Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

OSX.Trojan.Gen

- Wed, 26 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Android.Smslink

- Tue, 25 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Infostealer.Cromwi

- Tue, 25 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

PHP.Phocryp

- Tue, 25 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Android.Fakebanco

- Thu, 20 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Carberp.B

- Thu, 20 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

W32.Tofsee

- Wed, 19 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Worm.

Trojan.Spygate

- Wed, 19 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Backdoor.Zoxepong

- Wed, 19 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Infostealer.Steamilik

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen277

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen281

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen171

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen284

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen271

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen270

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen250

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen136

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen248

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen232

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen231

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen216

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen215

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen203

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen211

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen192

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen190

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen188

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen186

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen185

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen182

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen168

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MultiExt!gen1

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen113

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen167

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen102

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen166

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen149

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen146

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen141

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspPgDataRun

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen103

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen105

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen109

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen140

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen137

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen135

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen132

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen124

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen120

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen114

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen111

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen110

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspScr!gen1

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Infostealer!g2

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptolocker!g2

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Infostealer.Donx!gen6

- Tue, 18 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Backdoor.Readomesa!g1

- Sun, 16 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Infostealer.Limitail.B

- Mon, 17 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

W32.Golroted

- Mon, 17 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Worm.

Trojan.Cryptolocker.K

- Sun, 16 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Android.Stealthgenie

- Fri, 14 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.J

- Fri, 14 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptlock.J!gm

- Sat, 15 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Infostealer.Nuknuken

- Thu, 13 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2014-6332

- Thu, 13 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Downloader.Upnoda

- Wed, 12 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Backdoor.Jiripbot

- Wed, 12 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.Heuristic.130

- Wed, 5 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Android.Piddialer

- Fri, 7 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Downloader.Verpow

- Sun, 9 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Packed.Generic.469

- Mon, 10 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Android.Sandorat

- Fri, 7 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Wirelurker

- Fri, 7 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

OSX.Wirelurker

- Thu, 6 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Downloader.Upatre!gen5

- Fri, 7 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2014-7247

- Thu, 6 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomlock.AM

- Wed, 5 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Sevenser

- Wed, 5 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Infostealer.Drigo

- Wed, 5 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Backdoor.Readomesa

- Wed, 5 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Infostealer.Domingo

-

Risk Level: Very Low. Type: Trojan.

Trojan.Tracur!gen9

- Tue, 4 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomlk.AK!gm

- Tue, 4 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen144

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Sofacy

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen236

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen159

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen158

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen160

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen163

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen244

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen262

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen176

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen174

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen172

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen179

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen260

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.Poweliks!gen1

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.Betabot!gen1

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.Donx!gen1

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen8

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen240

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen101

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen285

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen127

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen196

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen13

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen104

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen235

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.KlovBot!gen1

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspLaunch!gen3

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Sofacy!gm

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

JS.Proslikefan.B!g1

- Sat, 1 Nov 2014 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Worm.

W64.Viknok.C!inf

- Sat, 1 Nov 2014 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

SONAR.Cryptdefense!g1

- Mon, 3 Nov 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

JS.Proslikefan.B

- Sat, 1 Nov 2014 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Worm.

Trojan.Ransomlock!g77

- Thu, 30 Oct 2014 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Kargatroj

- Thu, 30 Oct 2014 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Worm.

Android.Lockdroid.E

- Wed, 29 Oct 2014 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptlock.F!gm

- Tue, 28 Oct 2014 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

Massive surveillance operations possible with explicit help from telecom companies

- Wed, 26 Nov 2014 06:50:38 -0500

Massive surveillance operations possible with explicit help from telecom companiesU.S. and U.K. spy agencies including the NSA and GCHQ, respectively, have performed a variety of sophisticated spy operations, collecting massive amounts of personal data, as many Edward Snowden leaks revealed in the past year. German publication Süddeutsche Zeitung has published a new report that reveals that as far back as 2009 the GCHQ, and thus also the NSA, had massive access to submarine cable links around the globe with help from now Vodafone-owned Cable & Wireless. FROM EARLIER: The most advanced malware yet has been spying on you for years ?A joint investigation by NDR, WDR, Süddeutsche Zeitung and Channel 4 based on documents leaked by whistleblower Edward Snowden, reveals that Cable & Wireless actively shaped and provided the


