IANS Blog RSS Feed

http://www.iansresearch.com

Anthem: Breach Could Include Millions of Non-Customers

- Wed, 25 Feb 2015 00:00:00 GMT

The more information that trickles out about the Anthem cyberbreach, the worse it looks. The health insurance provider said this week that between 8.8 million and 18.8 million non-customers may have been affected by the attack.

Report: US, UK Hacked SIM Card Maker to Spy on Mobiles

- Fri, 20 Feb 2015 00:00:00 GMT

Is the NSA spying on your mobile calls? According to a new report, one of the world?s largest manufacturers of mobile SIM cards fell victim to a hack by U.S. and U.K. intelligence agencies that successfully stole encryption codes and enabled them to eavesdrop on mobile voice and data calls made by mobile users in 85 countries.

Anthem Breach Cost Likely to Exceed $100 Million

- Fri, 13 Feb 2015 00:00:00 GMT

So much for its hefty $100 million cyber-insurance policy. Health insurance provider Anthem says its breach, which affected as many as 80 million customers, employees and investors, could cost far more than that when all is said and done.

Health Insurer Hack Exposes Personal Data on 80 Million Users

- Thu, 05 Feb 2015 00:00:00 GMT

Another day, another high-profile breach. Anthem announced it fell victim to what it terms a ?very sophisticated external cyber-attack? that successfully stole personal information from 80 million current and former members, as well as employees.

Germany Considers Scrapping the EU-US Safe Harbor

- Tue, 27 Jan 2015 00:00:00 GMT

Looks like the NSA?s tapping of Angela Merkel?s cellphone continues to have strong repercussions. Case in point: Germany?s privacy leaders are meeting this week to decide whether the Safe Harbor agreement between the EU and US should be scrapped.

Microsoft, Google at Odds Over Zero-Day Disclosure

- Mon, 12 Jan 2015 00:00:00 GMT

When is the right time to disclose a zero-day vulnerability in a popular piece of software like Windows? Not two days before the patch drops, says Microsoft, which is incensed that Google did just that even though it knew Microsoft?s Patch Tuesday was imminent.

SS7 Flaw Leaves Global Cellphone Network Wide Open to Hacks

- Fri, 19 Dec 2014 00:00:00 GMT

Just about anyone can listen in on anybody?s private cellphone calls and texts. That?s the finding of two German researchers who say security flaws in Signaling System 7 (SS7), a major underpinning of the global cellular network, enable malicious intercepts on a massive scale.

Gingrich: With Sony Hack, US Loses First Cyberwar

- Thu, 18 Dec 2014 00:00:00 GMT

Now that Sony Pictures Entertainment (SPE) has decided to cancel the release of ?The Interview,? the movie that reportedly kicked off the devastating cyber-attack the company is still recovering from, some say the ramifications are far-reaching. In fact, political pundit Newt Gringrich says the decision is proof the U.S. just lost the world?s first cyberwar.

Sony Internal Audit Highlights Critical Infosec Issues Prior to Hack

- Mon, 15 Dec 2014 00:00:00 GMT

Nearly two months before the infamous hack that left Sony dealing with leaked emails and unreleased movies being shared for free, the company?s internal audit outlined a series of infosec issues underscoring just how low a priority security was to the company.

POODLE Bug Returns via TLS

- Fri, 12 Dec 2014 00:00:00 GMT

The POODLE bug that made the rounds a couple of weeks ago is coming back to bite some organizations again. While the original POODLE affected only SSL Version 3, now researchers say certain TLS implementations are vulnerable, too.

Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

Downloader.Busadom!g1

- Fri, 27 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Infostealer.Predapan

- Fri, 27 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Worm.

Downloader.Busadom

- Thu, 26 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Ladocosm

- Thu, 26 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Infostealer.Posteal

- Thu, 26 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspHelpRun

- Tue, 24 Feb 2015 00:00:00 -0800

Risk Level: Very Low.

SONAR.SuspDocRun

- Tue, 24 Feb 2015 00:00:00 -0800

Risk Level: Very Low.

