IANS Blog RSS Feed

http://www.iansresearch.com

Surveillance Software Maker ?Hacking Team? Victimized in Data Breach

- Mon, 06 Jul 2015 00:00:00 GMT

What happens when the hackers get hacked? We?re quickly finding out, as an Italian company that sells surveillance software to government agencies recently fell victim to what appears to be a significant data breach.

Cisco to Purchase OpenDNS in $635 Million Deal

- Tue, 30 Jun 2015 00:00:00 GMT

Cisco?s efforts to add a cloud security layer took a major step forward this week, as the technology giant has announced it plans to acquire San Francisco-based cloud security firm OpenDNS.

Millions of Samsung Galaxy Phones Vulnerable to Keyboard Software Flaw

- Wed, 17 Jun 2015 00:00:00 GMT

A security flaw in the pre-installed keyboard software on Samsung Galaxy mobile devices could potentially give hackers system user level privileges, enabling them to install malicious apps and even eavesdrop on phone calls.

LastPass Breach Exposes User Emails, Password Reminders

- Tue, 16 Jun 2015 00:00:00 GMT

It?s commonly stated that no matter how diligent one is when it comes to information security, it?s impossible to ever be 100 percent protected, and a recently disclosed breach of a password manager provided a stark reminder of this reality.

Federal Union: OPM Breach Far More Extensive Than Initially Disclosed

- Fri, 12 Jun 2015 00:00:00 GMT

The union representing government employees claims the hackers who breached the Office of Personnel Management (OPM) gained access to far more data than the office has disclosed.

Kaspersky: Nation-State Attack Targeted Hotels Hosting Iran Nuclear Negotiations

- Thu, 11 Jun 2015 00:00:00 GMT

Cybersecurity firm Kaspersky says it has uncovered a cyberattack likely perpetrated by a nation state that targeted hotels where negotiations over the Iran nuclear deal were being held.

IANS Los Angeles Mobile Security Symposium Recap

- Wed, 10 Jun 2015 00:00:00 GMT

During the IANS LA Mobile Security Symposium, IANS Faculty Aaron Turner facilitated a discussion on real-world vulnerabilities that can impact how enterprises rely on mobile technologies.

Chinese Hackers Suspected in Massive U.S. Government Data Breach

- Fri, 05 Jun 2015 00:00:00 GMT

The U.S. government has been targeted once again in a data breach, with officials this time suspecting a Chinese hacking group accessed the personal records of up to four million current and former federal employees.

Report: FBI Uses Spy Planes for Video, Cellphone Surveillance in U.S.

- Tue, 02 Jun 2015 00:00:00 GMT

U.S. government surveillance is no secret at this point, particularly following Edward Snowden?s revelations about the National Security Agency (NSA). A new report, however, shows the extent of this surveillance also includes spy planes hovering over U.S. cities.

Newly Discovered iOS Bug Crashes iPhones Through String of Text

- Mon, 01 Jun 2015 00:00:00 GMT

A strange new flaw affecting iOS devices causes iPhones to crash when users receive a text or message via other applications that contains a specific string of characters.

Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

Trojan.Cryptolock!g13

- Fri, 3 Jul 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Hacktool.Bannerjack

- Fri, 3 Jul 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Hacktool.Multipurpose

- Fri, 3 Jul 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Hacktool.EventLog

- Fri, 3 Jul 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Hacktool.Proxy.A

- Fri, 3 Jul 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Hacktool.Securetunnel

- Sat, 4 Jul 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

OSX.Dropper

- Sat, 4 Jul 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

OSX.Backloader

- Sat, 4 Jul 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Packed.Dromedan!gen15

- Thu, 2 Jul 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Pitou

- Wed, 1 Jul 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

W97M.Downloader.C

- Wed, 1 Jul 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

W97M.Downloader.D

- Wed, 1 Jul 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

W97M.Downloader.E

- Wed, 1 Jul 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Infostealer.Bancos.BE

- Wed, 1 Jul 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-3113

- Tue, 30 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Boot.Pitou

- Tue, 30 Jun 2015 00:00:00 -0700

Risk Level: Very Low.

