IANS Blog RSS Feed

http://www.iansresearch.com

Poulin to CSO: We Hacked a Smart Building Using ?Old-School? Techniques

- Thu, 11 Feb 2016 00:00:00 GMT

The ?smarter? buildings get, the easier they are to hack? Maybe. IANS Faculty Chris Poulin, research strategist for IBM?s X-Force ethical hacking team, recently spoke to CSO?s Maria Korolov about a penetration test in which his team was able to gain access to all of the buildings operated by a building management company.

Privacy, Security Concerns Rise as States Mull Encryption Backdoor Requirements

- Wed, 27 Jan 2016 00:00:00 GMT

National Data Privacy Day (January 28th) certainly comes at an interesting time this year, as legislators in two of the most technology-centric U.S. states recently introduced similar bills that would force smartphone manufacturers to include encryption backdoors in their devices.

Fledgling Cyber-Insurance Market Tested by Early Denials, Lawsuits

- Wed, 20 Jan 2016 00:00:00 GMT

Cybersecurity insurance policies may be relatively new, but they have one important thing in common with established, legacy business coverage: They live and die in the fine print.

Hacker-Caused Ukrainian Power Outage Marks First Known Attack With Immediate, Direct Public Impact

- Tue, 05 Jan 2016 00:00:00 GMT

Security researchers have confirmed that a recently updated version of the highly destructive BlackEnergy malware package infected the systems of at least three power authorities in Ukraine, causing a massive outage that left thousands of homes in the Ivano-Frankivsk region of the country without electricity. 

Top 10 IANS Insights from a Tumultuous 2015

- Mon, 28 Dec 2015 00:00:00 GMT

Another year is in the books and what a year it was for infosec pros. From the Ashley Madison hack to the OPM breach, to Jeep commandeering and mysterious backdoors in popular networking gear, every week brought a new security twist that forced us all to keep our heads on swivels.

Herold: Misguided CISA Heightens Security, Privacy Concerns

- Mon, 21 Dec 2015 00:00:00 GMT

The controversial Cybersecurity Information Sharing Act (CISA) is now the law of the land, slipped into an eleventh-hour spending bill designed to keep the federal government running through 2016.

Patch Now: Rogue Code Leaves Gaping Hole in Juniper Gear

- Fri, 18 Dec 2015 00:00:00 GMT

Juniper Networks says unauthorized code could allow attackers to gain administrative access to its NetScreen appliances and decrypt VPN connections without leaving any trace of their actions. Users are urged to apply fixes immediately.

Poulin: Time to Realistically Acknowledge Vehicle Vulnerabilities

- Wed, 16 Dec 2015 00:00:00 GMT

The images and breathless banter were difficult to ignore: celebrity security researchers gaining remote command of an automobile, disrupting on-board systems before forcing the vehicle and its helpless driver into a ditch.

NIST to Infosec Pros: How Is Our Framework Working?

- Mon, 14 Dec 2015 00:00:00 GMT

The National Institute of Standards and Technology is asking infosec practitioners in the public and private sectors to comment on the efficacy of its cybersecurity framework as it prepares to update the popular, two-year-old document.

As Ransomware Attacks Evolve, Security Teams Must Prepare For New ?Drive-By? Tactics

- Thu, 10 Dec 2015 00:00:00 GMT

Another week, another evolution of the popular ransomware attacks. When we last wrote about it, researchers had discovered a new iteration ? ?Linux.Encoder.1? ? that enabled attackers to inject malware into Linux-powered websites and encrypt all files in the home and backup directories. Now, it appears the popular exploit kit Angler is being used to spread the latest version of CryptoWall and other ransomware on websites as part of ?drive-by? campaigns that begin with the deployment of password-stealing malware. 

Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

SONAR.Heur.RGC!g108

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g136

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g147

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g185

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g90

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.CM!g13

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.DL!g5

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MSWord!g3

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic2.RGC!g8

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen57

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

PHP.Fioesrat

- Wed, 4 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AM

- Mon, 2 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

VBS.Backbat

- Mon, 2 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus.

Trojan.Ransomcrypt.AL

- Thu, 28 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomlock.AQ

- Thu, 28 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Pekelog

- Wed, 27 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Adupihan

- Wed, 27 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Godmodir

- Wed, 27 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Prociy

- Thu, 28 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Downloader.Exopire

- Thu, 28 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Etumbot

- Tue, 26 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Exedapan!gm

- Tue, 26 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Pladrop

- Tue, 26 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-2347

- Wed, 27 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Boyapki.E

- Mon, 25 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AO

- Mon, 25 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Banswift

- Mon, 25 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-0147

- Sun, 24 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-0127

- Sun, 24 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Packed.Generic.503

- Sun, 24 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Contwoo

- Fri, 22 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Exedapan

- Thu, 21 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Phytob

- Thu, 21 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

JS.Ransomcrypt

- Wed, 20 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Multigpos

- Wed, 20 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Multig!gm

- Wed, 20 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

JS.Proxybrowse

- Thu, 21 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Packed.Generic.501

- Wed, 20 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AN

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptlock.AN!gm

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

BBOS.Stealthgenie

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Exploz.C

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus.

W32.Exploz.C

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Virus.

Exp.CVE-2016-0164

- Wed, 20 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-0155

- Wed, 20 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Adwind!gen1

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g112

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Downloader!gen2

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g200

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g100

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g140

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g173

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.OF!g2

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.OF!g3

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Nancrat!gen3

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SillyFDC!gen5

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Worm.