SONAR.Breut!gen1

- Tue, 24 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.Infostealer!g3

- Tue, 24 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.Infostealer!g4

- Tue, 24 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.Infostealer!g5

- Tue, 24 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.PUA!AlnadInsta

- Tue, 24 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

W32.Tempedreve.D!inf

- Tue, 24 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Virus, Worm.

Trojan.Bayrob!gen5

- Tue, 24 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Linux.Zorroten

- Mon, 23 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Laziok!gm

- Sun, 22 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Badbar

- Fri, 20 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Downloader.Upatre!gen10

- Thu, 19 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

JS.Bondat

-

Risk Level: Very Low. Type: Trojan, Worm.

Trojan.Spadyra!gen1

- Wed, 18 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Didytak.B

- Wed, 18 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Infostealer.Kegotip

-

Risk Level: Very Low. Type: Trojan.

Trojan.Grokey

- Tue, 17 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

W32.Fanni

- Tue, 17 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Worm.

Infostealer.Kegotip!gm

- Tue, 17 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Packed.Generic.483

- Tue, 17 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Worm.

W32.Wervik

-

Risk Level: Very Low. Type: Worm.

Trojan.Spadoluk

- Mon, 16 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Spadyra

- Mon, 16 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Equdrug

- Tue, 17 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Grayphish

- Tue, 17 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Didytak!gen1

- Mon, 16 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Tripfant

- Tue, 17 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Didytak

- Mon, 16 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

OSX.Malcol.2

- Thu, 12 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Boot.Ramnit

- Fri, 13 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Linux.Xnote

- Wed, 11 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Laziok

- Wed, 11 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-0312

- Thu, 12 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-0313

- Thu, 12 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Wensal

- Tue, 10 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Backdoor.Wensal

- Tue, 10 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-0310

- Tue, 10 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Mangzamel

- Mon, 9 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Linux.Xorddos!gen1

- Mon, 9 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomlock!g83

- Tue, 10 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Backdoor.Korplug!gen8

- Tue, 10 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Infostealer.Steamfishi

- Sun, 8 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptlock.G!gm

- Fri, 6 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Swifi!gen2

- Sat, 7 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Backdoor.Mivast

- Sat, 7 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

IOS.Xagent

- Thu, 5 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.M

- Thu, 5 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Packed.Generic.477

- Fri, 6 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Worm.

Trojan.Pladofu

- Fri, 6 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Packed.Generic.481

- Wed, 4 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Vulp

- Thu, 5 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Backdoor.Breut!gm

- Mon, 2 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Backtar

- Mon, 2 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Tinba!gm

- Mon, 2 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker!g10

- Sat, 31 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Aybord

- Mon, 2 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

PHP.Ransomcrypt.A

- Mon, 2 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Arsivir

- Fri, 30 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Downloader.Upatre!gen9

- Sat, 31 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Derkclod

- Sat, 31 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

China drops leading tech brands for certain state purchases

- Fri, 27 Feb 2015 01:33:22 -0500

A Cisco logo is seen at its customer briefing centre in BeijingBy Paul Carsten BEIJING (Reuters) - China has dropped some of the world's leading technology brands from its approved state purchase lists, while approving thousands more locally made products, in what some say is a response to revelations of widespread Western cybersurveillance. Others put the shift down to a protectionist impulse to shield China's domestic technology industry from competition. The lists cover smaller-scale direct purchases of technology equipment, and central government bodies can only buy items not on the list as part of a competitive tender process. Chief casualty was U.S. network equipment maker Cisco Systems Inc, which in 2012 counted 60 products on the Central Government Procurement Center's (CGPC) list, but had none left by late 2014, a Reuters analysis of official data shows.


