IANS Blog RSS Feed

http://www.iansresearch.com

Poulin to CSO: We Hacked a Smart Building Using ?Old-School? Techniques

- Thu, 11 Feb 2016 00:00:00 GMT

The ?smarter? buildings get, the easier they are to hack? Maybe. IANS Faculty Chris Poulin, research strategist for IBM?s X-Force ethical hacking team, recently spoke to CSO?s Maria Korolov about a penetration test in which his team was able to gain access to all of the buildings operated by a building management company.

Privacy, Security Concerns Rise as States Mull Encryption Backdoor Requirements

- Wed, 27 Jan 2016 00:00:00 GMT

National Data Privacy Day (January 28th) certainly comes at an interesting time this year, as legislators in two of the most technology-centric U.S. states recently introduced similar bills that would force smartphone manufacturers to include encryption backdoors in their devices.

Fledgling Cyber-Insurance Market Tested by Early Denials, Lawsuits

- Wed, 20 Jan 2016 00:00:00 GMT

Cybersecurity insurance policies may be relatively new, but they have one important thing in common with established, legacy business coverage: They live and die in the fine print.

Hacker-Caused Ukrainian Power Outage Marks First Known Attack With Immediate, Direct Public Impact

- Tue, 05 Jan 2016 00:00:00 GMT

Security researchers have confirmed that a recently updated version of the highly destructive BlackEnergy malware package infected the systems of at least three power authorities in Ukraine, causing a massive outage that left thousands of homes in the Ivano-Frankivsk region of the country without electricity.†

Top 10 IANS Insights from a Tumultuous 2015

- Mon, 28 Dec 2015 00:00:00 GMT

Another year is in the books and what a year it was for infosec pros. From the Ashley Madison hack to the OPM breach, to Jeep commandeering and mysterious backdoors in popular networking gear, every week brought a new security twist that forced us all to keep our heads on swivels.

Herold: Misguided CISA Heightens Security, Privacy Concerns

- Mon, 21 Dec 2015 00:00:00 GMT

The controversial Cybersecurity Information Sharing Act (CISA) is now the law of the land, slipped into an eleventh-hour†spending bill designed to keep the federal government running through 2016.

Patch Now: Rogue Code Leaves Gaping Hole in Juniper Gear

- Fri, 18 Dec 2015 00:00:00 GMT

Juniper Networks says unauthorized code could allow attackers to gain administrative access to its NetScreen appliances and decrypt VPN connections without leaving any trace of their actions. Users are urged to apply fixes immediately.

Poulin: Time to Realistically Acknowledge Vehicle Vulnerabilities

- Wed, 16 Dec 2015 00:00:00 GMT

The images and breathless banter were difficult to ignore: celebrity security researchers gaining remote command of an automobile, disrupting on-board systems before forcing the vehicle and its helpless driver into a ditch.

NIST to Infosec Pros: How Is Our Framework Working?

- Mon, 14 Dec 2015 00:00:00 GMT

The National Institute of Standards and Technology is asking infosec practitioners in the public and private sectors to comment on the efficacy of its cybersecurity framework as it prepares to update the popular, two-year-old document.

As Ransomware Attacks Evolve, Security Teams Must Prepare For New ?Drive-By? Tactics

- Thu, 10 Dec 2015 00:00:00 GMT

Another week, another evolution of the popular ransomware attacks. When we last wrote about it, researchers had discovered a new iteration ? ?Linux.Encoder.1? ? that enabled attackers to inject malware into Linux-powered websites and encrypt all files in the home and backup directories. Now, it appears the popular exploit kit Angler is being used to spread the latest version of CryptoWall and other ransomware on websites as part of ?drive-by? campaigns that begin with the deployment of password-stealing malware.†

Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

Infostealer.Rultazo

- Fri, 29 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3244

- Wed, 27 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Heur.RGC!g322

- Wed, 27 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen66

- Wed, 27 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Exp.CVE-2016-3277

- Wed, 27 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3259

- Wed, 27 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Sorcurat

- Mon, 25 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Kotver!gm2

- Mon, 25 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Sorcurat!gm

- Mon, 25 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3261

- Tue, 26 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3240

- Tue, 26 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3242

- Tue, 26 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Gen.5

- Sun, 24 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.BE

- Sun, 24 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Cryptlocker!g59

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g239

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g57

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g311

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspLaunch!g13

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g252

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g204

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g58

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MSWord!g13

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlk.AN!g1

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Exp.CVE-2016-4173

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AX

- Fri, 22 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4203

- Fri, 22 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4251

- Fri, 22 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4252

- Fri, 22 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4192

- Fri, 22 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Cryptlocker!g74

- Wed, 20 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g75

- Wed, 20 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g247

- Wed, 20 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g281

- Wed, 20 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g264

- Wed, 20 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g265

- Wed, 20 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Ransomcrypt.BD

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.BC

- Tue, 19 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ranscrypt.BB!gm

- Sat, 16 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.BB

- Sat, 16 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Spyolog

- Thu, 14 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Pycerine

- Tue, 12 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AW

- Mon, 11 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.Hinired

- Sun, 10 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Worm.