Bitcoin exchange Kraken to help in Mt. Gox bankruptcy

- Wed, 26 Nov 2014 04:54:29 -0500

A bitcoin ATM machine is shown at a restaurant in San DiegoBy Teppei Kasai TOKYO (Reuters) - U.S. bitcoin exchange operator Payward Inc said on Wednesday it will work on retrieving some millions of dollars lost by Tokyo-based Mt. Gox, once the world's largest bitcoin exchange before it collapsed in bankruptcy this year. Kraken, Payward's bitcoin exchange, will assist Mt. Gox's Tokyo-court appointed trustee Nobuaki Kobayashi with investigating where the missing bitcoins are, along with eventually redistributing any found to creditors as part of a liquidation. The partnership between Payward and Mt. ...


Sony Pictures computer system down after reported hack

- Tue, 25 Nov 2014 12:56:34 -0500

Illustration file picture shows a man typing on a computer keyboard in Warsaw(Reuters) - Sony Pictures Entertainment said its computer system was down for a second day on Tuesday, following media reports of a major hacking attack aimed at the film and television studio. Before Sony Pictures' computers went dark on Monday, the screens displayed an image of a red skeleton with the phrase "Hacked By #GOP," according to the Los Angeles Times. The hackers warned the unit of Sony Corp that they had obtained "secrets" that they would leak on the Web, the newspaper reported. "We've already warned you, and this is just a beginning. ...


The holidays are almost here: These are the best smartphones you can buy

- Tue, 25 Nov 2014 12:30:19 -0500

The holidays are almost here: These are the best smartphones you can buyBack at the start of the year after Samsung unveiled the Galaxy S5, I suggested that smartphone fans might be in for another boring year in 2014. In some ways, 2014 was boring; we really didn?t see anything that introduced truly novel or revolutionary new features added to smartphones this year. But phones still progressed in 2014, growing faster, sleeker and more powerful than they have ever been before, and there were some terrific phones that launched this year. As we move into the holiday shopping season, here are the five best high-end smartphones you can buy. Motorola Droid Turbo Among the five smartphones on this list, Motorola?s Droid Turbo is the youngest. It is also the most impressive on


Home Depot faces dozens of breach-related lawsuits

- Tue, 25 Nov 2014 10:37:11 -0500

Home Depot faces at least 44 lawsuits in the United States and Canada over a massive data breach earlier this year that affected 56 million debit and credit cards.

The most advanced malware yet has been spying on you for years

- Tue, 25 Nov 2014 06:50:55 -0500

The most advanced malware yet has been spying on you for yearsSecurity researchers have discovered a highly advanced malware program, called Regin, that have been used for spying purposes for at least six years. First discovered by Symantec and confirmed by Kaspersky, the security threat is believed to be the work of a government, considering the massive resources behind it and its sophisticated features, rather than a program devised by hacker groups interested in stealing data and/or money from regular Internet users. FROM EARLIER: ?Dirtbox? planes masquerade as cell towers to collect smartphone data in sophisticated spying ops ?An advanced spying tool, Regin displays a degree of technical competence rarely seen and has been used in spying operations against governments, infrastructure operators, businesses, researchers, and private individuals,? Symantec writes. ?It is


10 Things to Know for Tuesday

- Mon, 24 Nov 2014 21:31:39 -0500

Protesters gather in front of the Ferguson Police Department before the announcement of the grand jury decision about whether to indict a Ferguson police officer in the shooting death of Michael Brown, Monday, Nov. 24, 2014, in Ferguson, Mo. A Missouri grand jury heard evidence for months as it weighed whether to indict Ferguson police Officer Darren Wilson in the Aug. 9 fatal shooting of Brown. (AP Photo/Charlie Riedel)Your daily look at late-breaking news, upcoming events and the stories that will be talked about Tuesday:


Frightening new malware targets your password manager

- Mon, 24 Nov 2014 20:00:37 -0500

Frightening new malware targets your password managerIf you thought hackers gaining access to just one of your online accounts was troublesome, you?ll be terrified to know that the next frontier might put your entire online identity at risk. IBM?s Security Intelligence reports that a new configuration of the Citadel trojan has been designed to start keylogging when specific password managers begin running on an infected user?s computer. FROM EARLIER: Scary new malware uses a Gmail trick to steal your data ?Because the configuration file instructs the malware to capture keystrokes related to widely used password management and authentication solutions, we can?t know who, exactly, is the target of the attack,? writes IBM. ?It might be an opportunistic attack, where the attackers are trying to see which type of


Unidentified country likely behind spying software

- Mon, 24 Nov 2014 18:07:56 -0500

SAN FRANCISCO (AP) ? Cyber-security researchers say they've identified a highly sophisticated computer hacking program that appears to have been used by an as-yet unidentified government to spy on banks, telecommunications companies, official agencies and other organizations around the world.