Trojan.Rerdom

- Tue, 30 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Rerdom!gm

- Tue, 30 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Shunnael

- Thu, 25 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Shunnael!gen1

- Fri, 26 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Credmines

- Wed, 24 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Layork.B

- Wed, 24 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Sofacy.B

- Wed, 24 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

PUA.MyPCBackup!gen1

- Tue, 23 Jun 2015 00:00:00 -0700

Risk Level: Very Low.

PUA.OptimumInstall!g1

- Tue, 23 Jun 2015 00:00:00 -0700

Risk Level: Very Low.

PUA.OptimumInstall!g2

- Tue, 23 Jun 2015 00:00:00 -0700

Risk Level: Very Low.

PUA.OptimizerPro!gen1

- Tue, 23 Jun 2015 00:00:00 -0700

Risk Level: Very Low.

PUA.PCHealthAdvisor!g1

- Tue, 23 Jun 2015 00:00:00 -0700

Risk Level: Very Low.

SONAR.PUA!gen5

- Mon, 22 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.PUA!gen6

- Mon, 22 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen576

- Mon, 22 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Upatre!gen2

- Mon, 22 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Linux.Shelldos.A

- Sun, 21 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Linux.Chikdos.C

- Sat, 20 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Feratuser

- Wed, 17 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Android.Bossefiv

- Mon, 15 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Gatak.B

- Mon, 15 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

SONAR.Heuristic.132

- Mon, 15 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heuristic.133

- Mon, 15 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heuristic.134

- Fri, 12 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Backdoor.Gwapoors!gm

- Mon, 15 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Wecoym

- Mon, 15 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Tiylon.B!gen1

- Thu, 11 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Emdivi!gen6

- Wed, 10 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Hepbot

- Wed, 10 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Dokabot

- Wed, 10 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Emdivi!gen5

- Wed, 10 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

W32.Duqu.B

- Wed, 10 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Packed.Dromedan!gen13

- Mon, 8 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Cycbot!gen11

- Mon, 8 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.ChangeDNS!htm2

- Tue, 9 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

SONAR.SuspLaunch!gen4

- Mon, 8 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Woolerg

- Tue, 9 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

SONAR.Dyre!gen1

- Mon, 8 Jun 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

Italian surveillance company hacked, documents stolen

- Mon, 06 Jul 2015 14:45:00 -0400

An Italian surveillance firm known for selling malicious software used by police bodies and spy agencies has succumbed to a cyberattack, the firm's spokesman said Monday, confirming an embarrassing breach ...

EU official: Migrant boats also carrying IS fighters

- Mon, 06 Jul 2015 11:12:14 -0400

Migrants wait to be disembarked from the Italian Navy ship Dattilo, at the Reggio Calabria harbor, Southern Italy, Thursday, July 2, 2015. The number of migrants crossing the Mediterranean to southern Europe was more than 80 percent higher in the first half of 2015 than a year earlier, with deaths initially soaring before dropping back as rescue efforts at sea were stepped up, the U.N. refugee agency said Wednesday. (AP Photo/Adriana Sapone)BRUSSELS (AP) ? The European Union's top prosecutor said Monday she has been told that smugglers' boats bringing migrants across the Mediterranean to Europe are also carrying Islamic State group fighters.


Xiaomi books 1H sales fall, putting full-year goal in doubt

- Thu, 02 Jul 2015 06:48:25 -0400

People stand near a logo of Xiaomi ahead of the launching ceremony of Xiaomi Phone 4, in BeijingBy Gerry Shih BEIJING (Reuters) - China's top smartphone maker Xiaomi Inc on Thursday reported semi-annual sales that for the first time were lower than the previous six months, jeopardising its full-year target and hinting at a slowdown in its mainstay domestic market. Xiaomi has enjoyed a rapid rise with handsets it touts as cheaper but well-designed alternatives to Apple Inc's iPhones. Its latest sales result could be a blip as the firm usually ships more handsets in the second half when it markets more new models, but it has made analysts question whether Xiaomi's expansion abroad is fast enough to counter a slowdown at home.