SONAR.Heur.RGC!g255

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g206

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g217

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g221

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g237

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g245

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g253

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g261

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g263

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g266

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g274

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g295

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g298

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g302

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g305

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g315

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g327

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g333

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MSOffice!g1

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Asruex

- Tue, 5 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

OSX.Keydnap

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

OSX.Eelaonur

- Wed, 6 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4121

- Tue, 5 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4150

- Wed, 29 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4133

- Tue, 5 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4153

- Wed, 29 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4151

- Wed, 29 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4152

- Wed, 29 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Downloader.Asruex

- Tue, 5 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Sbidith

- Tue, 5 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

JS.Downloader!gen21

- Fri, 1 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

Exclusive: Clinton campaign also hacked in attacks on Democrats

- Fri, 29 Jul 2016 22:54:01 -0400

U.S. Democratic presidential candidate Clinton looks at a computer screen during a campaign stop at Atomic Object company in Grand RapidsBy Mark Hosenball, Joseph Menn and John Walcott WASHINGTON/SAN FRANCISCO (Reuters) - A computer network used by Democratic presidential nominee Hillary Clinton?s campaign was hacked as part of a broad cyber attack on Democratic political organizations, people familiar with the matter told Reuters. The latest attack, which was disclosed to Reuters on Friday, follows two other hacks on the Democratic National Committee, or DNC, and the party?s fundraising committee for candidates for the U.S. House of Representatives. A Clinton campaign spokesman said in a statement late on Friday that an analytics data program maintained by the DNC and used by the campaign and a number of other entities "was accessed as part of the DNC hack." "Our campaign computer system has been under review by outside cyber security experts.


Clinton roars against Trump as a hacking distraction arises

- Fri, 29 Jul 2016 22:45:53 -0400

Democratic presidential candidate Hillary Clinton speaks during a rally at Broad Street Market in Harrisburg, Pa., Friday, July 29, 2016. Clinton and Kaine begin a three day bus tour through the rust belt. (AP Photo/Andrew Harnik)PHILADELPHIA (AP) ? Fresh off a spirited convention, Hillary Clinton told prospective voters Friday they face a "stark choice" in November and pressed ahead with the scalding rhetoric against her Republican rival that marked many of the speeches in Philadelphia. Another distraction arose, however, as her aides acknowledged that a hacking attack that exposed Democratic Party emails also reached into a computer system used by her own campaign.


Clinton campaign: Computer service used by campaign hacked

- Fri, 29 Jul 2016 22:39:03 -0400

Democratic presidential candidate Hillary Clinton gets off her campaign bus as she arrives for a rally at K'NEX, a toy company in Hatfield, Pa., Friday, July 29, 2016. Clinton and Kaine begin a three day bus tour through the rust belt. (AP Photo/Andrew Harnik)WASHINGTON (AP) ? A computer service used by the campaign of Hillary Clinton was hacked as part of a broader breach of the Democratic National Committee, an intrusion for which the Russian government is the leading suspect, the campaign said Friday.


Flight info screens at Vietnam's 2 major airports hacked

- Fri, 29 Jul 2016 20:57:06 -0400

Passengers crowd at check-in counters at Noi Bai Airport in Hanoi, Vietnam Friday, July 29, 2016. Screens displaying flight information at Vietnam's two major airports, Noi Bai and Tan Son Nhat in Ho Chi Minh City, were hacked Friday to contain distorted information about the South China Sea and insult Vietnam and the Philippines, state media reported. (AP Photo)HANOI, Vietnam (AP) ? Screens displaying flight information and the public address system at Vietnam's two major airports were hacked with derogatory messages against Vietnam and the Philippines in their territorial row against China in the South China Sea.