SONAR.Trafic2.RGC!g15

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspExt!gen1

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic1.RGC!g13

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic2.RGC!g4

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Nymaim.B!gm

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AM

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Naibe

- Mon, 18 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AK

- Mon, 18 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W97M.Downloader.H

- Mon, 18 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptlock.W!g2

- Sat, 16 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Packed.Generic.500

- Thu, 14 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-0157

- Fri, 15 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-0158

- Fri, 15 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.Qakbot!gen12

- Fri, 15 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Virus, Worm.

SONAR.Trafic2.RGC!g13

- Wed, 13 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.SH!g8

- Wed, 13 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.CM!g5

- Wed, 13 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Kotver!gen2

- Wed, 13 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g129

- Wed, 13 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MSWord!g1

- Wed, 13 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Zbot.D

- Wed, 13 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AJ

- Tue, 12 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Orcalata

- Mon, 11 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Downloader.Orcalata

- Mon, 11 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AI

- Sun, 10 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Downloader.Zirchap

- Sat, 9 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Karus

- Sat, 9 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W97M.Downloader.G

- Tue, 5 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-1019

- Fri, 8 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Heur.RGC!g186

- Thu, 7 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g151

- Thu, 7 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g152

- Thu, 7 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g153

- Thu, 7 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Infostealer.Poslit

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Heur.RGC!g155

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g156

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Backdoor.Perper

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AL

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptlock.AL!gm

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AH

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Cryptlocker!g51

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g103

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g106

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g101

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g102

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g115

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g114

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g117

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g111

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g119

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g118

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g110

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g120

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g116

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g121

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g122

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g124

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g131

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g126

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g125

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g133

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g132

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g135

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic2.RGC!g6

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic2.RGC!g16

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g134

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic2.RGC!g10

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic1.RGC!g10

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g145

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspLaunch!gen11

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspLaunch!gen10

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.SH!g6

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspDrop!gen7

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g143

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g146

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Nancrat!gen4

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g141

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g149

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g148

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.DL!g3

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.CM!g8

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.CM!g21

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.CM!g10

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g98

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g97

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g95

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g94

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g93

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g199

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g197

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g195

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g194

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g193

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g188

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g192

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g177

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g187

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g178

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g184

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g179

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g176

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g175

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g174

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g172

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g170

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g168

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g162

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g163

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g165

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g159

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g167

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g157

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

W32.Grenail.O!inf

- Tue, 5 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Virus.

Trojan.Cryptolocker.AK

- Tue, 5 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

Exclusive: Big data breaches found at major email services - expert

- Wed, 04 May 2016 11:11:54 -0400

A magnifying glass is held in front of a computer screen in this picture illustration taken in BerlinHundreds of millions of hacked user names and passwords for email accounts and other websites are being traded in Russia's criminal underworld, a security expert told Reuters. The discovery of 272.3 million stolen accounts included a majority of users of Mail.ru , Russia's most popular email service, and smaller fractions of Google , Yahoo and Microsoft email users, said Alex Holden, founder and chief information security officer of Hold Security. It is one of the biggest stashes of stolen credentials to be uncovered since cyber attacks hit major U.S. banks and retailers two years ago.


Swiss defense chief says hackers targeted his ministry

- Wed, 04 May 2016 07:10:24 -0400

BERLIN (AP) ? Switzerland's defense minister says his department was targeted by hackers in January and is indicating that the motive was industrial espionage.

Anonymous attack Greek central bank, warns others

- Wed, 04 May 2016 04:47:39 -0400

A protester wearing a Guy Fawkes mask, symbolic of the hacktivist group "Anonymous", takes part in a protest in central BrusselsGreece's central bank became the target of a cyber attack by activist hacking group Anonymous on Tuesday which disrupted service of its web site, a Bank of Greece official said on Wednesday. Today we have continuously taken down the website of the Bank of Greece," the group says in a video on You Tube.


5 Reasons Apple Is A Screaming Sell

- Wed, 04 May 2016 04:39:00 -0400

Apple shares -- in which I have no financial interest -- are down 30% from their April 2015 high. Are they cheap now? I see five reasons why Apple shares are a screaming sell. 1. Shrinking China opportunity ...

Facebook CEO urges Brazilians to decry WhatsApp block

- Tue, 03 May 2016 19:42:38 -0400

Mark Zuckerberg, founder of Facebook, delivers a keynote speech during the Mobile World Congress in BarcelonaSAO PAULO/RIO DE JANEIRO (Reuters) - Facebook Inc's Chief Executive Mark Zuckerberg called on Brazilians to demand his company's WhatsApp messaging service never be blocked again after an appeals court on Tuesday overturned the application's second suspension in five months. In a post in English on his Facebook page, the U.S. billionaire and Facebook founder urged Brazilians to gather outside Congress in the capital Brasilia at 6 p.m. (1700 EDT) on Wednesday to rally in favor of legislation that would prevent Internet services from being blocked. WhatsApp was cut off in Brazil at 2 p.m. (1300 EDT) on Monday after a judge in the remote northeastern state of Sergipe ordered Brazil's five main wireless operators to block access to the app for 72 hours.


Move over drones, driverless cars _ unmanned ship up next

- Tue, 03 May 2016 09:07:27 -0400

A self-driving, 132-foot military ship sits at a maritime terminal Monday, May 2, 2016, in San Diego. The Pentagon's research arm is launching tests on the world's largest unmanned surface vessel designed to travel thousands of miles out at sea without a single crew member on board. (AP Photo/Julie Watson)SAN DIEGO (AP) ? It's not only drones and driverless cars that may become the norm someday ? ocean-faring ships might also run without captains or crews.