Blacklist warnings spread on websites in North Korea

- Thu, 02 Jul 2015 03:01:49 -0400

FILE - In this, June 20, 2015, photo, a notification saying, "Warning! You can't connect to this website because it's in blacklist site" is seen on both a computer screen and on a smartphone screen in Pyongyang, North Korea. North Korea, already one of the least-wired places in the world, appears to be cracking down on the use of the Internet by even the small number of foreigners who can access it with relative freedom by blacklisting and blocking social media accounts or websites deemed to carry harmful content. (AP Photo/Wong Maye-E, File)TOKYO (AP) ? North Korea, already one of the least-wired places in the world, appears to be cracking down on the use of the Internet by even the small number of foreigners who can access it with relative freedom by blacklisting and blocking social media accounts or websites deemed to carry harmful content.


Donald Trump's hotel collection under possible credit card breach: blog

- Wed, 01 Jul 2015 16:55:01 -0400

The Trump Soho Hotel is seen in New York(Reuters) - Real estate developer Donald Trump's string of luxury hotel properties, The Trump Hotel Collection, could be the latest victim of credit card breach, KrebsonSecurity reported, citing data shared by several U.S.-based banks. Sources at the U.S. banks traced a pattern of fraudulent debit and credit card charges to accounts that had all been used at Trump hotels, the cyber crime and internet security blog said. Donald Trump is seeking the Republican nomination for president.


Top Obama aides knew about Clinton's private email in 2009

- Tue, 30 Jun 2015 23:39:22 -0400

FILE - In this Jan. 23, 2014, then-Secretary of State Hillary Rodham testifies on Capitol Hill in Washington before the Senate Foreign Relations Committee hearing on the deadly September attack on the U.S. diplomatic mission in Benghazi, Libya, that killed Ambassador Chris Stevens and three other Americans. The State Department plans to make about 3,000 pages of Hillary Rodham Clinton's correspondence publically available on Tuesday evening. The release comes as part of a court mandate that the agency release batches of Clinton's email correspondence from her time as secretary of state every 30 days starting June 30. The goal is for the department to publicly unveil 55,000 pages of her emails by Jan. 29, 2016. They were sent from the personal email address that Clinton used when she was secretary. (AP Photo/Pablo Martinez Monsivais)WASHINGTON (AP) ? Senior Obama administration officials knew as early as 2009 that Hillary Rodham Clinton was using a private email address for her government correspondence.


Cisco to buy OpenDNS for $635 million to boost security business

- Tue, 30 Jun 2015 17:03:20 -0400

The Cisco Systems logo is seen as part of a display at the Microsoft Ignite technology conference in ChicagoCisco Systems Inc said on Tuesday it would buy OpenDNS, a privately held cloud-based security firm, for $635 million, the latest move to boost its security business as cyber attacks increase in number and sophistication. Cisco has been buying a number of security companies, which has made its relatively tiny security business one of its fastest growing areas in the past two years. OpenDNS uses predictive intelligence to block malware, botnets and phishing threats that antivirus and firewalls miss.


Cisco to buy security company OpenDNS for $635 million

- Tue, 30 Jun 2015 10:00:45 -0400

Cisco said Tuesday that it plans to buy privately-held OpenDNS for $635 million to boost its network security business. OpenDNS, based in San Francisco, makes online software that protects devices and ...

Union sues US over hack, says agency had ample warning

- Mon, 29 Jun 2015 18:43:50 -0400

WASHINGTON (AP) ? The largest federal employee union filed a class action lawsuit Monday against the federal personnel office, its leaders and one of its contractors, arguing that negligence contributed to what government officials are calling one of the most damaging cyberthefts in U.S. history.