Exclusive: Clinton campaign also hacked in attacks on Democrats - sources

- Fri, 29 Jul 2016 19:31:32 -0400

U.S. Democratic presidential candidate Clinton looks at a computer screen during a campaign stop at Atomic Object company in Grand RapidsBy Mark Hosenball, Joseph Menn and John Walcott WASHINGTON/SAN FRANCISCO (Reuters) - The computer network used by Democratic presidential nominee Hillary Clinton?s campaign was hacked as part of a broad cyber attack on Democratic political organizations, people familiar with the matter told Reuters. The latest attack, which was disclosed to Reuters on Friday, follows reports of two other hacks on the Democratic National Committee, or DNC, and the party?s fundraising committee for candidates for the U.S. House of Representatives. A Clinton campaign spokesman said in a statement late on Friday that an analytics data program maintained by the DNC and used by the campaign and a number of other entities "was accessed as part of the DNC hack." "Our campaign computer system has been under review by outside cyber security experts.


Russia has motive, capability and form for U.S. email hack

- Fri, 29 Jul 2016 16:40:45 -0400

View shows Kremlin towers and St. Basil's Cathedral in central MoscowBy Andrew Osborn MOSCOW (Reuters) - The Kremlin says it had zero involvement in the hacking of Democratic Party emails while U.S. officials say the hack originated in Russia. Seen through Kremlin eyes, Moscow would only be doing what it feels the United States has been doing to it for years anyway - interfering in a geopolitical rival's domestic politics in an attempt to destabilize and shape events. President Vladimir Putin said in February he had seen specific intelligence suggesting Russia's foreign enemies - code for Washington - were preparing to meddle in Russian parliamentary elections later this year.


Democratic fund-raising group for Congress candidates confirms hack

- Fri, 29 Jul 2016 14:34:21 -0400

The headquarters of the Democratic National Committee is seen in WashingtonBy Dustin Volz and Emily Stephenson WASHINGTON (Reuters) - A committee that raises money for Democratic candidates for the U.S. House of Representatives confirmed on Friday it had been hacked in an intrusion possibly linked to Russian hackers, similar to an earlier breach targeting another Democratic Party group. In an incident that escalated concerns about the potential for Russian meddling in U.S. politics, Reuters first reported on Thursday that the U.S. Federal Bureau of Investigation is probing the hack at the Democratic Congressional Campaign Committee, or DCCC. "We are cooperating with federal law enforcement with respect to their ongoing investigation." The DCCC hack may be related to an earlier hack against the Democratic National Committee, which raises money and sets strategy for Democratic candidates nationwide.


Hackers hit Vietnam airports with South China Sea messages

- Fri, 29 Jul 2016 11:54:37 -0400

Still image from United States Navy video purportedly shows Chinese dredging vessels in the waters around Mischief Reef in the disputed Spratly IslandsHackers attacked the website of a national airline and flight information screens at Vietnam's two biggest airports on Friday, posting notices that state media said criticized the Philippines and Vietnam and their claims in the South China Sea. The website of Vietnam Airlines was also compromised, directing browsers to what the flag carrier described as "bad websites overseas". State-run media said the messages were about the South China Sea and denounced Vietnam and the Philippines, which are at odds with Beijing over maritime sovereignty.


Exclusive: New York Fed asks Philippines to recover Bangladesh money

- Fri, 29 Jul 2016 10:30:19 -0400

Security guard stands beside a logo of the Bangko Sentral ng Pilipinas (Central Bank of the Philippines) posted at the main gate in ManilaBy Krishna N. Das and Serajul Quadir DHAKA (Reuters) - The Federal Reserve Bank of New York has asked the Philippines' central bank to help Bangladesh Bank recover the $81 million that was stolen by hackers in February from its account held at the Fed, boosting Dhaka's efforts to retrieve the money. In a letter sent on June 23, the New York Fed's General Counsel Thomas Baxter asked Elmore O. Capule, general counsel for the central bank of the Philippines, "to take all appropriate steps in support of Bangladesh Bank's efforts to recover and return its stolen assets." In the letter, which has been seen by Reuters, Baxter also wrote that the payment instructions that led to four money transfers to beneficiary accounts at the Manila-based Rizal Commercial Banking Corp (RCBC) were authenticated using a "commercially reasonable security procedure", but that they were issued by persons using stolen credentials.


Exclusive: FBI probes hacking of Democratic congressional group - sources

- Fri, 29 Jul 2016 05:49:37 -0400

Congressional candidates that are running for office watch a video while standing onstage at the Democratic National Convention in Philadelphia, PennsylvaniaBy Joseph Menn, Dustin Volz and Mark Hosenball SAN FRANCISCO/WASHINGTON (Reuters) - The FBI is investigating a cyber attack against another U.S. Democratic Party group, which may be related to an earlier hack against the Democratic National Committee, four people familiar with the matter told Reuters. The previously unreported incident at the Democratic Congressional Campaign Committee, or DCCC, and its potential ties to Russian hackers are likely to heighten accusations, so far unproven, that Moscow is trying to meddle in the U.S. presidential election campaign to help Republican nominee Donald Trump. The Kremlin denied involvement in the DCCC cyber-attack.