Automakers aim to drive away car computer hackers

- Mon, 24 Nov 2014 14:12:31 -0500

Chris Valasek, poses for a picture at the during the Los Angeles Auto Show on Wednesday, Nov. 19, 2014, in Los Angeles. Valasek, who helped catapult car hacking into the public eye when he and a partner revealed last year they had been able to control a 2010 Toyota Prius and 2010 Ford Escape by plugging into a port used by mechanics. (AP Photo/Chris Carlson)LOS ANGELES (AP) ? Against the team of hackers, the poor car stood no chance.


Fort Drum powered by wood in renewable energy push

- Sun, 23 Nov 2014 12:10:58 -0500

This Nov. 12, 2014 photo shows a view from the roof of the ReEnergy biomass power plant, overlooking wood chip piles and conveyors, at Fort Drum, N.Y. The biomass power plant is part of a military-wide initiative to put green energy systems on installations nationwide. The ReEnergy plant supplies 100 percent of Fort Drum?s electricity by burning waste wood from logging operations mixed with shredded tires. (AP Photo/Mary Esch)FORT DRUM, N.Y. (AP) ? Bulldozers rumble up and down steaming mountains of wood chips 24 hours a day, stoking the boilers that provide electricity to all 168 square miles of Fort Drum, home of the Army's 10th Mountain Division.


Computer spying malware uncovered with 'stealth' features: Symantec

- Sun, 23 Nov 2014 12:07:54 -0500

How Overstock.com protects online customer data(Reuters) - An advanced malicious software application has been uncovered that since 2008 was used to spy on private companies, governments, research institutes and individuals in 10 countries, anti virus software maker Symantec Corp said in a report on Sunday. The Mountain View, California-based maker of Norton anti virus products said its research showed that a "nation state" was likely the developer of the malware called Regin, or Backdoor. Regin, but Symantec did not identify any countries or victims. ...


NYC man gets prison for role in cybercrime ring

- Fri, 21 Nov 2014 16:10:07 -0500

A New York City man was sentenced Friday to more than three years in prison for his role in an international cybercrime ring that prosecutors say hacked into the computers of more than a dozen financial ...

Here?s who is tracking your smartphone ? and how to stop them

- Fri, 21 Nov 2014 14:20:08 -0500

Here?s who is tracking your smartphone ? and how to stop themOne of the problems with smartphones is that spy agencies and advertisers can use them to collect data and keep tabs on users, as many reports have shown in the last 18 months. While companies such as Apple and Google have started encrypting iPhone and Android devices by default, prompting the U.S. government to heavily criticize their encryption practices, that doesn?t mean smartphones are now free from spying. FROM EARLIER: Why the government keeps telling you iPhone encryption will eventually kill a child Those of you who want to take additional steps to protect your data should check out WhoIsHostingThis? massive infographic that reveals more details covering who can spy on your handset, how it?s done and what steps can be taken to


Brooklyn man sentenced for role in cybercrime ring

- Fri, 21 Nov 2014 14:10:00 -0500

A New York City man has been sentenced to about 3 1/2 years in prison for his role in an international cybercrime ring that hacked into the computers of more than a dozen financial institutions and the ...

Latest Google Maps update brings awesome new features to Android

- Fri, 21 Nov 2014 13:10:55 -0500

Latest Google Maps update brings awesome new features to AndroidGoogle has a new Google Maps version out, Android Police reports, which brings some neat new features to this popular Google service. Google Maps 9.1 for Android ? available for immediate download by following the source link, in case it hasn?t been already rolled out to your device ? will be even more useful when planning trips or when looking for certain locations. FROM EARLIER: Here?s an awesome new Google Maps trick everyone should know The application will now show more details about a destination or a place you?re looking for, including weather information and fun facts about various locations, as seen in the image above. Additionally, the publication says that Google Maps will respond to users? spoken requests to either show or


Complex Android malware believed to have infected up to 4.5M smartphones in the U.S.