Massive SIM card hack might have been too sophisticated to be caught in time

- Thu, 26 Feb 2015 22:45:24 -0500

A new Snowden leak a few days ago revealed that the NSA and GCHQ conducted a complex hack operation†that focused on obtaining the secure encryption keys that protect mobile communications in devices with SIM cards. A subsequent report revealed that the goal of spy agencies might have been a lot bigger, as they may have been hunting for other security keys that would let†them deploy spyware on any mobile device with a SIM card inside, and users would have no idea that anything had happened. FROM EARLIER: Gemalto confirms hack, but denies massive SIM keys theft Gemalto acknowledged the hack, but downplayed it, saying it couldn?t have resulted in a mass-theft of SIM card keys. The company also said that

Apple makes nearly eight times as much money as all Android vendors combined

- Thu, 26 Feb 2015 15:40:51 -0500

A new report from Strategy Analytics sheds further light on the state of the smartphone business in the fourth quarter last year, confirming†once again the profound effect the iPhone 6 had on the industry. The analytics company revealed that during Q4 2014, Android only managed to capture 11% of the global smartphone profit share, a record-low for Google?s ecosystem, while Apple took home a record-high 89% of all smartphone profits. FROM EARLIER:†Is the Galaxy S6 really an iPhone ripoff? Leaked comparison photo lets you be the judge ?Global smartphone operating profit grew 31% annually from US$16.2 billion in Q4 2013 to US$21.2 billion in Q4 2014,?Strategy Analytics Director Linda Sui said. ?Android hardware vendors combined took a record-low 11% global

Senate panel backs Loretta Lynch as attorney general

- Thu, 26 Feb 2015 12:08:12 -0500

Lynch testifies during her Senate Judiciary Committee confirmation hearing to become U.S. attorney general on Capitol Hill in WashingtonBy Lindsay Dunsmuir WASHINGTON (Reuters) - The U.S. Senate Judiciary Committee on Thursday voted to back Loretta Lynch as President Barack Obama's next attorney general, clearing way for her expected confirmation in the full Senate. If confirmed, Lynch would become the first black woman to serve as the nation's top law enforcement official. She would replace Eric Holder, who has held the post since 2009. At her Jan. 28 confirmation hearing, Lynch sought to smooth interactions with Republicans, who have repeatedly clashed with Holder, by emphasizing her determination for a "new and improved" relationship.


Cyber threats expanding, new US intelligence assessment says

- Thu, 26 Feb 2015 11:10:08 -0500

WASHINGTON (AP) ? The U.S. has elevated its appraisal of the cyber threat from Russia, the U.S. intelligence chief said Thursday, as he delivered the annual assessment by intelligence agencies of the top dangers facing the country.

Exclusive: China drops leading tech brands for state purchases

- Wed, 25 Feb 2015 23:26:25 -0500

A Cisco logo is seen at its customer briefing centre in BeijingBy Paul Carsten BEIJING (Reuters) - China has dropped some of the world's leading technology brands from its approved state purchase lists, while approving thousands more locally made products, in what some say is a response to revelations of widespread Western cybersurveillance. Others put the shift down to a protectionist impulse to shield China's domestic technology industry from competition. Chief casualty is U.S. network equipment maker Cisco Systems Inc , which in 2012 counted 60 products on the Central Government Procurement Center's (CGPC) list, but by late 2014 had none, a Reuters analysis of official data shows. Smartphone and PC maker Apple Inc has also been dropped over the period, along with Intel Corp's security software firm McAfee and network and server software firm Citrix Systems .


Lenovo website breached, hacker group Lizard Squad claims responsibility

- Wed, 25 Feb 2015 22:47:53 -0500

People stand under a sign showing the Lenovo company at a computer market in ShanghaiChinese computer and smartphone firm Lenovo Group Ltd said its website was hacked on Wednesday, its second security blemish days after the U.S. government advised consumers to remove software called "Superfish" pre-installed on its laptops. Hacking group Lizard Squad claimed credit for the attacks on microblogging service Twitter. Lenovo said attackers breached the domain name system associated with Lenovo and redirected visitors to lenovo.com to another address, while also intercepting internal company emails. Lizard Squad posted an email exchange between Lenovo employees discussing Superfish.