U.S. Office of Personnel Management to suspend IT system after hack

- Mon, 29 Jun 2015 18:37:29 -0400

Archuleta rubs her eyes as she testifies before a House Oversight and Government Reform hearing on the data breach of OPM computers, on Capitol Hill in WashingtonBy Megan Cassella WASHINGTON (Reuters) - The U.S. Office of Personnel Management (OPM) said on Monday it would temporarily suspend a program it uses to complete background investigations, following a data breach that compromised the personal information of millions of Americans. The program, called Electronic Questionnaires for Investigations Processing (e-QIP), was not involved in either of two attacks by suspected Chinese hackers on personnel data and applications for security clearances, OPM said. After a security review ordered by Director Katherine Archuleta found a vulnerability in the system, OPM said it would take e-QIP offline for 4-6 weeks until security can be enhanced.


Union sues feds over hack, says agency had ample warning

- Mon, 29 Jun 2015 18:37:12 -0400

FILE - In this June 25, 2015 file photo, Office of Personnel Management (OPM) Director Katherine Archuleta testifies on Capitol Hill in Washington. The federal personnel agency whose records were plundered by hackers linked to China says it has temporarily shut down a massive database used to update and store background investigation records. The agency says a newly discovered flaw left the system vulnerable to hackers. (AP Photo/Susan Walsh)WASHINGTON (AP) ? The largest federal employee union filed a class action lawsuit Monday against the federal personnel office, its leaders and one of its contractors, arguing that negligence contributed to what government officials are calling one of the most damaging cyberthefts in U.S. history.


Feds shut down background check database over flaw

- Mon, 29 Jun 2015 15:24:42 -0400

Union sues feds over hack, says agency had ample warningThe federal personnel agency whose records were plundered by hackers linked to China announced on Monday the temporary shutdown of a massive database used to update and store background investigation records ...


The iPhone 6 Is Overcoming a Hurdle No One Thought It Could

- Mon, 29 Jun 2015 11:24:05 -0400

It?s no longer news that the iPhone 6 is†a world-beating success, but even after taking over North America†and Europe, Apple?s latest smartphone still has some surprises up its sleeve. READ MORE:†One of the Most Exciting New iPhone 6s Features Was Just Confirmed By Bloomberg On Monday, Bloomberg reported that despite the trend towards more affordable mobile devices in China, the average selling price has jumped significantly in recent months. More specifically, the latest data from research firm IDC shows†that the average price of smartphones in China has increased by $71 over the last two quarters. You might recall that the iPhone 6 and 6 Plus officially launched in China on October 17th. That?s about as direct a correlation as you?re

Out of the shadows, China hackers turn cyber gatekeepers

- Sun, 28 Jun 2015 18:05:15 -0400

File photo illustration shows a map of China seen through a magnifying glass on a computer screen showing binary digits in SingaporeBy Paul Carsten and Gerry Shih BEIJING (Reuters) - China, long accused by the United States of rampant cyber aggression, may be synonymous with hacking exploits these days, but that doesn't mean every Chinese hacker is out to pilfer and destroy. As Chinese companies grapple with a sharp increase in the number of cyber attacks, many hackers are finding it increasingly lucrative to go above board and join the country's nascent cyber security industry. Zhang Tianqi, a 23-year old Beijinger, cut his chops in high school trying to infiltrate foreign websites, skirting domestic law by probing for vulnerabilities on overseas gaming networks.


Lawmakers urge removal of top executives at computer-hacked agency

- Fri, 26 Jun 2015 22:07:31 -0400

Archuleta testifies before a hearing of the Senate Appropriations Committee concerning a recently revealed data breach affecting millions of federal employees' personal data, on Capitol Hill in WashingtonBy Megan Cassella WASHINGTON (Reuters) - Eighteen Republican lawmakers sent a letter to President Barack Obama on Friday requesting the removal of two Office of Personnel Management (OPM) executives after a data breach that compromised the personal information of millions of Americans. "We have lost confidence in Director Archuleta's ability to secure OPM's networks and protect the data of millions of Americans," the letter read.