- Fri, 21 Nov 2014 06:50:00 -0500

Dirt-cheap Android tablets from Best Buy, Walmart, elsewhere found to ship with major security flawsAs many as 4.5 million American Android smartphone users may have been fooled into somehow downloading a complex malicious program on their devices since January 2013, The New Yok Times reports, citing security company Lookout. FROM EARLIER: FTC cracks down on massive ?PC cleaner? security scam Called ?NotCompatible,? the malware has reached its third version, which is even more sophisticated than predecessors ? Lookout said about it that it ?has set a new bar for mobile malware sophistication and operational complexity.? In order to ultimately infect smartphones, hackers have used various techniques, such as infecting legitimate sites with malicious code that?s automatically downloaded when a user visits that site from an Android phone, or by sending spam messages that offer fake


U.S. accuses China of cyber spying on American companies

- Thu, 20 Nov 2014 18:10:00 -0500

(This version of the May 19th. story corrects sixth paragraph to show that not all victims had filed trade cases) (Reuters)- The United States on Monday charged five Chinese military officers and accused them of hacking into American nuclear, metal and solar companies to steal trade secrets, ratcheting up tensions between the two world powers over cyber espionage. China immediately denied the charges, saying in a strongly worded Foreign Ministry statement the U.S. grand jury indictment was "made up" and would damage trust between the two nations. ...

U.S. Congress urged to consider sanctions on Chinese cyber-spies

- Thu, 20 Nov 2014 17:45:12 -0500

A map of China is seen through a magnifying glass on a computer screen showing binary digits in SingaporeWASHINGTON (Reuters) - U.S. lawmakers should look into options for punishing cyber-spying and the theft of trade secrets from U.S. companies, a congressional advisory committee on China said on Thursday. Congress should ask U.S. trade officials to report on whether they had power to sanction companies that benefited from stealing trade secrets, the U.S.-China Economic and Security Review Commission said in its annual report to Congress. ...


Critics storm Poland's electoral body over delays

- Thu, 20 Nov 2014 17:41:34 -0500

Police officers block the entrance to the National Electoral Office as a man wearing a mask stands behind, in Warsaw, Poland, Thursday, Nov. 20, 2014. Earlier a group of right wing activists entered the building and began to occupy it demanding the members of the National Electoral Office to resign. Prosecutors are investigating a hacking attack on the website of Poland's voting commission, while a top official has resigned over irregularities that are delaying the vote count in recent local elections. (AP Photo/Alik Keplicz)WARSAW, Poland (AP) ? Dozens of protesters stormed Poland's main voting commission and occupied the building Thursday night, angry over the delay in the vote count for recent local elections.


NSA director: China can damage US power grid

- Thu, 20 Nov 2014 11:24:09 -0500

WASHINGTON (AP) ? China and "one or two" other countries are capable of mounting cyberattacks that would shut down the electric grid and other critical systems in parts of the United States, according to Adm. Michael Rogers, director of the National Security Agency and head of U.S. Cyber Command.

FTC cracks down on massive ?PC cleaner? security scam

- Thu, 20 Nov 2014 07:00:35 -0500

FTC cracks down on massive ?PC cleaner? security scamThe Federal Trade Commission and the State of Florida on Wednesday announced plans on fighting a type of online scam that cons unsuspecting PC users into paying up to hundreds of dollars for alleged security protection for their computers, which turns out to be fake software supposed to fix inexistent malware threats. Such businesses have fooled many individuals and companies into paying over $120 million for Internet security. FROM EARLIER: Hackers breach State Department?s unclassified computer network Services like PC Cleaner, PC Vitalware or OMG Tech Help are among the ?elaborate scams,? as GigaOm calls them, that are targeted by the FTC?s investigation. The scams have a certain pattern. First, such security companies convince users to install inexpensive software on their machines,


Sephora discriminated against Asian customers, lawsuit claims

- Wed, 19 Nov 2014 12:49:39 -0500

A woman walks with a Sephora shopping bag as she leaves a Sephora store in ParisBy Daniel Wiessner (Reuters) - Cosmetics retailer Sephora USA Inc has blocked the online accounts of scores of customers with Asian names because it suspected them of buying discount items in bulk to resell them, a new lawsuit claims. The proposed class action was filed Tuesday in federal court in Manhattan by four U.S. women of Chinese descent who say their accounts were deactivated earlier this month because they have Asian surnames. The suit stems from a Nov. 6 promotional sale that caused Sephora's website to crash. ...