Why did Radiohead erase itself from the internet?

- Mon, 02 May 2016 20:25:09 -0400

U.K. band Radiohead are known for doing things unconventionally, but they're also incredibly shrewd marketers who know how to build up hype for themselves and their music. Roughly nine years ago, for example, the bank shocked the world by announcing that fans could pay whatever they wanted for the album  In Rainbows  that was released directly over the band's website. Now it seems Radiohead is engaging in another zany stunt to promote its upcoming ninth studio album by completely erasing its presence online. FROM EARLIER:  ?Captain America: Civil War? hits $200M at the box office before U.S. premiere As  The Guardian points out , "a visit to Radiohead.com on Sunday offered viewers only a blank page, while the band?s six-year-old Twitter feed was also empty... on Facebook , nearly 12 million users 'like' a page with nothing on it." Radiohead have also been sending out leaflets to fans via snail mail, which suggests the band is trying to rely on old-school technology to build up hype for its new release. Maybe the band will have carrier pigeons deliver vinyl copies of the album to everyone who preorders it by contacting them over ham radio? At any rate, one of the better songs from Radiohead's  Kid A was called "How to Disappear Completely," and it seems appropriate to give it a listen in light of the band's disappearance from social media. https://www.youtube.com/watch?v=lAF8D0ugyVk

Nasty piece of Android malware monitors texts, browser history and banking information

- Mon, 02 May 2016 18:30:05 -0400

There's a new piece of nasty Android malware floating around that Android users should be on the lookout for. Masquerading as a update for Google's mobile Chrome browser, the malware is hosted on webpages designed to look like they are official Google or Android landing pages. Originally spotted by the security firm Zscaler , the malware is designed to monitor call logs, browser history, text messages and banking information. Once installed, the malware logs the aforementioned data and sends it all back to a remote command and control server. What's more, Zscaler notes that the malware is capable of checking if a user has any antivirus apps installed, and if so, "terminating them to evade detection." DON'T MISS:  Time to cut the cord: $95 gets you a Fire TV and free network TV in HD for life So while user's should be extra vigilant about this malware, we should note that installation can only occur if a user turns off a default Android setting which prevents the installation of software from non-approved sources. Tom's Guide  notes : After downloading the APK file, users would need to disable one of Android?s default security settings which prevents the installation of programs from unknown sources. Once that?s done and the target gives Update_chrome.apk administrative access, the malware registers the phone with its remote server, and monitors all SMS messages and calls, which it sends to remote servers. If users open the Play Store on an infected device, the malware presents a phony payment information page for entering credit card numbers. After that data is entered, a screenshot is then sent to a phone number in Russia, which doesn't sound like a safe way to store your banking data. As if that weren't nasty enough, the malware is extremely resilient can only be thoroughly removed when a user performs a factory reset on their device. Moral of the story? The openness of Android is obviously one of its major benefits, but you might want to stick with the Google Play store or other approved storefronts for now.

Russian creator of malware ordered to pay $6.9 million

- Mon, 02 May 2016 18:14:07 -0400

By David Ingram NEW YORK (Reuters) - A Russian man who spent about three years behind bars in the United States for creating the computer malware known as Gozi was ordered on Monday to pay $6.9 million to cover losses to bank customers but spared further U.S. prison time. Nikita Kuzmin, 28, could have received more prison time but was sentenced to time served at a hearing in Manhattan federal court, prosecutors said in a statement. A probation office had recommended a sentence of 84 months, although it said it was not taking into account any assistance Kuzmin provided to investigators, prosecutors said.

Hackers can break into your company using $700 worth of parts from Amazon and eBay

- Mon, 02 May 2016 17:01:10 -0400

Hackers looking to break into companies could do so with the help of a $350 device that can be purchased online from Amazon or eBay, new research shows. By taking advantage of the way most employee ID badges work,  hackers could simply manufacture counterfeit access cards that would work just like the original badges. DON?T MISS: Time to cut the cord: $95 gets you a Fire TV and free network TV in HD for life Researchers from RedTeam Security showed Tech Insider how easily it is to clone an access card belonging to any employee by simply roaming around. The hackers did not have to steal personal information belonging to that person and instead used a much simpler trick. Using a particular device that costs just $350, researchers pretended to visit a target company. "[We] got the big, long range reader from Amazon," RedTeam Security consultant Matt Grandy said. "They're also all over on eBay." The attacker, posing as a student who requested a tour, carried the gadget in a seemingly harmless laptop bag that intercepted the unencrypted communication that takes place between an access card the moment it approaches a target. These work IDs use radio-frequency identification (RFID) to talk to doors and unlock them. Unfortunately, the data traffic isn?t protected by encryption, which means that it can be picked up by intrepid hackers armed with this device. Purchased from Amazon, the portable RFID badge reader can grab card data up to three feet away. When positioned close enough to a target, the device grabs the data from the card who?s trying to communicate with it and writes it on a microSD card. That means malicious individuals simply have to find a reason to be in the vicinity of a known employee to try to grab his or her credentials. The data is then transferred to a computer, where a $300 device called a Proxmark can write it on a fake employee badge. Using the manufactured card, hackers can then access any doors that badge is allowed to open. There are ways that companies and employees can protect themselves against such attacks. One of them is using encryption to protect RFID data. The other one is using RFID-blocking sleeves for access cards ? you can purchase them on Amazon at this link .