Gemalto confirms hack, but denies massive SIM keys theft

- Wed, 25 Feb 2015 20:20:04 -0500

Following reports that claimed†the NSA and GCHQ may have targeted Gemalto, one of the main phone SIM cards makers, the company revealed that such attacks indeed took place in 2010 and 2011, though the hackers were not able to steal SIM keys, as had been reported by the media. FROM EARLIER: Why the NSA SIM hack might be far more serious than you think Gemalto says that in 2010 and 2011 its network was hit by ?particularly sophisticated intrusions? that are now believed to have been conducted by U.S. and U.K. spy agencies, but the company says the NSA and GCHQ were not actually able to penetrate the secure network where such sensitive SIM data is handled. The company also

NY surveying banks on cyber security defenses

- Wed, 25 Feb 2015 16:06:08 -0500

ALBANY, N.Y. (AP) ? New York financial regulators are considering tougher cyber security requirements for banks to mandate more complex computer sign-ins and certifications from the contractors of their cyber defenses, the state's top regulator said Wednesday.

Hackers controlling millions of PCs disrupted in Europol sweep

- Wed, 25 Feb 2015 15:50:08 -0500

By Anthony Deutsch and Jim Finkle AMSTERDAM/BOSTON (Reuters) - A cybercrime operation that stole banking information by hacking more than 3 million computers in Indonesia, India and other countries has been disrupted by European police with assistance from three technology companies, officials said on Wednesday. Europol's European Cybercrime Centre coordinated the operation out of its headquarters in The Hague, targeting the so-called Ramnit botnet, a network of computers infected with malware. Microsoft Corp and Symantec Corp in dismantling the server infrastructure used by the criminals, Europol said. "The criminals have lost control of the infrastructure they were using," Paul Gillen, head of operations at Europol's cybercrime center, told Reuters.

Exclusive: China drops leading technology brands for state purchases

- Wed, 25 Feb 2015 08:31:33 -0500

A Cisco logo is seen at its customer briefing centre in BeijingBy Paul Carsten BEIJING (Reuters) - China has dropped some of the world's leading technology brands from its approved state purchase lists, while approving thousands more locally made products, in what some say is a response to revelations of widespread Western cybersurveillance. Others put the shift down to a protectionist impulse to shield China's domestic technology industry from competition. Chief casualty is U.S. network equipment maker Cisco Systems Inc , which in 2012 counted 60 products on the Central Government Procurement Center's (CGPC) list, but by late 2014 had none, a Reuters analysis of official data shows. Smartphone and PC maker Apple Inc has also been dropped over the period, along with Intel Corp's security software firm McAfee and network and server software firm Citrix Systems .


EU police operation takes down malicious computer network

- Wed, 25 Feb 2015 07:09:26 -0500

FILE - In this Friday, Jan. 16, 2015 file photo, a man walks past the European police agency Europol in The Hague, Netherlands. The head of European Union police organization Europol said at a meeting on Monday, Feb. 23, 2015 that intelligence and law enforcement agencies across the continent have to co-operate better to fight against the threat of terrorism. (AP Photo/Peter Dejong, File)THE HAGUE, Netherlands (AP) ? European police have taken down a computer network that used malicious software to infect more than 3 million computers worldwide and steal personal data, banking details and passwords.


Why the NSA SIM hack might be far more serious than you think

- Wed, 25 Feb 2015 06:50:42 -0500

A few days ago, a report revealed that spy agencies including the NSA and GCHQ, managed to bypass the security of SIM card manufacturer Gemalto and gain access to valuable encryption keys that protect cellphone signals. Even though Gemalto denied the reports, but The Verge points out that the hack might be more serious than initially believed, as it could give agencies the ability of infecting any phone using these specific SIM cards with additional spyware programs. FROM EARLIER: Bombshell report reveals the NSA has stolen encryption keys for millions of SIM cards Access to these encryption keys do not give governmental agencies only the power to monitor cellular communications, including calls and data, but they also come with additional

US announces reward for accused prolific cyber hacker

- Tue, 24 Feb 2015 20:51:47 -0500

WASHINGTON (AP) ? The U.S. government has announced a $3 million reward for information leading to the arrest of a man American authorities call one of the world's most prolific cyber hackers.