Hackers to probe cyber crime defences at British banks

- Wed, 19 Nov 2014 09:59:29 -0500

secoA man travels in a double-decker bus as it passes the Bank of England in central LondonBy Steve Slater and Matt Scuffham LONDON (Reuters) - In the next few months hackers will try to penetrate the cyber defences of Britain's major banks and steal information about millions of customers. But for once they'll be welcome. Banks are on red alert after cyber criminals obtained details of 83 million clients from JPMorgan Chase this year and Britain's leading lenders have signed up for tests that let teams of certified hackers attack at will. The cyber war games will mark a major escalation in how banks test defences in a high-stakes battle with criminals. ...


Hackers to probe cyber crime defenses at British banks

- Wed, 19 Nov 2014 09:56:13 -0500

By Steve Slater and Matt Scuffham LONDON (Reuters) - In the next few months hackers will try to penetrate the cyber defenses of Britain's major banks and steal information about millions of customers. But for once they'll be welcome. Banks are on red alert after cyber criminals obtained details of 83 million clients from JPMorgan Chase this year and Britain's leading lenders have signed up for tests that let teams of certified hackers attack at will. The cyber war games will mark a major escalation in how banks test defenses in a high-stakes battle with criminals. ...

Polish election commission website hacked

- Wed, 19 Nov 2014 07:44:38 -0500

A woman casts her ballot during the first round of Polish local elections, in Warsaw, Poland, Sunday, Nov. 16, 2014. The voting is considered a test for the main parties ahead of the parliamentary elections next year. Some 30 million voters are eligible to choose nearly 47,000 councilors and 2,500 local administration leaders on Sunday, but observers are concerned about the possibility of a low turnout. Opinion polls gave a narrow lead to the governing pro-business Civic Platform party, over the nationalist opposition Law and Justice. (AP Photo/Czarek Sokolowski)WARSAW, Poland (AP) ? Computer hackers have attacked the website of Poland's electoral commission, which is still unable to publish full returns from local elections because of an unrelated computer glitch, officials said Wednesday.


Ethiopia says China's ZTE could lose part of $800 mln in row over terms

- Wed, 19 Nov 2014 01:53:16 -0500

By Aaron Maasho PARIS (Reuters) - Ethiopia has told Chinese telecoms firm ZTE Corp it risked losing part of its deal worth $800 million to expand the nation's network because of differences over costs of upgrading existing systems, an Ethiopian minister and executive said. The deal last year with monopoly state-run operator Ethio Telecom was part of a $1.6 billion package, split between ZTE and another Chinese firm Huawei Technologies Co Ltd . The African nation of more than 90 million people wants to double mobile subscribers to 50 million in 2015 and expand its 3G service. ...

Top German spy says Berlin under cyber attack from other states

- Tue, 18 Nov 2014 14:07:20 -0500

Maassen attends a ceremony marking the 10th anniversary of the Joint Counter-Terrorism Centre in BerlinBERLIN (Reuters) - German government and business computers are coming under increasing cyber attack every day from other states' spy agencies, especially those of Russia and China, Germany's domestic intelligence (BfV) chief said on Tuesday. Addressing a cybersecurity conference in Berlin, Hans Georg Maassen said that of an estimated 3,000 daily attacks by hackers or criminals on German government systems, around five were the handiwork of intelligence services. The latter are so sophisticated that they can easily be overlooked, he added. ...


The U.S. Government Is Under (Cyber) Attack

- Mon, 17 Nov 2014 15:45:50 -0500

The U.S. Government Is Under (Cyber) AttackThe State Department on Monday joined the White House and two other federal agencies in confirming that it had been the victim of a recent and successful cyberattack. Spokesman Jeff Rathke told reporters at Foggy Bottom that officials "detected activity of concern" several weeks ago targeting its unclassified email system and that it used a "scheduled outage" to address the problem this past weekend.