AP EXPLAINS: What is bitcoin? A look at the digital currency

- Mon, 02 May 2016 14:43:47 -0400

File - This is a Oct. 16, 2015 file photo of a Bitcoin ATM. An Australian man long thought to be associated with the digital currency Bitcoin has publicly identified himself as its creator. BBC News said Monday, May 2, 2016 that Craig Wright told the media outlet he is the man previously known by the pseudonym Satoshi Nakamoto. The computer scientist, inventor and academic says he launched the currency in 2009 with the help of others. (Dominic Lipinski/PA via AP, File) UNITED KINGDOM OUTNEW YORK (AP) ? Bitcoin is a type of digital currency that allows people to buy goods and services and exchange money without involving banks, credit card issuers or other third parties. Its origins have long been a mystery ? though an Australian man long rumored to have ties to bitcoin has come forward claiming to be its creator.


Qatar bank says some leaked customer data may be accurate

- Sun, 01 May 2016 12:07:59 -0400

DUBAI, United Arab Emirates (AP) ? Qatar's largest bank acknowledged Sunday that some personal customer data that was leaked online may be authentic, and said it has hired an outside expert to review potential vulnerabilities to its computer systems.

Qatar National Bank says customer accounts safe despite data breach

- Sun, 01 May 2016 08:39:41 -0400

A general view of Qatar National Bank's head office building in DohaQatar National Bank, the Middle East's largest lender by assets, said it had taken immediate steps to ensure customers would not suffer any financial loss after a security breach last week exposed personal data of thousands of clients.


Islamic State-linked hackers post target list of New Yorkers

- Fri, 29 Apr 2016 14:19:54 -0400

Picture illustration taken in Zenica shows man typing on a keyboard in front of a computer screen on which an Islamic State flag is displayedBy Joseph Ax NEW YORK (Reuters) - A group of hackers linked to Islamic State has posted online a list of thousands of New York residents and urged followers of the militant group to target them, according to a source with knowledge of the matter. Federal agents and New York City police officers have been contacting the individuals on the list to inform them of the posting, but the source said law enforcement does not believe there is any credible threat. In a statement, the Federal Bureau of Investigation said, "While our standard practice is to decline comment on specific operational and investigative matters, the FBI routinely notifies individuals and organizations of information collected during the course of an investigation that may be perceived as potentially threatening in nature." The list includes names, home addresses and email addresses.


Meet Rep. Ted Lieu, a Congressman who says encryption is a ?national security priority?

- Fri, 29 Apr 2016 12:27:26 -0400

Ted Lieu is one of the few bona fide computer geeks in Congress. Even if you didn?t already know the California Democrat is one of only four congressmen (out of a total of 535) with a computer science degree, it?s the kind of thing that quickly becomes apparent when talking to the Stanford grad about a range of privacy and encryption matters. For starters, he recently downloaded and started using WhatsApp, the Facebook-owned messaging platform that earlier this month defaulted to end-to-end encryption for all users. He?s not only a supporter of strong encryption without backdoors ? Lieu considers it ?a national security priority.? DON'T MISS:  Completely change the look of your iPhone with round folder icons, no jailbreak needed Earlier this year, he co-sponsored legislation that would introduce a National Commission on Security and Technology Challenges. Essentially, it would impanel a group of digital security experts to make recommendations on how law enforcement can pursue investigations without undermining privacy protections or the competitiveness of U.S. tech companies. It?s also not every day you hear a sitting U.S. congressman ask you, as Lieu did during a conversation with BGR: ?Hey, by the way, do you watch ?Mr. Robot?? ? I actually don?t think the show is far-fetched at all.? As the idealogical fault lines over encryption and privacy continue to sharpen and government officials past and present continue moving over to this or that side of the line, Lieu represents an influential addition to the debate. Notwithstanding his membership in the minority party in the House, he?s a current federal lawmaker who thinks that writing new laws around encryption and privacy is something the government isn?t ready to tackle quite yet. ?My general view is I?m a great believer in both state and federal legislatures,? Lieu told BGR. At the same time, though, Lieu thinks that persuading lawmakers to pass legislation that tries to prevent situations like the recent flap between the FBI and Apple over an iPhone belonging to one of the San Bernadino shooters isn?t the right approach. ?(Legislatures) do a lot of good for America, but there are some things we?re not,? he continued. ?We are not nimble. We are not quick. We?re not elegant. And the law is often a very blunt instrument to try to address a problem. With technology, it?s pretty much the exact opposite of all of those characteristics. My view is you have to have very precise and well-written laws to address issues on technology. That?s often hard to do. And if you can?t do it right, my view is we shouldn?t be doing it at all.? Former Homeland Security Secretary Michael Chertoff, who today has a security consultancy called the Chertoff Group, is among a set of ex-national security types mentioned in a New York Times piece a few days ago who - perhaps surprisingly - side with Lieu when it comes to encryption. They include officials like former director of national intelligence Mike McConnell; former CIA director R. James Woolsey and former White House counterterrorism official Richard Clarke, among others. This is from a 28-page report prepared by the Chertoff group about encryption: ?Efforts to constrain encryption through forms of extraordinary access (for law enforcement) will inevitably introduce vulnerabilities into the security of consumer products in ways that are likely to have an adverse long-term effect on the security, privacy, and civil liberties of citizens ? our conclusion is that a mandate to require extraordinary lawful access to commercial encryption products would incur greater social, security, and economic costs than the benefits it would achieve. Based on what we know today from the public record, we recommend against the enactment of (an) extraordinary lawful access requirement.? Lieu, for his part, thinks now is also the least ideal time for congress to try to get involved. ?That?s why you have (defense secretary) Ash Carter coming out publicly saying he?s a strong believer in strong encryption without back doors, and that he doesn?t believe legislation should be done in times of grief and anger,? Lieu says. ?The FBI tries to frame this as privacy versus safety. And when you frame it that way, of course you?d say, well, we want our lives. But that?s not the proper frame. Because you can?t do back doors just for the good guys. ?My view is there?s not a lot of technical expertise in congress. I?m the only Democrat with a computer science degree. Before we wade into this fast-evolving area, let?s take a step back, get all the relevant information and consult with experts before moving forward.?