US announces reward for accused prolific computer hacker

- Tue, 24 Feb 2015 20:36:17 -0500

The U.S. government has announced a $3 million reward for information leading to the arrest of a man American authorities call one of the world's most prolific computer hackers. Evgeniy Bogachev, who is ...

Reddit, Google crack down on posting nude pics

- Tue, 24 Feb 2015 20:03:51 -0500

SAN FRANCISCO (AP) ? Reddit and Google are taking a tougher stance against nudity to prevent their services from turning into online peep shows.

How Google Chrome is keeping you safe from malware

- Tue, 24 Feb 2015 19:30:34 -0500

No matter how hard you work to ensure your private data stays safe,†it?s impossible to account for every potential security threat, as most recently illustrated by Lenovo?s bizarre adware catastrophe. Thankfully, there are other technology companies that consider security a priority, which is why Google?s latest Safe Browsing expansion is worth highlighting. DON?T MISS:†Not even turning off your Android phone can stop this malware from spying on you In order to protect users from downloading malicious software, Google has added an additional warning in Chrome when users visit any webpage†where attackers ?might attempt to trick you into installing programs that harm your†browsing experience.? This bold, red warning coupled with the dialog box that appears before downloading a program could save

Trial begins in high-profile Silicon Valley sex bias case

- Tue, 24 Feb 2015 19:23:08 -0500

FILE - In this April 4, 2006 file photo, Kleiner Perkins Caulfield and Byers senior partner John Doerr poses for a portrait with partner Ellen Pao outside of their office in Menlo Park, Calif. A jury is set to hear opening arguments this week in a multimillion-dollar sexual harassment lawsuit filed by Pao, currently interim chief of the news and social media site Reddit, against the prominent Silicon Valley venture capital firm. (AP Photo/Marcio Jose Sanchez, File)SAN FRANCISCO (AP) ? A lawyer for a former junior partner suing a venture capital firm in a Silicon Valley sex bias suit contended Tuesday that his client was passed over for promotions because she was a woman and then fired after she complained.


U.S. offers highest-ever reward for Russian hacker

- Tue, 24 Feb 2015 16:02:48 -0500

Handout of Russian national Evengiy Bogachev is shown in this FBI Wanted PosterBy Mark Hosenball WASHINGTON (Reuters) - The U.S. State Department and FBI on Tuesday announced a $3 million reward for information leading to the arrest or conviction of Russian national Evgeniy Bogachev, the highest bounty U.S. authorities have ever offered in a cyber case. The Federal Bureau of Investigation also issued a "Wanted" poster for Bogachev, who is charged in the United States with running a computer attack network called GameOver Zeus that allegedly stole more than $100 million from online bank accounts. Bogachev has been charged by federal authorities in Pittsburgh, Pennsylvania, with conspiracy, computer hacking, wire fraud, bank fraud and money laundering in connection with his alleged role as administrator of GameOver Zeus.


Sony taps Tom Rothman of 'Titanic' fame to head movie studio

- Tue, 24 Feb 2015 15:38:10 -0500

A logo is pictured outside Sony Pictures Studios in Culver CityBy Mary Milliken and Eric Kelsey LOS ANGELES (Reuters) - Sony Pictures Entertainment on Tuesday named veteran film executive Tom Rothman, a force behind all-time top-grossing blockbusters "Titanic" and "Avatar," to head its movie studio in a shuffle prompted by the fallout from a cyberattack. Rothman, 60, takes over for Amy Pascal, who suffered public embarrassment after hackers leaked emails she had written to other Hollywood executives. Rothman, who brings expertise in both blockbusters and art-house films, will probably push for more franchise development as he did at Fox, where he launched the "X-Men," "Planet of the Apes" and "Ice Age" movies. Rothman was known for financial discipline when he co-led Fox Filmed Entertainment from 2000-2012.


Hackers snap up Burning Man passes, leaving many ticketless

- Tue, 24 Feb 2015 13:29:50 -0500

SAN FRANCISCO (AP) ? Someone hacked into Burning Man's website and snapped up the first batch of tickets to the summer festival.