Clues in DNC hacking point to Russia, despite Trump claims

- Fri, 29 Jul 2016 03:09:43 -0400

Republican presidential candidate Donald Trump arrives for a campaign rally, Wednesday, July 27, 2016, in Toledo, Ohio. (AP Photo/Evan Vucci)WASHINGTON (AP) ? Republican presidential nominee Donald Trump said is reasserting that whoever hacked the Democratic National Committee and stole years of internal emails remains a mystery. But private security experts ? although not yet any U.S. government agencies ? say they found persuasive clues that point to hacking groups whose previous targets track closely with the strategic interests of Russia's government, especially its civilian and military intelligence and security agencies.


Vasco posts 2Q profit

- Thu, 28 Jul 2016 18:30:59 -0400

On a per-share basis, the Oakbrook Terrace, Illinois-based company said it had net income of 7 cents. Earnings, adjusted for one-time gains and costs, were 15 cents per share. The Internet security company ...

Russia to U.S., Trump: Sort out your own pre-election hacking scandal

- Thu, 28 Jul 2016 16:08:45 -0400

A lock icon, signifying an encrypted Internet connection, is seen on an Internet Explorer browser in ParisBy Andrew Osborn and Maria Tsvetkova MOSCOW (Reuters) - Russia told the United States on Thursday to get to the bottom of a hacking scandal involving Democratic Party emails itself and rejected what Donald Trump said was a sarcastic suggestion that Moscow should dig up Hillary Clinton's "missing" emails. Trump, the Republican Party's presidential candidate, angered Democrats on Wednesday by inviting Russia to unearth tens of thousands of emails from rival Clinton's tenure as U.S. secretary of state.


The Latest: TV reporter: Ansbach bomber was 'not aggressive'

- Thu, 28 Jul 2016 12:28:47 -0400

GERMANY OUT - Bavarian governor Horst Seehofer, left, and Bavaria's Interior Minister, Joachim Herrmann arrive for a meeting of the Bavarian cabinet ,in Gmund, Germany, Tuesday, July 26, 2016. In the most recent attack, a 27-year-old Syrian asylum-seeker set off a backpack laden with explosives and shrapnel Sunday night after being refused entry to a crowded music festival in the Bavarian city of Ansbach, killing himself and wounding 15 people. ( Peter Kneffel/dpa via AP)BERLIN (AP) ? The Latest on a series of attacks in Germany (all times local):


Trump: Comments about Russia, Clinton emails were sarcastic

- Thu, 28 Jul 2016 10:09:43 -0400

Republican presidential candidate Donald Trump speaks during a news conference at Trump National Doral, Wednesday, July 27, 2016, in Doral, Fla. (AP Photo/Evan Vucci)WASHINGTON (AP) ? Donald Trump says he was using sarcasm when he prodded Russia to unearth Hillary Clinton's missing emails. But Democrats aren't likely to let the Republican presidential nominee's extraordinary comments simply fade away.


Merkel: Germany 'will manage' challenge after attacks

- Thu, 28 Jul 2016 09:55:07 -0400

Merkel: Germany 'will manage' challenge after attacksBERLIN (AP) ? Chancellor Angela Merkel pledged Thursday to do "everything humanly possible" to keep Germany safe following a string of attacks ? including two carried out by asylum-seekers and claimed by the Islamic State group that she said mocked the country that took in the assailants.


U.S. theory on Democratic Party breach: Hackers meant to leave Russia's mark

- Thu, 28 Jul 2016 08:37:24 -0400

A lock icon, signifying an encrypted Internet connection, is seen on an Internet Explorer browser in ParisBy John Walcott, Joseph Menn and Mark Hosenball WASHINGTON (Reuters) - Some U.S. intelligence officials suspect that Russian hackers who broke into Democratic Party computers may have deliberately left digital fingerprints to show Moscow is a "cyberpower" that Washington should respect. Three officials, all speaking on condition of anonymity, said the breaches of the Democratic National Committee (DNC) were less sophisticated than other cyber intrusions that have been traced to Russian intelligence agencies or criminals.