Hackers breach State Department?s unclassified computer network

- Mon, 17 Nov 2014 06:50:37 -0500

Dirt-cheap Android tablets from Best Buy, Walmart, elsewhere found to ship with major security flawsHackers breached computers belonging to the State Department, The New York Times reports, making it the fourth attack targeting government computers in recent weeks. While it?s not clear who attacked these targets and for what purpose, the State Department, the White House, the United States Postal Service and the National Oceanic and Atmospheric Administration have all reported similar breaches recently. FROM EARLIER: Mysterious cyber attack breaches White House computer network It?s not known at this time whether any of these attacks are linked, but so far it looks like they haven?t done any real damage, as hackers may have been simply probing these systems to understand what kind of data is accessible. ?This has impacted some of our unclassified email


?Dirtbox? planes masquerade as cell towers to collect smartphone data in sophisticated spying ops

- Fri, 14 Nov 2014 21:15:08 -0500

?Dirtbox? planes masquerade as cell towers to collect smartphone data in sophisticated spying opsIt?s no secret anymore that governmental agencies in the U.S. and other countries have access to sophisticated tools that allow them to track and collect data from smartphones and other devices without users knowing anything is happening, and The Wall Street Journal has uncovered yet another such operation which uses a special ?dirtbox? technology installed in special planes that can mimic cell phone towers and fool smartphones into believing they?re connecting to a genuine carrier tower. FROM EARLIER: Sophisticated malware already spying on Hong Kong protesters? iOS and Android phones In the process, the tool will collect unique identifiers about those devices, in order to track certain suspects without requiring any help from carriers. In addition to personal data related


Correction: Security Clearance-Hacking story

- Fri, 14 Nov 2014 11:28:16 -0500

WASHINGTON (AP) ? In a story Nov. 13 about former Department of Homeland Security official Christopher Cummiskey's remarks about a computer breach at U.S. Investigations Services LLC, The Associated Press reported erroneously that Cummiskey said a DHS contract with the firm specified rigorous computer security and data-management practices. Cummiskey said the contract did not specify those requirements.

Apple says iOS 8 ?Masque Attack? has not affected a single person yet

- Fri, 14 Nov 2014 07:45:33 -0500

Deja vu: New report says the iPhone 6s might have a special kind of glass cover next yearAfter researchers have uncovered a serious iOS 8 flaw that lets hackers substitute legitimate apps installed on an iPhone with malware apps meant to steal user data, prompting the U.S. government to issue a warning on the matter, Apple has commented on this type of attacked ? dubbed ?Masque Attack? ? telling iMore the problem has not affected iOS users yet. FROM EARLIER: Terrifying iOS 8 security flaw has forced the U.S. government to issue a warning ?We designed OS X and iOS with built-in security safeguards to help protect customers and warn them before installing potentially malicious software,? an Apple spokesperson said. ?We?re not aware of any customers that have actually been affected by this attack. We encourage customers


Nokia lifts long-term profitability target

- Fri, 14 Nov 2014 03:50:40 -0500

The flagship store of Finnish mobile phone manufacturer Nokia is pictured in HelsinkiHELSINKI (Reuters) - Finnish telecoms equipment maker Nokia on Friday lifted its long-term profitability target after meeting strong demand for faster 4G networks this year, and said it also expected the business to grow in 2015. The company, which ranks third in the global network-equipment market after Ericsson and Huawei Technologies, said it now targets long-term networks operating margin in the range of 8 and 11 percent, compared to its previous target of 5 to 10 percent. Analysts had widely expected an increase as Nokia last month reported a margin of 11. ...


U.S. government warns on bug in Apple's iOS software

- Thu, 13 Nov 2014 22:36:51 -0500

A customer holds an iPhone 6 and iPhone 6 Plus after the phones went on sale at the Fifth Avenue Apple store in Manhattan, New York(Reuters) - The U.S. government warned iPhone and iPad users on Thursday to be on the alert for hackers who may exploit a vulnerability in Apple Inc's iOS operating system that would enable them to steal sensitive data. There was the potential for hacks using a newly identified technique known as the "Masque Attack," the government said in an online bulletin from the National Cybersecurity and Communications Integration Center and the U.S. Computer Emergency Readiness Teams. ...


GAO: Oversight needed of Native American schools

- Thu, 13 Nov 2014 19:49:39 -0500

WASHINGTON (AP) ? Federally run schools for Native American children have misspent millions of dollars and in one case $1.7 million was illegally transferred to an offshore account, an apparent result of hacking, a government watchdog said Thursday in a report sharply criticizing fiscal oversight of the schools.