Home Depot sales beat estimates; warns on currency

- Tue, 24 Feb 2015 10:40:25 -0500

A shopping cart is seen in a Home Depot location in NilesChairman and Chief Executive Craig Menear said if the U.S. dollar stays at current levels the company expects a negative impact of $1 billion to 2015 sales growth and a hit to earnings of 6 cents a share for the year. Home Depot shares were up 3 percent at $115.67 in midmorning after rising as much as 5 percent. Earlier on Tuesday, luxury home builder Toll Brothers Inc reported a higher-than-expected quarterly profit and raised the low end of its full-year home delivery forecast as housing demand strengthened. U.S. homebuilders remain upbeat about market conditions, according to a survey by the National Association of Home Builders published last week.


NSA chief declines comment on spyware reports, says programs lawful

- Mon, 23 Feb 2015 18:14:33 -0500

National Security Agency (NSA) Director Michael Rogers testifies before a House (Select) Intelligence Committee hearingBy Warren Strobel WASHINGTON (Reuters) - The head of the National Security Agency refused to comment on Monday on reports that the U.S. government implants spyware on computer hard drives for surveillance purposes, saying "we fully comply with the law." U.S. Navy Admiral Michael Rogers was responding to reports that the NSA had embedded spyware in computers on a vast scale and that along with its British counterpart, had hacked into the world's biggest manufacturer of cellphone SIM cards. Former NSA operatives told Reuters the agency was behind the campaign. Another report, based on documents provided by former NSA contractor Edward Snowden and published by the Intercept site, said the U.S. agency and its British counterpart hacked into Gemalto, which produces SIM cards. I don't have time." Even as he declined comment on the reports of aggressive NSA operations, Rogers argued that U.S. intelligence, along with law enforcement agencies, needs the legal means to break strong encryption increasingly built into operating systems such as those of Apple or Google.


Target slices free-shipping minimum in half to $25

- Mon, 23 Feb 2015 15:30:59 -0500

Target has sliced its minimum online purchase to qualify for free shipping in half to $25 as the Internet becomes a bigger and bigger sales hub for retailers. The minimum takes aim at competitors Wal-Mart ...

Lenovo?s adware disaster is even worse than we thought

- Mon, 23 Feb 2015 14:45:21 -0500

News broke late last week that Lenovo had been shipping laptops with man-in-the-middle adware preinstalled which could hijack HTTPS traffic and†insert its own†ads onto websites that†users were visiting. This major†security threat was initially found lurking in just two pieces†of software on Lenovo?s computers, but the number rose dramatically over the weekend as Ars Technica reports security researchers discovered more applications riddled with adware. As of Sunday, at least 14†applications have been found to†use the technology which puts†users at risk. READ MORE:†Microsoft just nuked Lenovo?s adware so you hopefully don?t have to ?What all these applications have in common is that they make people less secure through their use of an easily obtained root CA , they provide little information

Connecticut taxpayer refunds delayed by fraud verification

- Mon, 23 Feb 2015 12:31:41 -0500

Some Connecticut taxpayers might receive income tax refunds a few weeks later than expected as state revenue officials verify that fraudulent returns are not being submitted. Kevin Sullivan, commissioner ...

Europol chief says more cooperation needed to counter terror

- Mon, 23 Feb 2015 12:10:54 -0500

FILE - In this Monday, Feb. 4, 2013 file photo, Europol's director Rob Wainwright answers questions during an interview in The Hague, Netherlands. Wainwright said at a meeting on Monday, Feb. 23, 2015 that intelligence and law enforcement agencies across the continent have to co-operate better to fight against the threat of terrorism. (AP Photo/Peter Dejong, File)THE HAGUE, Netherlands (AP) ? Intelligence and law enforcement agencies across the European Union have to cooperate better to fight against the threat of terrorism, the head of EU police organization Europol said Monday.