Lawmakers urge removal of top execs at computer-hacked agency

- Fri, 26 Jun 2015 18:41:23 -0400

Archuleta testifies before a hearing of the Senate Appropriations Committee concerning a recently revealed data breach affecting millions of federal employees' personal data, on Capitol Hill in WashingtonBy Megan Cassella WASHINGTON (Reuters) - Eighteen Republican lawmakers sent a letter to President Barack Obama on Friday requesting the removal of two Office of Personnel Management (OPM) executives after a data breach that compromised the personal information of millions of Americans. "We have lost confidence in Director Archuleta's ability to secure OPM's networks and protect the data of millions of Americans," the letter read.


Foreign suspect indicted in UPMC identity theft tax case

- Fri, 26 Jun 2015 13:13:05 -0400

A federal grand jury has indicted a foreign citizen in a conspiracy to file more than 900 phony federal tax returns seeking $2.2 million in refunds by using employee information stolen from the University ...

Healthcare, Entertainment & War: Picking the Right Digital Stocks

- Fri, 26 Jun 2015 07:57:00 -0400

Where should you put your money? Let?s stipulate that digital technology will continue to generate change and wealth.† If that?s true ? and it is ? then where should we move our chips? There are already ...

U.S. intelligence chief: China top suspect in government agency hacks

- Fri, 26 Jun 2015 05:17:48 -0400

A map of China is seen through a magnifying glass on a computer screen showing binary digits in SingaporeU.S. intelligence chief James Clapper said on Thursday that China was the top suspect in the massive hacking of a U.S. government agency that compromised the personnel records of millions of Americans. The comments from Clapper, the director of National Intelligence (DNI), were first reported in The Wall Street Journal and marked the first time the Obama administration has publicly accused Beijing of the hacking attacks on the Office of Personnel Management. "You have to kind of salute the Chinese for what they did," given the difficulty of the intrusion, the Journal quoted Clapper as saying at a Washington intelligence conference.


Key senator blasts Personnel Management Office chief over hack

- Thu, 25 Jun 2015 17:34:14 -0400

Archuleta rubs her eyes as she testifies before a House Oversight and Government Reform hearing on the data breach of OPM computers, on Capitol Hill in WashingtonBy Megan Cassella WASHINGTON (Reuters) - The chairman of the Senate Homeland Security Committee said on Thursday the director of the Office of Personnel Management should not be allowed to stay in place to deal with the aftermath of a data breach by suspected Chinese hackers. "I wouldn't rely on her to clean up this mess," Republican Senator Ron Johnson said of Katherine Archuleta after a committee hearing in which her answers failed to satisfy lawmakers. "I don't think she's qualified to do so." In the meeting, committee members pushed Archuleta for details on the widespread security breach, including how many Americans might have been affected and where the attacks originated.


Passwords From 47 Government Agencies Leaked Online

- Thu, 25 Jun 2015 16:45:08 -0400

Stolen email and passwords belonging to individuals from nearly 50 Government agencies have leaked†online, according to a CIA backed startup out of Boston. According to a report from Recorded Future, login credentials from 47 agencies were found to have been leaked on upwards of 89 unique domains. Compounding matters is that 12 of the affected agencies,†including the Department of Energy, do not implement two-factor authentication. As a result, the report notes that ?the presence of these credentials on the open Web leaves these agencies vulnerable to espionage, socially engineered attacks, and tailored spear-phishing attacks against their workforce.? DON?T MISS:†T-Mobile?s New Uncarrier Move Kills Lump Payments, Offers iPhone 6 for $15/Month CBS has since revealed that the 12 agencies who haven?t

Why Cyber War Is Dangerous for Democracies

- Thu, 25 Jun 2015 08:24:38 -0400

Why Cyber War Is Dangerous for DemocraciesThis month, two years after his massive leak of NSA documents detailing U.S. surveillance programs, Edward Snowden published an op-ed in The New York Times celebrating his accomplishments. The ?power of an informed public,? he wrote, had forced the U.S. government to scrap its bulk collection of phone records.