Automakers agree on measures to secure data generated by cars

- Thu, 13 Nov 2014 16:57:13 -0500

By Jim Finkle BOSTON (Reuters) - Two U.S.-based groups representing some of the world's biggest automakers have agreed on privacy standards for securing vast quantities of data generated by the dozens of tiny computers and tracking systems used in modern vehicles. "Automakers pledge to provide protections for sensitive information that goes beyond similar principles in other industry sectors," Mitch Bainwol, chief executive officer of the Alliance of Automobile Manufacturers, said in a statement. ...

Tenn. sheriff pays ransom for case files

- Thu, 13 Nov 2014 12:29:41 -0500

DICKSON, Tenn. (AP) ? The Dickson County Sheriff's Office in Middle Tennessee ended up paying a ransom after a malicious computer program blocked access to their files.

US confirms climate agency websites hacked

- Wed, 12 Nov 2014 18:43:32 -0500

Hackers from China were able to breach government computer systems at the agency that oversees the National Weather Service, according to the chairman of a Congressional subcommittee that oversees the ...

China Has Now Assumed Great Power Status

- Wed, 12 Nov 2014 15:07:34 -0500

China Has Now Assumed Great Power StatusFor several years, China's role in international politics has been that of an overgrown teenager: large and powerful, but clumsy and developing. And no issue exemplified this role more than in the environment. No country in the world emits more carbon dioxide than China, which surpassed the United States in 2007. But China has long claimed that because it bore less responsibility for overall carbon emissions than did the West, it was unfair to ask China to accept any reductions in emissions.


 

Twitter / SecureMac

http://twitter.com/SecureMac

SecureMac: MacScan 2.9.3 with Google Chrome & SeaMonkey Support Released for Macs #privacy #security #mac - http://t.co/wCy0sddR

- Fri, 18 May 2012 14:52:24 +0000

SecureMac: MacScan 2.9.3 with Google Chrome & SeaMonkey Support Released for Macs #privacy #security #mac - http://t.co/wCy0sddR

SecureMac: Proud @MacworldUK and @MacworldAU reviewed @PrivacyScan and gave it 5/5 stars & an Editor's Choice award! http://t.co/ew6Wjj67

- Thu, 05 Apr 2012 01:30:08 +0000

SecureMac: Proud @MacworldUK and @MacworldAU reviewed @PrivacyScan and gave it 5/5 stars & an Editor's Choice award! http://t.co/ew6Wjj67

SecureMac: Researching new piece of Mac #malware that is currently in the wild infecting computers running OS X. http://t.co/38RsQVAQ

- Tue, 20 Mar 2012 06:00:04 +0000

SecureMac: Researching new piece of Mac #malware that is currently in the wild infecting computers running OS X. http://t.co/38RsQVAQ

SecureMac: SecureMac is honored ~ @MacworldUK has awarded @PrivacyScan as Best of Show for Macworld | iWorld this year. http://t.co/bBqaCH7F

- Fri, 16 Mar 2012 20:18:06 +0000

SecureMac: SecureMac is honored ~ @MacworldUK has awarded @PrivacyScan as Best of Show for Macworld | iWorld this year. http://t.co/bBqaCH7F

SecureMac: Attention Developers, @SecureMac is hiring Cocoa Developers. http://t.co/F4Give2s #jobs #dev #hiring

- Tue, 13 Mar 2012 18:52:23 +0000

SecureMac: Attention Developers, @SecureMac is hiring Cocoa Developers. http://t.co/F4Give2s #jobs #dev #hiring

SecureMac: SecureMac is hiring more Mac Cocoa Developers. See requirements & submit resume! #jobs #macjobs http://t.co/LOfi5e5T

- Mon, 05 Mar 2012 21:06:20 +0000

SecureMac: SecureMac is hiring more Mac Cocoa Developers. See requirements & submit resume! #jobs #macjobs http://t.co/LOfi5e5T

SecureMac: Read how Google's accused of Bypassing Safari's Privacy Controls http://t.co/1KyOlzbH Another Reason for @MacScan @PrivacyScan

- Fri, 17 Feb 2012 16:55:34 +0000

SecureMac: Read how Google's accused of Bypassing Safari's Privacy Controls http://t.co/1KyOlzbH Another Reason for @MacScan @PrivacyScan