5 old-school smartphones that are still awesome to use, according to Android fans

- Mon, 23 Feb 2015 11:35:30 -0500

The life of a smartphone is typically very short and it seems like even the hottest Android phone will seem obsolete after only a year. With this in mind, members of Reddit?s Android community have put together a list of Android phones that have stood the test of time and are still great to use. We?ve listed the top results below by the number of up votes they received. DON?T MISS:†HTC One M9: New leak includes images, specs and everything else you need to know Samsung Galaxy S III The Galaxy S III is the top choice here and with good reason. This was Samsung?s breakthrough hit phone that propelled the company to the top of the Android smartphone world.

Kirk Cameron, Cameron Diaz rake in 'worst achievement' Razzies

- Sat, 21 Feb 2015 23:08:22 -0500

Cast members Diaz poses on the red carpet to promote the movie "Sex Tape" in BerlinBy Mary Milliken LOS ANGELES (Reuters) - Former child star Kirk Cameron tried "Saving Christmas," but he more likely killed a career comeback with the movie that ruled at this year's Razzies, the awards for the worst achievement in film. Cameron, 44, was declared the big winner at Saturday night's 35th Golden Raspberry Awards ceremony, taking four of the six categories in which he and his Christian family comedy "Saving Christmas" were nominated: worst picture, worst actor, worst screenplay and worst screen combo - for him and his ego.


Superfish points fingers over ad software security flaws

- Sat, 21 Feb 2015 16:55:19 -0500

FILE - In this Aug. 15, 2013 file photo, people walk past a Lenovo flagship experience store in Beijing, China. Security researchers revealed Thursday, Feb. 19, 2015, that some computers sold by China?s Lenovo, the world?s biggest PC maker, had a major security hole that would let any garden-variety hacker impersonate shopping, banking and other websites and steal users' credit card numbers and other personal data. (AP Photo/Andy Wong, File)SAN FRANCISCO (AP) ? A little-known Silicon Valley startup was caught in a firestorm of criticism this week for making software that exposed Lenovo laptop users to hackers bent on stealing personal information. But Superfish Inc. has also won praise for producing visual search technology that many see as the next big thing in online shopping.


Illinois police department paid $500 ransom to hacker

- Sat, 21 Feb 2015 15:36:25 -0500

A suburban Chicago police department paid a hacker a $500 ransom to restore access to data on a police computer that the hacker had disabled through the use of an increasingly popular type of virus. The ...

Snowden leak: NSA helped British steal cell phone codes

- Fri, 20 Feb 2015 07:31:05 -0500

In this June 6, 2013, file photo, a sign stands outside the National Security Administration (NSA) campus in Fort Meade, Md. Britain's electronic spying agency, in cooperation with the NSA, hacked into the networks of a Dutch company to steal codes that allow both governments to seamlessly eavesdrop on mobile phones worldwide, according to the documents given to journalists by Edward Snowden. (AP Photo/Patrick Semansky, File)WASHINGTON (AP) ? Britain's electronic spying agency, in cooperation with the U.S. National Security Agency, hacked into the networks of a Dutch company to steal codes that allow both governments to seamlessly eavesdrop on mobile phones worldwide, according to the documents given to journalists by Edward Snowden.


State Dept. has yet to clear its computer network of hackers: WSJ

- Thu, 19 Feb 2015 20:33:51 -0500

Three months after the U.S. State Department confirmed hackers breached its unclassified email system, the government has still not been able to evict them from the network, the Wall Street Journal reported on Thursday, citing three people familiar with the investigation. Government officials, assisted by outside contractors and the National Security Agency, have repeatedly scanned the network and taken some systems offline, the Journal reported. Each time investigators find a hacker tool and block it, the intruders tweak it slightly to attempt to sneak past defenses, the Journal reported. Two of the people said the intruders had taken State Department emails related to the crisis in Ukraine, among other things, the Journal reported.

Lenovo shipped laptops with security flaw, experts say

- Thu, 19 Feb 2015 19:11:48 -0500

SAN FRANCISCO (AP) ? If you've recently purchased a laptop computer made by Lenovo, you may want to hear this: Experts say the world's biggest computer maker shipped laptops with pre-installed software that could let hackers steal passwords or other sensitive information when you use the web to shop, pay bills or check email.