Trump to Russia: Uncover, release deleted Clinton emails

- Wed, 27 Jul 2016 23:22:42 -0400

Republican presidential candidate Donald Trump speaks during a news conference at Trump National Doral, Wednesday, July 27, 2016, in Doral, Fla. (AP Photo/Evan Vucci)WASHINGTON (AP) ? Donald Trump encouraged Russia on Wednesday to find and make public missing emails deleted by his presidential opponent, Hillary Clinton, setting off an instant debate over hacking and his urging of a foreign government to meddle in American politics.


Motorola doesn?t really care about making your Android phone secure

- Wed, 27 Jul 2016 15:48:34 -0400

We've all heard it before: the best thing you can do to keep your computer safe from hackers is to update regularly. Software companies push updates to fix known flaws in their operating systems, and hackers routinely search for old software versions so that they can take advantage of known security flaws that no one's bothered to patch yet. So it's a little unnerving to hear that Motorola, maker of some of the world's best Android phones, doesn't really think that making Android security updates available in a timely manner is particularly important. DON'T MISS:† 6 of the best Gmail tricks you never knew existed To be absolutely clear, Android as a platform has a problem with updates and security updates. Unlike iOS devices, which get the update as soon as Apple has tested it, there's a few more steps to the Android update process. Google has to issue an update, which manufacturers then have to tweak, cell carriers have to mess with a little, and then the update finally gets pushed to customers. It's a painstaking process that takes months of time, and serious money for the hardware manufacturers that they'll never see back. But timely updates are also the cornerstone of good mobile security. With major flaws like Stagefright being revealed every year -- flaws that can only be fixed with a security patch -- updates that get pushed in days or weeks, not months, are important. This is where Motorola comes in. As first spotted by† Ars Technica , the company has decided not to commit to monthly Android security updates, even for its newest devices. When asked to comment on this story, Motorola didn't address specific questions about security concerns, and stuck to the line that monthly updates are "difficult": Motorola understands that keeping phones up to date with security patches is important to our customers. We strive to push security patches as quickly as possible. However, because of the amount of testing and approvals that are necessary to deploy them, it's difficult to do this on a monthly basis for all our devices. It is often most efficient to bundle security updates in a scheduled Maintenance Release (MR) or OS upgrade. As we previously stated, Moto Z Droid Edition will receive Android Security Bulletins. Moto G4 will also receive them. Everything in the statement is technically true: issuing fewer updates is certainly "most efficient" for Motorola, and cranking out monthly updates for a number of devices is difficult. But the statement is symptomatic of a pretty cavalier attitude from many Android manufacturers towards security. With profits difficult to find in the high-end smartphone business (if you're not called Apple, that is), spending money issuing free security updates is a difficult ask. Google is aware of the reputation Android has for poor security (compared to iOS), which is why it created the Android Security Bulletin program to issue monthly security updates. But if manufacturers refuse to commit to the†program -- and Moto seems to be leading the charge here -- it's not going to do much to fix Android's " toxic hellstew " of vulnerabilities.

Senior U.S. lawmakers want information on DNC hack declassified

- Wed, 27 Jul 2016 14:29:53 -0400

The headquarters of the Democratic National Committee is seen in WashingtonThe top Democrats on the U.S. Senate and House of Representatives intelligence committees called on Wednesday for the White House to consider declassifying and releasing any intelligence community assessments of the hack into the Democratic National Committee email system. "Given the grave nature of this breach and the fact that it may ultimately be found to be a state-sponsored attempt to manipulate our presidential election, we believe a heightened measure of transparency is warranted," Senator Dianne Feinstein and Representative Adam Schiff wrote in a letter to President Barack Obama. Obama said in an interview broadcast by NBC News on Tuesday that the Federal Bureau of Investigation was investigating the leak of more than 19,000 DNC emails, which showed the committee had favored Hillary Clinton over Bernie Sanders for the party's presidential nomination.


The Latest: Clinton adviser says Trump encouraging hackers

- Wed, 27 Jul 2016 13:21:41 -0400

Republican presidential candidate Donald Trump and his running mate, Republican Vice Presidential candidate, Indiana Gov. Mike Pence, arrive for the Veterans of Foreign Wars convention, Tuesday, July 26, 2016, in Charlotte, N.C. (AP Photo/Evan Vucci)WASHINGTON (AP) ? The Latest on the hacking of the Democratic National Committee (all times local):


Trump's Plea for Russia to Hack the U.S. Government

- Wed, 27 Jul 2016 12:22:51 -0400

The Republican nominee publicly asked a foreign government to leak emails from a cabinet secretary, dismissed the Geneva Conventions, and seemed confused about where Tim Kaine came from.