U.S. high court approves rule change to expand FBI hacking power

- Fri, 29 Apr 2016 03:39:33 -0400

A lock icon, signifying an encrypted Internet connection, is seen on an Internet Explorer browser in ParisBy Dustin Volz WASHINGTON (Reuters) - The Supreme Court on Thursday approved a rule change that would let U.S. judges issue search warrants for access to computers located in any jurisdiction despite opposition from civil liberties groups who say it will greatly expand the FBI's hacking authority. U.S. Chief Justice John Roberts transmitted the rules to Congress, which will have until Dec. 1 to reject or modify the changes to the federal rules of criminal procedure.


Hackers leak stolen Kenyan foreign ministry documents

- Fri, 29 Apr 2016 03:11:39 -0400

By George Obulutsa NAIROBI (Reuters) - Online activists who claim ties to Anonymous said on Thursday they had begun to leak documents from Kenya's foreign ministry as part of a campaign to expose government and corporate corruption across Africa. HackRead, a cyber security news site, reported that a hacker affiliated with "Operation Africa" had told it: "In (a) few days you will receive full disclosure of the data ? We the Anonymous will stand against corruption, child abuse, and child labour!" A link to a sample of 95 documents was published to a widely known Anonymous Twitter account, part of what it claimed was a one-terabyte stash of date from Kenya's Ministry of Foreign Affairs and International Trade. The documents, viewed by Reuters, appear to consist of mostly routine correspondence between Kenyan foreign ministry officials and other diplomatic missions, trade partners and international companies around the world.

Vasco posts 1Q profit

- Thu, 28 Apr 2016 18:19:52 -0400

The Oakbrook Terrace, Illinois-based company said it had net income of 6 cents per share. Earnings, adjusted for amortization costs and non-recurring costs, were 14 cents per share. The Internet security ...

Texas man in Iowa to face lottery jackpot fraud charges

- Thu, 28 Apr 2016 17:24:11 -0400

A Texas man accused of helping a lottery computer manager in Iowa collect jackpots from rigged lottery games gave up a yearlong extradition fight on Thursday and traveled to Iowa to face charges. Robert ...

Canada's Goldcorp says computer network hacked

- Thu, 28 Apr 2016 16:19:08 -0400

A general view shows the open pit gold mine of Goldcorp in PenasquitoBy Susan Taylor TORONTO (Reuters) - Canada's Goldcorp Inc on Thursday said its computer network had been compromised and the gold mining company was working to determine the scope and impact of the data breach. Vancouver-based Goldcorp's internal security team and independent technology security firms are gathering facts and informing affected employees, but Chief Executive David Garofalo said he was not overly worried. "The extent of the data breach is not of significant concern for us because we're a public company and anything of a material nature has to be in the public domain by law anyways.


ISIS is assembling a cyber army

- Thu, 28 Apr 2016 16:02:33 -0400

Following the deadly assaults on Europe in late 2015 and early 2016, reports emerged suggesting that ISIS has an army of organized hackers  who can provide consistent, round the clock  support to foot soldiers. However, new information on the matter seems to suggest that ISIS?s remaining hacking arm is nothing more than a propaganda machine capable of dealing minor hits, if any, to enemies. But ISIS is showing more interest in expanding its hacking capabilities. The news comes at a time when the U.S. government has declared cyber war on the Islamic paramilitary organization. DON?T MISS:  Apple issues statement following apparent suicide at Cupertino headquarters A report from Flashpoint called Hacking for ISIS: The Emergent Cyber Threat Landscape , first seen by Ars Technica , says that ISIS in April merged four independent pro-ISIS cyber teams into a single group called the United Cyber Caliphate. The group is made of the Sons Caliphate Army, the Caliphate Cyber Army, the Ghost Caliphate Section and Kalashnikov E-Security Team. These sound like rather scary organizations, but Flashpoint says they can?t do that much harm as they lack the expertise to conduct sophisticated digital assaults. ?Until recently, our analysis of the group's overall capabilities indicated that they were neither advanced nor did they demonstrate sophisticated targeting,? Flashpoint co-founder and Director of Research & Analysis for the Middle East and North Africa Laith Alkhouri said. ?With the latest unification of multiple pro-ISIS cyber groups under one umbrella, there now appears to be a higher interest and willingness amongst ISIS supporters in coordinating and elevating cyber attacks against governments and companies.? The report reveals that British citizen Junaid Hussain, who was killed in a raid in August 2015 , was the leader of ISIS's former Cyber Caliphate Army. Known as TriCK and part of a well-known black hat hackers group called TeaMp0isoN, Hussain joined ISIS in the summer of 2014. Since then, he has tried to recruit other colleagues into his team, but he hasn't been very successful. ISIS was able to take over social media accounts, defame websites (including CENTCOM and Newsweek), and attack the sites of certain cities, although it hasn't accomplished any major hack. Rather than coming up with its own hacks, the unified UCC group ? not to be confused with the US Cyber Command fighting ISIS hackers ? is likely going to employ ?malware as a service? exploit sites and other tools that can be purchased off hacker forums. The UCC would still be able to conduct propaganda operations and cause damage to ?soft? targets. So their capabilities, while limited, shouldn?t be completely ignored.