Options traders bet on growing U.S. demand for cyber security

- Thu, 19 Feb 2015 16:24:15 -0500

Photo illustration shows USB device being plugged into a laptop computer in BerlinBy Saqib Iqbal Ahmed NEW YORK (Reuters) - A barrage of damaging cyber attacks has shaken up the security industry, and traders in the options market are betting on cyber security companies benefiting from increased spending as governments and businesses boost security. Cyber security has become a major concern for U.S. firms with recent high profile data breaches reported at Sony Pictures Entertainment, Target Corp, Home Depot Inc, and most recently at health insurer Anthem Inc. Analysts see Cyber security companies FireEye Inc and CyberArk Software Ltd benefiting from increased spending on security. "Overall, call buying seems to be driving a lot of the order flow in both names as players in the options market take positions in anticipation of additional upside for shares in the days/weeks ahead," said Fred Ruffy, options strategist at WhatsTrading.com.


How Lenovo single-handedly lit its reputation on fire this week

- Thu, 19 Feb 2015 14:00:11 -0500

We?ve seen plenty of companies score†own goals over the years, but this one is still quite a doozy. PCWorld reports that security researchers recently discovered that Lenovo has been shipping its new computers with man-in-the-middle adware installed that hijacks HTTPS traffic to inject its own ads onto encrypted sites. DON?T MISS: Windows 8 vs. Windows 10 ? The biggest features Microsoft axed for its new OS While this kind of third-party ad injection is obnoxious enough, PCWorld writes that it also creates major potential security vulnerabilities for end users as well. Specifically, PCWorld says the adware ?installs a self-generated root certificate into the Windows certificate store and then resigns all SSL certificates presented by HTTPS sites with its own certificate,?

Lenovo to stop pre-installing controversial software

- Thu, 19 Feb 2015 11:34:55 -0500

File photo of Lenovo tablets and mobile phones displayed during a news conference on the company's annual results in Hong KongBy Paul Carsten BEIJING (Reuters) - China's Lenovo Group Ltd, the world's largest PC maker, said on Thursday it will no longer pre-install software that cybersecurity experts said was malicious and made devices vulnerable to hacking. Lenovo had come under fire from security researchers who said earlier on Thursday the company pre-installed a virus-like software from a company called Superfish on consumer laptops that hijacked web connections and allowed them to be spied upon.


Check Point buys Israeli cyber security firm Hyperwise

- Thu, 19 Feb 2015 08:22:42 -0500

(This February 18th story has been refiled to clarify Shlomo Kramer did not co-found Hyperwise in the last paragraph) TEL AVIV (Reuters) - Internet and network security provider Check Point Software Technologies has bought Israeli start-up Hyperwise, saying it will help it compete in the fast-growing cyber security market. Check Point said on Wednesday it paid "tens of millions of dollars" for Hyperwise, a company with roots in Israel's military intelligence and electronic espionage Unit 8200.

Lockheed sees double-digit growth in cyber business

- Wed, 18 Feb 2015 20:41:25 -0500

By Andrea Shalal WASHINGTON (Reuters) - Lockheed Martin Corp, the No. 1 provider of information technology to the U.S. government, said it expected double-digit growth in its overall cybersecurity business over the next three to five years, and even bigger gains in the commercial sector. Lockheed, also the Pentagon's biggest supplier, said it was making strong inroads in the commercial market by leveraging a dozen years of experience and intelligence gathered while guarding its own networks and those of government agencies. Chief Executive Officer Marillyn Hewson said Lockheed was providing cybersecurity services for more than 200 customers around the world in critical infrastructure areas such as the energy, oil and gas, chemical, financial services and pharmaceuticals business. Hewson told the company's annual media day that Lockheed had faced 50 "coordinated, sophisticated campaign" attacks by hackers in 2014 alone, and she expected those threats to continue growing.

BlackShades owner pleads guilty in US in malware case

- Wed, 18 Feb 2015 18:11:47 -0500

NEW YORK (AP) ? The co-creator of sophisticated BlackShades malware pleaded guilty Wednesday to a criminal charge after authorities said his product infected over a half-million computers in more than 100 countries.