After mass shooting, German police focus on "dark net" crime

- Wed, 27 Jul 2016 09:44:27 -0400

An investigator of the Cybercrime Intelligence Unit of Germany's Bundeskriminalamt (BKA) Federal Crime Office is pictured during a media day in WiesbadenBy Frank Siebelt WIESBADEN, Germany (Reuters) - German police will do more to fight crime committed on the "dark net", they said on Wednesday, days after a gunman killed nine people with a weapon bought on that hidden part of the internet. "We see that the dark net is a growing trading place and therefore we need to prioritize our investigations here," Holger Muench, head of Germany's Federal Police (BKA), told journalists as he presented the latest annual report on cyber crime. The dark net, which is only accessible via special web browsers, is increasingly used to procure drugs, weapons and counterfeit money, allowing users to trade anonymously and pay with digital currencies such as Bitcoin, the BKA said.


Kremlin says allegations it hacked U.S. Democratic Party 'made-up horror stories'

- Wed, 27 Jul 2016 06:22:28 -0400

Delegates cheer at the annoucement that Hillary Clinton is named the Democratic Party nominee for president at the Democratic National Convention in PhiladelphiaThe Kremlin on Wednesday dismissed allegations Russia had hacked Democratic Party emails as "horror stories" dreamt up by U.S. politicians, saying it never interfered in other countries' election campaigns. "Moscow is at pains to avoid any words that could be interpreted as direct or indirect interference in the election process," Kremlin spokesman Dmitry Peskov told a conference call with reporters. "... We see that the Russian card is in the red corner on the writing table of all Washington politicians during the election campaign, and that very often they make it a trump card in their game." Peskov was responding after U.S. President Barack Obama in an interview with NBC News said it was possible Russia would try to influence the U.S. presidential election after a leak of Democratic National Committee emails that experts have blamed on Russian hackers.


Apple sells more iPhones than expected, shares jump after hours

- Tue, 26 Jul 2016 22:36:11 -0400

A woman uses a phone outside an Apple store in BeijingApple Inc sold more iPhones than Wall Street expected in the third quarter and estimated its revenue in the current period would top many analysts' targets, soothing fears that demand for the company's most important product had hit a wall. IPhone sales dropped for the second straight quarter, pushing down Apple's total revenue 14.6 percent in the fiscal third quarter, ended June 25. Demand for Apple's phones has waned in China, partly because of economic uncertainty there, and has also slowed in more mature markets as people tend to hold on to their phones for longer.


'Anything's possible' _ Obama points to Russia on DNC hack

- Tue, 26 Jul 2016 21:34:10 -0400

'Anything's possible' _ Obama points to Russia on DNC hackWASHINGTON (AP) ? Russia may have been behind the leak of hacked Democratic National Committee documents, President Barack Obama said Tuesday in his first public comments on the breach.


Obama says it is possible Russia would try to sway U.S. election

- Tue, 26 Jul 2016 19:51:28 -0400

U.S. President Barack Obama delivers remarks at the Advancing 21st. Century Policing Briefing event at the Executive Office Building in WashingtonU.S. President Barack Obama said it was possible that Russia would try to influence the U.S. presidential election, after a leak of Democratic National Committee emails that experts have attributed to Russian hackers. "Anything is possible," Obama told NBC News in an interview broadcast on Tuesday when asked if the Russians would try to influence the Nov. 8 election. Obama said the Federal Bureau of Investigation was investigating the leak on Friday of more than 19,000 DNC emails, which showed the committee had favored Hillary Clinton over Senator Bernie Sanders for the party's presidential nomination.


The FBI will be on the front line of any future hacking wars

- Tue, 26 Jul 2016 18:00:48 -0400

In an announcement today, President Obama unveiled his new policy for handling "cyber incidents." It's different from Future President Trump's opinions on "the cybers," mostly because there's some actual plans in there. Most notably, the confusing turf war over which agency gets to do what has been sorted out. Moving forwards, the FBI will be the lead agency responding to any "cyber incidents." DON'T MISS:† Speeding didn?t cause the fatal Tesla Autopilot crash The move is a slight change from the status quo. The FBI has long dealt with "cyber incidents" concerning hackers or attacks against lone companies, but the intelligence agencies have been the behind-the-scenes leads on attacks from other governments. The new policy changes all that. The FBI is now responsible for "threat response activities," while the Department for Homeland Security is responsible for "asset response activities" -- attacks against the power grid or similar. The intelligence community is moved to a backup role, providing "intelligence support and related activities." This doesn't mean that the NSA has nothing to do with cyber warfare any more -- it just means that the FBI is ultimately responsible for investigating any attacks and coordinating a response. The new federal policy has been much-needed for a long time. The likely Russian-conducted hack on the DNC that's causing turmoil around the Democratic convention proves how real the threat of hacking is. There's plenty of government talent capable of helping prevent those attacks in the future; coordinating the response is the real trick. Obama's new policy goes a long way towards helping.