SecureMac: PrivacyScan 1.0.1 has been released and is available on the Mac App Store adding bug fixes still 4.99! http://t.co/8fV15Tm7

- Wed, 08 Feb 2012 05:58:53 +0000

SecureMac: PrivacyScan 1.0.1 has been released and is available on the Mac App Store adding bug fixes still 4.99! http://t.co/8fV15Tm7

SecureMac: With the launch of @PrivacyScan in the Mac App Store we're #1 in utilities and ranking in top 10 paid overall. Day 1 http://t.co/Chc4IZDE

- Fri, 27 Jan 2012 02:19:15 +0000

SecureMac: With the launch of @PrivacyScan in the Mac App Store we're #1 in utilities and ranking in top 10 paid overall. Day 1 http://t.co/Chc4IZDE

SecureMac: @fakemacfusion Are you on the macworld press list? Let me know your email to get you off the PR list.

- Thu, 26 Jan 2012 16:06:39 +0000

SecureMac: @fakemacfusion Are you on the macworld press list? Let me know your email to get you off the PR list.

SecureMac: SecureMac staff will be on the Macworld show floor today at booth #442 talking security and demonstrating @PrivacyScan & @MacScan

- Thu, 26 Jan 2012 16:04:23 +0000

SecureMac: SecureMac staff will be on the Macworld show floor today at booth #442 talking security and demonstrating @PrivacyScan & @MacScan

SecureMac: PrivacyScan is now live on the Mac App Store! Check it out and give us your feedback! http://t.co/4W4y8ztO

- Wed, 25 Jan 2012 16:54:46 +0000

SecureMac: PrivacyScan is now live on the Mac App Store! Check it out and give us your feedback! http://t.co/4W4y8ztO

SecureMac: Need an Free/Discounted Expo Hall Pass to @Macworldexpo ? Get em while they last! http://t.co/gHP8PaZe #macworld

- Thu, 19 Jan 2012 20:39:49 +0000

SecureMac: Need an Free/Discounted Expo Hall Pass to @Macworldexpo ? Get em while they last! http://t.co/gHP8PaZe #macworld

SecureMac: We're going to be at @macworldexpo booth #442! Be sure to stop by and learn about the latest products!

- Wed, 18 Jan 2012 22:30:24 +0000

SecureMac: We're going to be at @macworldexpo booth #442! Be sure to stop by and learn about the latest products!

SecureMac: Getting ready for #macworld ~ booth 442. Be sure to follow us if you're still looking for a free expo hall pass, and watch for link.

- Fri, 06 Jan 2012 19:20:40 +0000

SecureMac: Getting ready for #macworld ~ booth 442. Be sure to follow us if you're still looking for a free expo hall pass, and watch for link.

SecureMac: Start off your New Year by changing your passwords. How long has it been? #macsecurity

- Wed, 04 Jan 2012 17:03:38 +0000

SecureMac: Start off your New Year by changing your passwords. How long has it been? #macsecurity

SecureMac: @ken_gok email macsec@securemac.com with as much info as you have on what you downloaded including links and we can check it out!

- Fri, 23 Dec 2011 15:50:24 +0000

SecureMac: @ken_gok email macsec@securemac.com with as much info as you have on what you downloaded including links and we can check it out!

SecureMac: MacScan 2.9.2 Released! Celebrate with us and download a free 30-day trial or upgrade your app! http://t.co/xr3NJoQk

- Tue, 20 Dec 2011 17:09:59 +0000

SecureMac: MacScan 2.9.2 Released! Celebrate with us and download a free 30-day trial or upgrade your app! http://t.co/xr3NJoQk

SecureMac: Love Cyber Monday? Get the http://t.co/G8EB7cwc software bundle for 49.99! First 10k people get MacScan!

- Mon, 28 Nov 2011 17:23:17 +0000

SecureMac: Love Cyber Monday? Get the http://t.co/G8EB7cwc software bundle for 49.99! First 10k people get MacScan!

SecureMac: RT @macscan: 1 Day Only - Black Friday Sale ~ MacScan 80% OFF Use Coupon Code CYBERSALE11 - http://t.co/AtD091ty

- Fri, 25 Nov 2011 05:08:17 +0000

SecureMac: RT @macscan: 1 Day Only - Black Friday Sale ~ MacScan 80% OFF Use Coupon Code CYBERSALE11 - http://t.co/AtD091ty