U.S., China stress positives, but fail to narrow differences

- Wed, 24 Jun 2015 22:04:17 -0400

U.S. Secretary of State John Kerry toasts with Chinese Vice Premiers Liu Yandong at a joint banquet at the Strategic and Economic Dialogue (S&ED) at the State Department in WashingtonBy David Brunnstrom WASHINGTON (Reuters) - The United States and China sought on Wednesday to stress the positives in their relationship after three days of high-level talks, but failed to narrow differences on the most contentious issues of cyber and maritime security. U.S. Treasury Secretary Jack Lew said both sides had committed to work more towards a Bilateral Investment Treaty already seven years in the making and said China had pledged to limit intervention in currency markets.


Australian metal detector company counts cost of Chinese hacking

- Wed, 24 Jun 2015 21:26:41 -0400

File photo illustration shows a map of China seen through a magnifying glass on a computer screen showing binary digits in SingaporeWith the Australian government wary of rocking the boat ahead of this month's historic signing of a free trade deal, McGurk says he was forced to hire a private investigative firm in China to stage a series of raids on counterfeit factories. "They said you're on your own," McGurk told Reuters, referring to the Australian government officials he lobbied to help with his problem.


OPM chief rebuffs lawmakers on scope of cyber breach

- Wed, 24 Jun 2015 17:03:13 -0400

Archuleta testifies before a hearing of the Senate Appropriations Committee concerning a recently revealed data breach affecting millions of federal employees' personal data, on Capitol Hill in WashingtonBy Doina Chiacu WASHINGTON (Reuters) - The director of the Office of Personnel Management refused on Wednesday to estimate how many millions of Americans were affected by recent attacks on her agency's computers and rejected as premature reports 18 million were compromised. Under blistering attack from lawmakers exasperated by unanswered questions about the massive cybersecurity breach, OPM Director Katherine Archuleta conceded the number of people whose data was hacked could increase from initial reports. OPM said this month it was victim of a cyber attack involving personnel data on 4.2 million current and former federal employees.


Finger-pointing starting in blame for government hack

- Wed, 24 Jun 2015 16:08:18 -0400

Katherine Archuleta, director, Office of Personnel Management, gestures while she testifies before the Senate Appropriations subcommittee on Financial Services and General Government hearings to review IT spending and date security at the Office of Personnel Management in Washington, Tuesday, June 23, 2015. (AP Photo/Cliff Owen)WASHINGTON (AP) ? Finger-pointing burst into the open on Capitol Hill Wednesday over blame for hacking into the U.S. government's personnel records, which the chairman of a House oversight committee said might affect as many as 32 million current and former employees and others.


U.S., China appear to get little done in removing economic barriers

- Wed, 24 Jun 2015 16:01:40 -0400

U.S. Secretary of State John Kerry toasts with Chinese Vice Premiers Liu Yandong at a joint banquet at the Strategic and Economic Dialogue (S&ED) at the State Department in WashingtonBy David Brunnstrom WASHINGTON (Reuters) - The United States and China urged each other on Wednesday to remove barriers to foreign investment, saying that business ties were vital to overall relations, although they appeared to achieve little beyond rhetoric at a high profile three-day meeting that was overshadowed by security rivalries. Speaking to leading U.S. and Chinese CEOs on the final day of talks in Washington, Chinese Vice Premier Wang Yang said that while investment cooperation had made significant progress, "there are still problems and obstacles and this requires new ways of thinking, cooperation and policy environment." While the world's two largest economies have $590 billion in two-way trade, efforts to secure a bilateral investment treaty have been stalled for seven years.