How to jailbreak iOS 9.3.3 on your iPhone or iPad without ever connecting to a PC

- Tue, 26 Jul 2016 14:30:22 -0400

Chinese iPhone hackers just released a new jailbreak tool for the latest versions of iOS and not one day later, we already have a better option. On Monday we told you about the newly updated Pangu jailbreak tool , which offered anyone with a Windows PC a means to jailbreak an iPhone or iPad running any version of iOS from iOS 9.2 through to the just-released iOS 9.3.3. There are some big caveats beyond the need for a Windows PC though, namely that this was a "semi-untethered" jailbreak that require a few extra steps each time a phone is rebooted. Now, just one day later, there's a new and improved jailbreak that could be the simplest way to jailbreak and iPhone that we've seen in years. MUST WATCH:† iPhone 7 and iPhone 7 Pro look hotter than ever in new leaked video In a video created by YouTube's resident jailbreak tutorial maker†iCrackUriDevice, we get a full walkthrough of how to use†JailbreakMe9.com, a new tool that lets iPhone and iPad users jailbreak their phones using a mobile website accessible through Safari. It really doesn't get any easier than this. There are still a few caveats you'll want to make note of ? this jailbreak is still semi-untethered for the time being ? but it's very straightforward. The full video is embedded below, and then you'll find a timeline so you can skip around to the parts you need. https://www.youtube.com/watch?v=D4c3c4JTZeg 0:05 - Jailbreak iOS 9.3.3 - NO Computer 0:32 - Dev Enterprise ?Warning? 1:33 - Supported Devices 2:09 - Supported Firmwares 2:33 - Credits 2:49 - Visit JailbreakMe9.com 3:45 - Trust The Certificate 4:07 - IMPORTANT Jailbreak STEPS! 5:51 - Opening Cydia! 6:42 - Incompatible Tweaks Warning! 6:58 - Rebooting and Semi Untethered 7:26 - MUST WATCH AFTER Jailbreak! 7:52 - How to Reboot w/ Semi Untether 9:42 - Summary: Follow for Updates

Bangladesh says Philippines probe of cyber theft nearly complete

- Tue, 26 Jul 2016 08:15:07 -0400

The Bangladesh central bank said on Tuesday its Philippine counterpart had nearly completed an investigation into how $81 million of its money wound up in a Manila bank, and that it hoped for the swift return of the stolen funds. Governor Fazle Kabir told reporters he hoped the Philippine authorities would fix responsibility on the Manila-based Rizal Commercial Banking Corp for disbursing the stolen funds that landed in accounts there. Hackers broke into Bangladesh Bank's computer systems in February and transferred $81 million from its deposit at the Federal Reserve Bank of New York into four RCBC accounts in a Manila branch.

Huawei's global smartphone shipments jump 25 percent in first half

- Tue, 26 Jul 2016 03:27:57 -0400

Journalists attend the presentation of the Huawei's new smartphone in ParisBy Yimou Lee HONG KONG (Reuters) - China's Huawei Technologies Co Ltd [HWT.UL], the world's third-largest smartphone vendor, said first-half global smartphone shipments jumped 25 percent, helped by rapid growth in traditionally high-end markets such as Europe. Shenzhen-based Huawei, which competes with Samsung Electronics Co Ltd and Apple Inc , shipped 60.5 million smartphones globally in the first half. Huawei aims to surpass market leaders Samsung and Apple within five years to become the world's top smartphone vendor.


Trump says he would consider alliance with Russia over Islamic State

- Mon, 25 Jul 2016 22:28:18 -0400

Republican presidential candidate Donald Trump and vice presidential candidate Mike Pence pray at a campaign event in RoanokeBy Steve Holland WINSTON-SALEM, N.C. (Reuters) - Republican nominee Donald Trump said on Monday that if elected U.S. president he would weigh an alliance with Russia against Islamic State militants but rejected any suggestion Russian President Vladimir Putin might be trying to help him win. Speaking at a rally in Winston-Salem, North Carolina, Trump dismissed any suggestion that Putin's intelligence services might have had a hand in hacking the Democratic National Committee's email system. Emails leaked last week disclosed that some party officials had been in favor of former Secretary of State Hillary Clinton winning the Democratic presidential nomination over U.S. Senator Bernie Sanders and sought ways to thwart Sanders.