Google?s 2016 Nexus phones are probably going to be unbeatable

- Thu, 28 Apr 2016 15:12:14 -0400

Multiple reports have said that Google is already working hard on a couple of new Nexus handsets, undoubtedly the successors of the Nexus 5X and Nexus 6P . But rather than have LG and Huawei make them, Google supposedly hired HTC, the same company that made the iconic Nexus One. A pair of new reports bring further evidence that Google may indeed partner with HTC for the 2016 Nexus handsets ? yes, two devices are supposedly in the works. DON?T MISS:  How Snapchat and stupidity almost left five people dead First off, not only is HTC capable of making some impressive Android handsets ? just look at this year?s HTC 10 ? but the rumors come from sources who?re generally in the know about these type of things. https://twitter.com/evleaks/status/725395035022319616 Evan Blass and Android Police independently came out with details about the new Nexus handsets. Blass found out from his sources that HTC is making a pair of Android N handsets for Google, dubbed M1 and S1 internally. Meanwhile, a source told Android Police that Marlin and Sailfish are Google?s internal codenames for the new Nexus phones. The blog also dug through the available code to uncover evidence of one of the two names: Marlin. Sailfish is a weird choice for Google considering that it happens to be the name of a rival mobile operating system, but the company is known for using fish names for its Nexus devices. Furthermore, Blass and Android Police ?s reports certainly align: M1 might be the Marlin while S1 could stand for Sailfish. What about the numbers you ask? Neither source explains the detail. But an earlier report suggested that HTC may have inked a three-year Nexus exclusivity deal . So there?s that. It?s too early for specs, features or pictures. But the possibility of seeing HTC 10 variations turned into Nexus handsets is exciting. The HTC 10 is the most powerful smartphone ever and HTC'c hardware designs are always best-in-class. Add in stock Android and immediate access to software updates and you've got a pair of phones that might be unbeatable.

That time a Windows 10 update alert ruined a live TV broadcast

- Thu, 28 Apr 2016 09:35:09 -0400

How annoyed do you get each and every time a little alert pops up on your Windows computer insisting that you install the latest available platform updates? Do you keep your cool and just dismiss it? Do you get a little miffed and take your frustrations out on your mouse? Or maybe you're so tired of seeing these notifications that your blood begins to boil and you have to fight back the urge to break something. Now imagine you're reporting a weather forecast in the middle of a live TV broadcast when an alert pops up asking you to update... DON'T MISS:  Making sense of Apple now that everything has changed Via BetaNews , KCCI 8's meteorologist Metinka Slater was reporting the weather on live television when the Windows-powered computer her station uses to power weather graphics took an unplanned detour. Just as she was discussing heavy amounts of rainfall across southwest Iowa, an alert popped up saying that the channel's Windows computer wanted to install Windows 10. In the process, it covered her handy weather map graphics. To Slater's credit, she handled the curveball quite well. "Microsoft recommends upgrading to Windows 10... what should I do?" she asked sarcastically. "Ahhhh don't you love when that pops up, huh?" Microsoft has been pushing PC users with earlier Windows versions to update to Windows 10 in the hopes that they'll forget the Windows 8 debacle ever happened, and it has been doing so using annoying pop-up alerts like this one. Windows 10 is a huge improvement and we certainly recommend the free update, but don't worry, there's a way to stop those bothersome upgrade alerts if you're not quite ready to pull the trigger.  Here you go , Metinka. A video showing the blooper is embedded below.

Tennessee law to allow counselors to deny service based on beliefs

- Thu, 28 Apr 2016 09:03:59 -0400

File photo of Tennessee Republican Governor Haslam listening during the National Governors Association Winter Meeting in WashingtonGovernor Bill Haslam signed the bill into law three weeks after it was approved by the legislature. "The substance of this bill doesn't address a group, issue or belief system," Haslam said in a statement.


Philippine anti-money laundering body says remittance firm a 'cleaning house' in heist

- Thu, 28 Apr 2016 08:21:42 -0400

Commuters pass by the front of the Bangladesh central bank building in DhakaA Philippine anti-money laundering body has lodged a complaint against owners of a remittance firm it called a "cleaning house" to hide the trail of $81 million looted from a Bangladesh bank, in one of the biggest cyber heists in history. Philrem Service Corporation muddied the process and washed the stolen funds via a web of transfers and currency conversions around Philippine bank accounts, before moving it into Manila casinos and junket operators, the Anti-Money Laundering Council (AMLC) said in the filing dated Wednesday. Unidentified hackers infiltrated the computers at Bangladesh Bank, the central bank, in early February and tried to transfer some $951 million from its account at the Federal Reserve Bank of New York.


FBI says it won't disclose how it accessed locked iPhone

- Wed, 27 Apr 2016 23:39:15 -0400

FILE - In this Feb. 17, 2016 file photo, an iPhone is seen in Washington. The FBI said Wednesday, April 27, 2016, that it will not publicly disclose the method that allowed it to break into a locked iPhone used by one of the San Bernardino attackers, saying it lacks enough ?technical information? about the software vulnerability that was exploited. (AP Photo/Carolyn Kaster, File)WASHINGTON (AP) ? The FBI said Wednesday that it will not publicly disclose the method that allowed it to access a locked iPhone used by one of the San Bernardino attackers, saying it lacks enough "technical information" about the software vulnerability that was exploited.