Carter: NATO must bolster cyberdefense

- Wed, 24 Jun 2015 15:37:33 -0400

US Secretary of Defense Ashton Carter arrives at EU headquarters in Brussels on Wednesday, June 24, 2015. Alliance defense ministers gathered in Brussels for a meeting that is expected to increase the size of NATO's Response Force and streamline procedure for deployment of its new, ultrafast "spearhead" unit of 5,000 ground troops. (AP Photo/Thierry Monasse)BRUSSELS (AP) ? NATO must improve its ability to defend itself against cyberattacks before it tries to build its offensive cyberwarfare capabilities, Defense Secretary Ash Carter told alliance leaders Wednesday amid rising tensions with Russia, which has proven its willingness to launch computer-based attacks against other nations.


Mr. Robot : A Dark, Compelling Drama for the Paranoid Internet Age

- Wed, 24 Jun 2015 14:41:00 -0400

Mr. Robot : A Dark, Compelling Drama for the Paranoid Internet AgeAs played by Rami Malek, he?s pale and nervy-looking, and would be easy to miss in a crowd if it weren?t for his hollow stare. Elliot suffers from crippling social anxiety and mostly interacts with people by stalking them online, but he?s a well-meaning hacker, who despises his day job at a banking conglomerate and works at night to try to overthrow it. This, it seems, is the closest thing the 21st century gets for a hero: Despite airing on a typically stodgy network and being saddled with a ridiculous title, Mr. Robot is an angry, surprisingly effective screed against the current inequities of the world.


Accused Turkish mastermind of $55 million cyber spree extradited to U.S.

- Wed, 24 Jun 2015 14:30:13 -0400

By Nate Raymond NEW YORK (Reuters) - A Turkish man has been extradited to the United States to face charges he organized three cyberattacks that resulted in $55 million in losses to the global financial system, U.S. authorities announced on Wednesday. Prosecutors called Ercan Findikoglu, 33, the mastermind behind an organization whose hacks resulted in stolen debit card data being distributed worldwide and used to make fraudulent ATM withdrawals. Findikoglu pleaded not guilty during a hearing in federal court in Brooklyn, New York, after being extradited on Tuesday from Germany, where he was arrested in December 2013, the U.S. Justice Department said.

U.S., eyeing Russia, urges NATO allies to harden cyber defenses

- Wed, 24 Jun 2015 13:47:24 -0400

NATO Secretary General Stoltenberg and U.S. Secretary of Defense Carter chat after a family photo at the NATO headquarters in BrusselsBy Phil Stewart BRUSSELS (Reuters) - U.S. Defense Secretary Ash Carter urged NATO allies on Wednesday to strengthen their cyber defenses, a senior U.S. defense official said, citing an advanced threat from Russia. Cyber vulnerabilities within NATO have come into focus following Russia's annexation of Crimea last year, which raised concerns about unconventional warfare techniques that can range from use of unidentified troops to information campaigns. A major cyber attack on a NATO member by any adversary could trigger a collective response by the alliance, perhaps extending beyond cyberspace.


Tech company finds stolen government log-ins all over Web

- Wed, 24 Jun 2015 12:52:37 -0400

WASHINGTON (AP) ? A CIA-backed technology company has found logins and passwords for 47 government agencies strewn across the Web ? available for hackers, spies and thieves.

US Personnel office not worst in terms of lax cybersecurity

- Wed, 24 Jun 2015 03:41:18 -0400

Katherine Archuleta, director, Office of Personnel Management, gestures while she testifies before the Senate Appropriations subcommittee on Financial Services and General Government hearings to review IT spending and date security at the Office of Personnel Management in Washington, Tuesday, June 23, 2015. (AP Photo/Cliff Owen)WASHINGTON (AP) ? The U.S. government has for years failed to take basic steps to protect its data from hackers and thieves, putting at risk everything from nuclear secrets to the private tax information of hundreds of millions of Americans, records show.


