in U.S. drone strike in Syria: sources

- Wed, 26 Aug 2015 22:12:34 -0400

By Mark Hosenball WASHINGTON (Reuters) - A British hacker who U.S. and European officials said became a top cyber expert for Islamic State in Syria has been killed in a U.S. drone strike, a U.S. source familiar with the matter said on Wednesday. It was the second reported killing of a senior Islamic State figure in the last eight days after the group's second-in-command was killed in a U.S. air strike in Iraq on Aug. 18. The source indicated that the U.S. Defense Department was likely involved in the drone strike that killed British hacker Junaid Hussain, a former Birmingham, England, resident.

State Department officials routinely sent secrets over email

- Wed, 26 Aug 2015 18:59:04 -0400

State Department officials routinely sent secrets over emailWASHINGTON (AP) ? The transmission of now-classified information across Hillary Rodham Clinton's private email is consistent with a State Department culture in which diplomats routinely sent secret material on unsecured email during the past two administrations, according to documents reviewed by The Associated Press.


Editorial Roundup: Excerpts from recent editorials

- Wed, 26 Aug 2015 18:33:04 -0400

Excerpts from recent editorials in newspapers in the United States and abroad:

Fresh leak suggests next-gen Nexus 5 might be even cheaper than you think

- Wed, 26 Aug 2015 16:48:11 -0400

Google plans to release two Nexus handsets this year, according to a number of reports that have probably covered all the main details about the handsets. LG made a new Nexus 5 for Google while Huawei built a new Nexus 6. Both handsets have been featured in numerous image leaks, with reports saying the new Nexus smartphones will both bring new features including fingerprint sensors and a USB Type-C connector. Now, a new leak shows an extensive specs list for one of the handsets, seemingly confirming some of the past leaks and suggesting that the new Nexus 5 could be even more affordable than we thought. DON?T MISS: Another huge leak: iPhone 6s specs and release date detailed by wireless

Obama will raise cyber security concerns with China's Xi: White House

- Wed, 26 Aug 2015 14:01:35 -0400

U.S. President Barack Obama addresses the National Clean Energy Summit at the Mandalay Bay Resort Convention Center in Las VegasWASHINGTON (Reuters) - The White House said on Wednesday that President Barack Obama will "no doubt" raise concerns about China's cyber security behavior when he meets with Chinese President Xi Jinping next month. Obama will host Xi at the White House in September for a state visit. The United States has alleged Chinese hackers have stolen information from U.S. computer servers. (Reporting By Julia Edwards; Editing by Bill Trott)


Have a Samsung smart fridge? Your Gmail credentials might be at risk

- Tue, 25 Aug 2015 22:05:01 -0400

With each passing year, more and more everyday objects are being outfitted with network connectivity. This type of futuristic world ? dubbed The Internet of Things ? promises to make our lives a whole lot easier in ways we never imagined possible even just a few years ago. Of course, with every great technological advancement comes newfound security risks. Case in point: researchers recently uncovered a security flaw in a Samsung smart fridge which can compromise a user?s Gmail credentials. As to why you might need a refrigerator with an 8-inch Wi-Fi enabled display that can browse the web, mirror what?s on your phone, and even run apps, well, that?s a topic for another day. DON?T MISS:†Another huge leak: iPhone

Things are getting worse and worse for Ashley Madison

- Tue, 25 Aug 2015 19:45:03 -0400

As we?ve mentioned before, notorious cheating website Ashley Madison is extremely screwed. If you still somehow believe that Ashley Madison will somehow come out of its massive hacking crisis unscathed, then you?ll be sobered by two new developments in the story.† RELATED:†Ashley Madison puts out $500,000 bounty on hackers who ruined its business The first development is entirely predictable: Lawsuits from angry users have started rolling in. Reuters reports that ?Ashley Madison and its parent company have been sued in federal court in California by a man who claims that the companies failed to adequately protect clients? personal and financial information from theft, saying he suffered emotional distress.? We?re sure this will be the first of many, many lawsuits against