Philippine central bank says foiled attempts to hack its website

- Wed, 27 Apr 2016 23:29:50 -0400

A logo of Bangko Sentral ng Pilipinas is seen at their main building in ManilaBy Karen Lema MANILA (Reuters) - The Philippine central bank has foiled attempts to hack its website, its governor said on Thursday amid a warning from global financial network SWIFT about recent multiple cyber fraud incidents targeting its system. SWIFT'S disclosure came as law enforcement authorities in Bangladesh and elsewhere investigated the February cyber theft of $81 million from the Bangladesh central bank account at the New York Federal Reserve Bank. "There were attempts, and I think this is a fact of life, but we have been able to turn them back," Amando Tetangco told reporters.


Wall Street watchdog has unfinished business with bad brokers

- Wed, 27 Apr 2016 19:54:37 -0400

CEO of the Financial Industry Regulatory Authority Richard Ketchum speaks during the Global Wealth Management Summit in New YorkIn an interview with Reuters on Wednesday, Richard Ketchum, chairman and chief executive of the Financial Industry Regulatory Authority (FINRA), mentioned several ways data should be better collected and used by regulators and investors. "There's no doubt in my mind that the future of regulation is going to be about data analytics," said Ketchum. A top priority is getting more and better information onto FINRA's BrokerCheck website, a free database where investors can research professional histories of brokers and firms.


Qatar's largest bank investigating alleged data breach

- Wed, 27 Apr 2016 14:21:58 -0400

FILE- In this Friday, May 14, 2010 file photo, a Qatari woman walks in front of the city skyline in Doha. Qatar National Bank was responding to files circulating on social media that purport to show the personal information of hundreds of people, including staff at the broadcaster Al-Jazeera and members of the ruling family. (AP Photo/Kamran Jebreili)DUBAI, United Arab Emirates (AP) ? Qatar's largest bank is investigating a security breach that appears to have exposed sensitive personal data for what could be hundreds of customers, including employees of international broadcaster Al-Jazeera and potentially senior government officials.


Qatar National Bank investigating alleged data hack

- Wed, 27 Apr 2016 12:16:45 -0400

A general view of Qatar National Bank's head office building in DohaBy Tom Finn DOHA (Reuters) - Qatar National Bank, the largest lender in the Middle East and Africa by assets, is investigating an alleged security breach of data posted online this week that revealed the names and passwords of a large number of customers. QNB said it was investigating "social media speculation in regard to an alleged data breach" and would not comment on reports circulated via social media. One file contained information on what appeared to be 465,437 QNB accounts, although only a fraction of these accounts had anything resembling full account details.


The FBI?s Most-Wanted Cybercriminals

- Wed, 27 Apr 2016 10:00:07 -0400

For more than 60 years, the FBI has kept a list of its top ten most wanted fugitives. The idea took root in the bureau when a reporter asked the FBI in 1949 for a list of the ?toughest guys? it was looking for, and published the list in the Washington Daily News, according to the agency. The article captured so much interest that FBI Director J. Edgar Hoover institutionalized the most-wanted list the very next year.

German nuclear plant infected with computer viruses, operator says

- Wed, 27 Apr 2016 09:02:12 -0400

Nuclear power plant is pictured in GundremmingenBy Christoph Steitz and Eric Auchard FRANKFURT (Reuters) - A nuclear power plant in Germany has been found to be infected with computer viruses, but they appear not to have posed a threat to the facility's operations because it is isolated from the Internet, the station's operator said on Tuesday. The Gundremmingen plant, located about 120 km (75 miles) northwest of Munich, is run by the German utility RWE . The viruses, which include "W32.Ramnit" and "Conficker", were discovered at Gundremmingen's B unit in a computer system retrofitted in 2008 with data visualization software associated with equipment for moving nuclear fuel rods, RWE said.


Apple upbeat on iPhone SE demand but some Asian retailers, suppliers less cheery

- Wed, 27 Apr 2016 08:33:07 -0400

File photo of hostesses holding the the Huawei's Ascend P7 smartphone during a presentation in ParisBy Yimou Lee HONG KONG (Reuters) - After announcing its first-ever drop in iPhone sales on Tuesday, Apple Inc sought to reassure investors by saying its latest and cheapest model was in strong demand after being launched in late March. In a Reuters survey of 10 retailers in Hong Kong, Beijing, Shanghai and Shenzhen, seven - including four Apple Stores - reported solid early demand, but three third-party retailers said sales were weak. Two suppliers of components for Apple phones, including the new iPhone SE, said they were seeing lower orders.


Apple says FBI gave it first vulnerability tip on April 14

- Tue, 26 Apr 2016 20:14:13 -0400

Logo of U.S. technology company Apple is seen in ZurichThe FBI informed Apple Inc of a vulnerability in its iPhone and Mac software on April 14, the first time it had told the company about a flaw in Apple products under a controversial White House process for sharing such information, the company told Reuters on Tuesday. The FBI told the company that the disclosure resulted from the so-called Vulnerability Equities Process for deciding what to do with information about security holes, Apple said. The vulnerability that was disclosed to Apple involved older versions of the iPhone and the Mac, Apple said.


Estonian sentenced in U.S. to seven years in prison for cyber fraud

- Tue, 26 Apr 2016 19:27:27 -0400

By Nate Raymond NEW YORK (Reuters) - An Estonian man who authorities said ran a cyber criminal enterprise that infected more than four million computers worldwide with malware to carry out a lucrative click fraud scheme was sentenced by a U.S. judge on Tuesday to 7-1/4 years in prison. Vladimir Tsastsin, 35, was sentenced by U.S. District Judge Lewis Kaplan in Manhattan after pleading guilty in July to charges that he engaged in wire fraud and computer intrusion conspiracies in a scheme that caused $14 million in losses. Tsastsin was extradited in October 2014 from Estonia, where he was arrested in 2011 and separately tried and convicted in a court in Estonia on related money-laundering charges.