10 Things to Know for Wednesday

- Tue, 23 Jun 2015 22:30:27 -0400

In this May 19, 2011 photo, a giant carving commemorating the military and political leaders of the Confederacy is lit up by lights on Stone Mountain, Ga. Calls to remove Confederate imagery from public places multiplied rapidly across the South and beyond Tuesday, June 23, 2015, in the wake of the mass shooting at a historic black church in Charleston, S.C. (Hyosub Shin/Atlanta Journal-Constitution via AP)Your daily look at late-breaking news, upcoming events and the stories that will be talked about Wednesday:


U.S. airs deep concerns over cyber security in China meetings

- Tue, 23 Jun 2015 20:23:05 -0400

US Vice President Joe Biden shakes hands with Chinese Vice Premier Liu in WashingtonBy Jason Lange and David Brunnstrom WASHINGTON (Reuters) - The United States said on Tuesday that cyber theft sponsored by the Chinese government was a major problem and stressed the need to keep Asian sea lanes open as the world's two biggest economies held annual talks aimed at maintaining working relations in spite of rising tensions. At the wide-ranging Strategic and Economic Dialogue in Washington, both sides expressed a desire for constructive relations, with China saying the two countries could manage differences and should avoid confrontation.


Blackshades malware owner gets nearly 5 years in prison

- Tue, 23 Jun 2015 20:01:37 -0400

NEW YORK (AP) ? The Swedish owner of a business that sold sophisticated malware that prosecutors say corrupted more than half a million computers in 100 countries was sentenced on Tuesday to nearly five years in prison.

Agency chief: Contractor's credential used to breach system

- Tue, 23 Jun 2015 19:54:54 -0400

Katherine Archuleta, director, Office of Personnel Management, testifies before the Senate Appropriations subcommittee on Financial Services and General Government hearing to review IT spending and date security at the OPM in Washington, Tuesday, June 23, 2015. (AP Photo/Cliff Owen)WASHINGTON (AP) ? The head of the government agency that suffered two massive cyberattacks said Tuesday that a hacker gained access to its records with a credential used by a federal contractor.


Federal agencies are wide open to hackers, cyberspies

- Tue, 23 Jun 2015 15:58:37 -0400

Katherine Archuleta, director, Office of Personnel Management, gestures while she testifies before the Senate Appropriations subcommittee on Financial Services and General Government hearings to review IT spending and date security at the Office of Personnel Management in Washington, Tuesday, June 23, 2015. (AP Photo/Cliff Owen)WASHINGTON (AP) ? Passwords written down on desks. Outdated anti-virus software. "Perceived ineptitude" in information technology departments.


Swede gets 4-3/4 years in U.S. prison over BlackShades software

- Tue, 23 Jun 2015 15:51:33 -0400

Journalists take photographs of a display referring to "BlackShades" malware during a news conference by the U.S. Attorney for the Southern District of New York to announce law enforcement action to target creators and purveyors of malicious computer softThe leader of an organization called BlackShades was sentenced to 4-3/4 years in a U.S. prison on Tuesday for distributing software that authorities say was used to hack into half a million computers worldwide. Alex Yucel, a 25-year-old Swede, was sentenced by U.S. District Judge Kevin Castel in Manhattan after pleading guilty in February to distribution of malicious software. Prosecutors had sought up to 7-1/2 years in prison for Yucel, who was arrested in November 2013 in Moldova and later extradited to the United States.


US to put military equipment in several European countries

- Tue, 23 Jun 2015 12:44:55 -0400

The US Secretary of Defense Ashton Carter, left, and Estonian Defense Minister Sven Mikser attend a joint press conference after a meeting in Tallinn, Estonia, Tuesday, June 23, 2015 . (AP Photo)TALLINN, Estonia (AP) ? The U.S. will spread about 250 tanks, armored vehicles and other military equipment across six former Soviet bloc nations to help reassure NATO allies facing threats from Russia and terrorist groups, Defense Secretary Ash Carter announced Tuesday.