Irony: NSA worried hackers with super computers might break current encryption standards

- Tue, 25 Aug 2015 18:35:12 -0400

The National Security Agency (NSA) has a bunch of sophisticated tools at its disposal to conduct massive data collection operations all in the name of doing good ? and that?s definitely something you?d want from your intelligence agencies. Ironically, the NSA is already worried about the advanced computers that might be available to humans in the not so distant future, which could be used by hackers to break the complex cryptography that makes possible encryption.† DON?T MISS: Another huge leak: iPhone 6s specs and release date detailed by wireless carrier rep Why is this ironic? Because†the NSA and other spy agencies want to break that encryption that protects your communications and are unhappy when online services and products can protect

Ashley Madison users in US sue cheating website over breach

- Tue, 25 Aug 2015 17:32:15 -0400

Ashley Madison users in US sue cheating website over breachEight people across the U.S. who registered to use Ashley Madison are suing the website for cheaters after hackers released personal and detailed information of millions of users, including financial data ...


Ashley Madison users in US sue cheating website

- Tue, 25 Aug 2015 15:24:19 -0400

Cheating website Ashley Madison hacked, personal info postedEight people across the U.S. who registered to use Ashley Madison are suing the cheating website after hackers released personal and detailed information of millions of users, including financial data ...


University student pleads guilty to making Android spy app

- Tue, 25 Aug 2015 14:22:43 -0400

A Carnegie Mellon University student who hoped to sell enough malicious software to infect 450,000 Google Android smartphones pleaded guilty Tuesday to a federal law meant to prevent hacking of phones ...

Security researcher who hacked moving Jeep leaves Twitter

- Mon, 24 Aug 2015 19:19:34 -0400

Charlie Miller speaks during the Black Hat USA 2015 cybersecurity conference in Las VegasBy Joseph Menn SAN FRANCISCO (Reuters) - The security researcher who hacked into a moving Jeep earlier this year has resigned as an engineer at Twitter Inc after three years on the job, a person familiar with the matter said. Charlie Miller, a former National Security Agency hacker who is the one of the world's best-known security experts, declined to comment on his departure or say what he would do next. A Twitter spokesman could not immediately be reached for comment.


Police: Ashley Madison hack might have led to suicides

- Mon, 24 Aug 2015 16:51:04 -0400

Hackers this week released a second batch of data from Ashley Madison including corporate emails and sensitive computer source codeTORONTO (AP) ? The hacking of the cheating website Ashley Madison has triggered extortion crimes and led to two unconfirmed reports of suicides, Canadian police said Monday.


Rutgers University hires 3 cybersecurity firms

- Mon, 24 Aug 2015 15:41:51 -0400

Rutgers University has hired three cybersecurity firms to protect its computer networks after they were hacked at least four times during the past school year. The firms ? FishNet Security, Level 3 Communications ...

FTC has power to police cyber security: appeals court

- Mon, 24 Aug 2015 15:40:17 -0400

Illustration file picture shows a man typing on a computer keyboard in WarsawA U.S. appeals court said the Federal Trade Commission has authority to regulate corporate cyber security, and may pursue a lawsuit accusing hotel operator Wyndham Worldwide Corp of failing to properly safeguard consumers' information. The 3-0 decision by the 3rd U.S. Circuit Court of Appeals in Philadelphia on Monday upheld an April 2014 lower court ruling allowing the case to go forward. The FTC wants to hold Wyndham accountable for three breaches in 2008 and 2009 in which hackers broke into its computer system and stole credit card and other details from more than 619,000 consumers, leading to over $10.6 million in fraudulent charges.