Democratic emails: All about the hack, the leak, the discord

- Mon, 25 Jul 2016 19:52:25 -0400

Demonstrators make their way around downtown, Monday, July 25, 2016, in Philadelphia, during the first day of the Democratic National Convention. On Sunday, Debbie Wasserman Schultz, D-Fla., announced she would step down as DNC chairwoman at the end of the party's convention, after some of the 19,000 emails, presumably stolen from the DNC by hackers, were posted to the website Wikileaks. (AP Photo/John Minchillo)PHILADELPHIA (AP) ? First came the hack, then the leak. Now, the Clinton and Trump campaigns are fighting over Russia's role in the release of thousands of internal Democratic National Committee emails.


Quoted

- Mon, 25 Jul 2016 19:00:00 -0400

?I think pro-wrestling is like ballet with violence,? ?Jesse Ventura, a former pro wrestler. ?Withdrawal [is] certainly not as bad as a serious illness. It?s more like giving up the love of your life,? ?Maia Szalavitz, an addictions expert and former drug addict.

Democratic Party email leak points to Russia: cyber experts, U.S. officials

- Mon, 25 Jul 2016 16:34:43 -0400

The headquarters of the Democratic National Committee is seen in WashingtonCyber security experts and U.S. officials said on Monday there was evidence that Russia engineered the release of sensitive Democratic Party emails in order to influence the U.S. presidential election. The FBI said it was investigating a cyber intrusion at the Democratic National Committee (DNC), which has led to discord as the party's convention in Philadelphia opens on Monday to nominate former U.S. secretary of state Hillary Clinton as its candidate.


FBI investigates DNC hacking; Clinton campaign blames Russia

- Mon, 25 Jul 2016 15:11:14 -0400

Republican presidential candidate Donald Trump, speaks at a reception with friends and family following the Republican National Convention, Friday, July 22, 2016, in Cleveland. Listening are vice presidential running mate Gov. Mike Pence, R-Ind., Karen Pence, and Charlotte Pence. (AP Photo/Evan Vucci)WASHINGTON (AP) ? The FBI said Monday it is investigating how thousands of Democratic National Committee emails were hacked, a breach that Hillary Clinton's campaign maintains was committed by Russia to benefit Donald Trump.


White House will not comment on Democratic email hack probe

- Mon, 25 Jul 2016 13:39:10 -0400

The White House will not speculate on who might be behind the hacking of the Democratic National Committee, a spokesman said on Monday amid concerns hackers working for Russia may be attempting to influence the U.S. presidential election. "We know that there are a variety of actors, both state and criminal, who are looking for vulnerabilities in the cyber security of the United States and that includes Russia," said White House spokesman Josh Earnest.

Ericsson ousts CEO as investors lose patience over returns

- Mon, 25 Jul 2016 13:37:16 -0400

Ericsson's President & CEO Hans Vestberg attends a news conference during the Mobile World Congress in BarcelonaBy Sven Nordenstam STOCKHOLM (Reuters) - Swedish mobile telecoms gear maker Ericsson jettisoned its chief executive Hans Vestberg on Monday after pressure from major shareholders unhappy with its results. Investment companies Investor AB and Industrivarden, with a combined 37 percent of voting rights, had voiced dissatisfaction with Ericsson's performance, culminating in unprecedented public criticism in February. Ericsson, which is battling Finland's Nokia and China's Huawei, has responded to weak industry demand by slashing jobs and accelerating cost cuts.


'Shame!' Dems' division roils party on Day 1 of convention

- Mon, 25 Jul 2016 12:38:03 -0400

Protesters yell as DNC Chairwoman, Debbie Wasserman Schultz, D-Fla., arrives for a Florida delegation breakfast, Monday, July 25, 2016, in Philadelphia, during the first day of the Democratic National Convention. (AP Photo/Matt Slocum)PHILADELPHIA (AP) ? Angry Democrats heckled outgoing party chief Debbie Wasserman Schultz with boos and cries of "shame!" on Monday as the party tried to recover from an embarrassing email hack that ripped open primary wounds just hours before they planned to mount a four-day showcase of unity.


The Muscovite Candidate?

- Mon, 25 Jul 2016 12:24:18 -0400

Sometimes a conspiracy theory can be true. Or, to put it another way, just because you?re paranoid doesn?t mean they aren?t out to get you.