Microsoft is bringing my favorite iPhone and Mac feature to Windows 10

- Tue, 26 Apr 2016 07:52:50 -0400

It's incredible how quickly the tide can turn on the internet. It seems like just yesterday that hordes of angry Windows users were banding together and vowing in unison that they would never patronize Microsoft again because of its shoddy Windows 8 platform. Now, it's almost as though Windows 8 never existed ? apparently skipping 9 and jumping directly to 10 worked pretty well indeed. But Windows 10 isn't just a marketing trick, it's a well-crafted desktop platform that doesn't overcompensate for Microsoft's shortcomings in mobile, which is why the Windows 8 experience was so terrible. The best part is that Microsoft continues to make important improvements to its Windows 10 platform, and it looks like the next big addition to Windows will be one of my favorite features from iOS and OS X. DON'T MISS:  My iPhone screen is bigger than your HDTV, but it still fits in my pocket Desktop and smartphone user experiences were entirely separate for a period of time, but Apple and Google have made great strides to better link them. Email protocols like Exchange and IMAP allowed changes made on one device to be reflected on the other, so why couldn't this same concept extend to other areas as well? Apple's Handoff feature suite was introduced as a way to make that happen. Using Handoff, users can switch seamlessly from an iPhone to a MacBook to an iPad without skipping a beat. Web pages you were browsing on your iPhone are instantly available on your MacBook. Documents you were editing on your MacBook open in the blink of an eye on your iPad. Now, it looks like Microsoft is getting ready to bake a similar feature set into Windows 10. As noted by a user on Reddit , a new option appeared for some users in the latest Windows 10 update that refers to Microsoft's upcoming handoff feature. It's not yet fully implemented so it cannot be tested, but this falls in line with earlier reports suggesting that Microsoft is working on functionality similar to handoff. It's important to note that this functionality, once launched, will not be limited to users with Windows smartphones. As reiterated by MSpoweruser , the handoff feature in Windows 10 will be cloud based and will work with third-party apps on the iOS and Android platforms.

Exclusive: SWIFT warns customers of multiple cyber fraud cases

- Tue, 26 Apr 2016 06:23:26 -0400

Swift code bank logo is displayed on an iPhone 6s on top of Euro banknotes in this picture illustration made in ZenicaThe disclosure came as law enforcement authorities in Bangladesh and elsewhere investigated the February cyber theft of $81 million from the Bangladesh central bank account at the New York Federal Reserve Bank. SWIFT has acknowledged that the scheme involved altering SWIFT software on Bangladesh Bank's computers to hide evidence of fraudulent transfers. Monday's statement from SWIFT marked the first acknowledgement that the Bangladesh Bank attack was not an isolated incident but one of several recent criminal schemes that aimed to take advantage of the global messaging platform used by some 11,000 financial institutions.


Dangerous Windows 10 flaw lets hackers secretly run any app on your PC

- Mon, 25 Apr 2016 23:17:39 -0400

A newly identified Windows 10 security flaw lets  hackers install malicious apps on any machine, without business owners being made aware anything out of the ordinary is happening. The issue lets anyone familiar with Windows security bypass its defenses without leaving any trace on the machine. Discovered accidentally, the issue is significant, and Microsoft is yet to issue a patch. DON?T MISS:  My iPhone screen is bigger than your HDTV, but it still fits in my pocket Found by Casey Smith , the Windows vulnerability doesn?t affect only Windows 10 machines. Malicious hackers could take advantage of the security flaw on enterprise versions of Windows dating back to Windows 7. The issue concerns a program called Regsvr32 (and Regsvr64 for 64-bit machines), which lets anyone execute code on a Windows computer from remote network locations. The flaw doesn?t trigger the AppLocker security software, which is supposed to only let users run apps from trusted sources, and it doesn?t leave any traces in the registry, as it doesn?t need administrator access. In other words, pretty much anyone could use it to install and run any application on an unsuspecting employee?s Windows machine. Microsoft has not yet provided a fix for the issue, but users can disable the Regsvr program using Windows Firewall. More details on Smith?s findings are available at the source links, including proof of concept scripts to demonstrate the security issue.

2nd security firm raises concerns about Cruz and Kasich apps

- Mon, 25 Apr 2016 22:45:01 -0400

WASHINGTON (AP) ? Another computer-security firm raised concerns Monday about the potential for hackers to glean users' personal data from phone apps released by the campaigns of Republican presidential contenders Ted Cruz and John Kasich.

Exclusive: SWIFT network says aware of multiple cyber fraud incidents

- Mon, 25 Apr 2016 19:20:49 -0400

Swift code bank logo is displayed on an iPhone 6s on top of Euro banknotes in this picture illustration made in ZenicaThe disclosure came as law enforcement authorities in Bangladesh and elsewhere investigated the February cyber theft of $81 million from the Bangladesh central bank account at the New York Federal Reserve Bank. SWIFT has acknowledged that the scheme involved altering SWIFT software on Bangladesh Bank's computers to hide evidence of fraudulent transfers. Monday's statement from SWIFT marked the first acknowledgement that the Bangladesh Bank attack was not an isolated incident but one of several recent criminal schemes that aimed to take advantage of the global messaging platform used by some 11,000 financial institutions.