Two people may have committed suicide after Ashley Madison hack: police

- Mon, 24 Aug 2015 13:04:25 -0400

Homepage of Ashley Madison website displayed on iPad, in photo illustration taken in OttawaBy Alastair Sharp TORONTO (Reuters) - At least two people may have committed suicide following the hacking of the Ashley Madison cheating website, Toronto police said on Monday, warning of a ripple effect that includes scams and extortion of clients desperate to stop the exposure of their infidelity. Avid Life Media Inc, the parent company of the website, is offering a C$500,000 ($379,132) reward to catch the hackers. In addition to the exposure of the Ashley Madison accounts of as many as 37 million users, the attack on the dating website for married people has sparked extortion attempts and at least two unconfirmed suicides, Toronto Police Acting Staff Superintendent Bryce Evans told a news conference.


Thai police struggle to track suspect; 'new bomb' false alarm

- Mon, 24 Aug 2015 06:04:09 -0400

People ride their motorcycles past a digital billboard showing a sketch of the main suspect in Monday's attack on Erawan shrine, in Bangkok, ThailandBy Amy Sawitta Lefevre and Aukkarapon Niyomyat BANGKOK (Reuters) - Thai police said on Monday the trail had gone cold in the hunt for a bomber a week after 20 people were killed in the country's worst bomb attack, and they were unsure if the main suspect was still in Thailand. Faulty security cameras and a lack of equipment were hampering the investigation while an explosive device found at a building site on Monday proved a false alarm, not connected with the Aug. 17 attack on Bangkok's most famous shrine. The main evidence police have for the blast at the Erawan Shrine to a Hindu deity popular with Asian tourists, is security camera footage.


Ashley Madison hack sends shivers through hook-up, porn sites

- Mon, 24 Aug 2015 01:03:50 -0400

A photo illustration shows the privacy policy of the Ashley Madison website seen behind a smartphone running the Ashley Madison app in TorontoBy Josephine Mason TORONTO (Reuters) - Larry Flynt, a defender of free speech and sexual freedom if there ever was one, has this advice for anyone worried by the hack of infidelity site Ashley Madison: Muzzle yourself. It might be too late for many people who, lured by a supposed cloak of digital anonymity, have shared their innermost wishes, fetishes and fantasies on hook-up and porn sites. In exposing the Ashley Madison accounts of as many as 37 million users, hackers released a cache of potentially embarrassing and damaging data.


Major Ashley Madison investor stays faithful to embattled company

- Fri, 21 Aug 2015 21:06:01 -0400

By Alastair Sharp TORONTO (Reuters) - A major investor in infidelity website AshleyMadison.com's parent company said the data breach of its systems was a concern for customers but would not affect his backing of the company. The crisis engulfing Ashley Madison and parent Avid Life Media deepened on Thursday as lawyers filed a class-action lawsuit claiming $750 million in damages from the release by hackers of customers' emails stolen from the company. On Friday, the hackers, who call themselves the Impact Team, told a technology website they have a massive trove of data including users' photos, internal documents and emails they intend to release online.

Infidelity website Ashley Madison's hackers say 'nobody was watching': report

- Fri, 21 Aug 2015 19:50:36 -0400

A photo illustration shows the privacy policy of the Ashley Madison website seen behind a smartphone running the Ashley Madison app in TorontoHackers who stole a trove of sensitive data from AshleyMadison.com said "nobody was watching" as they scoured the infidelity website and vowed to release more emails from its executives, online technology website Motherboard reported on Friday. The tech website said it was given a contact email address for the hackers, who call themselves the Impact Team, by an intermediary. The hackers replied with a message signed with the same signature and fingerprint, known as a PGP key, posted with the Ashley Madison data releases this week, Motherboard said.


Ashley Madison faces $578M Canadian class-action lawsuit

- Fri, 21 Aug 2015 19:12:48 -0400

TORONTO (AP) ? Two Canadian law firms have filed a $578 million class-action lawsuit against the companies that run Ashley Madison after a hacker group's data breach exposed some 39 million memberships in the adultery website earlier this week.