IANS Blog RSS Feed

http://www.iansresearch.com

Study: Many Companies Do Nothing to Secure Their Mobile Apps

- Tue, 24 Mar 2015 00:00:00 GMT

Recent reports have shown that employees across businesses have thousands of unsafe applications installed on their phones, while the threat of bugs like Heartbleed only continues to expand. Despite these risks, however, a new study found that most companies aren?t doing much ? if anything ? to improve the security of their own apps.

Target to Pay $10 Million in Data Breach Settlement

- Thu, 19 Mar 2015 00:00:00 GMT

The massive Target data breach that came to light in late 2013 just got a bit more costly for the retail giant. The company has agreed to pay $10 million to settle a class-action lawsuit with victims of the attack.

DARPA-Backed Tool Mimics Humans, Uncovers Security Flaws in Software Code

- Wed, 18 Mar 2015 00:00:00 GMT

Recently, it?s seemed as if major software flaws have been a dime a dozen, with Heartbleed, Ghost and now FREAK among the most prominent. A new tool designed by a Cambridge, Mass. laboratory and funded by the Defense Advanced Research Projects Agency (DARPA), however, aims to combat these flaws by exposing and fixing them before they are released.

Security Professionals in Short Supply as Demand Skyrockets

- Fri, 13 Mar 2015 00:00:00 GMT

With security breaches becoming more and more prominent (and highly publicized), the shortage of security professionals is more apparent than ever.

Report: Thousands of Unsafe Apps Installed on Employee Devices

- Thu, 12 Mar 2015 00:00:00 GMT

Mobile device management remains a huge priority for businesses today. A new report from an application security company shows exactly why.

FREAK Update: Microsoft Confirms Bug Affects Windows

- Fri, 06 Mar 2015 00:00:00 GMT

FREAK just got a whole lot scarier. Microsoft has confirmed that Windows and its Internet Explorer (IE) browser are also vulnerable to the recently detected encryption bug, marking a shift from initial reports that only Apple?s iOS and OS X, and Google?s Android OS were affected.

Experts: FREAK Security Flaw Undermines SSL, TSL Encryption

- Wed, 04 Mar 2015 00:00:00 GMT

A significant, wide-ranging security vulnerability that?s gone undetected for decades allows hackers to intercept encrypted data flowing across the Web, experts say.

Uber Data Breach May Affect Thousands of Drivers

- Mon, 02 Mar 2015 00:00:00 GMT

Add Uber to the growing list of companies impacted by significant breaches in the past few years. The ride-hailing service announced late last week that the personal information of up to 50,000 drivers may have been accessed by an unauthorized third party in a database breach last year.†

Anthem: Breach Could Include Millions of Non-Customers

- Wed, 25 Feb 2015 00:00:00 GMT

The more information that trickles out about the Anthem cyberbreach, the worse it looks. The health insurance provider said this week that between 8.8 million and 18.8 million non-customers may have been affected by the attack.

Report: US, UK Hacked SIM Card Maker to Spy on Mobiles

- Fri, 20 Feb 2015 00:00:00 GMT

Is the NSA spying on your mobile calls? According to a new report, one of the world?s largest manufacturers of mobile SIM cards fell victim to a hack by U.S. and U.K. intelligence agencies that successfully stole encryption codes and enabled them to eavesdrop on mobile voice and data calls made by mobile users in 85 countries.

Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

JS.Downloader!gen1

- Wed, 25 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Wofeksad

- Tue, 24 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Infostealer.Dyre!gm

- Tue, 24 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Downloader.Eitenckay

- Tue, 24 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

SONAR.SuspTempRun2

- Tue, 24 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen19

- Tue, 24 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Zbot!gen6

- Tue, 24 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Worm.

Android.Lockscreen

- Mon, 23 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Miuref.B

- Tue, 24 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.R

- Fri, 20 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Bloodhound.Flash.30

- Sat, 21 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-0336

- Sat, 21 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Dogarat

- Thu, 19 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Infostealer.Posfind

- Fri, 20 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Inflabot

- Wed, 18 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Navedri

- Wed, 18 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Dino

- Tue, 17 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Seadask

- Tue, 17 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Boscan

- Tue, 17 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Cozer!gen4

- Tue, 17 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Mdropper!gen3

- Tue, 17 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Wifaper

- Tue, 17 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Bezigate

- Tue, 17 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Solimba!gen1

- Thu, 12 Mar 2015 00:00:00 -0700

Risk Level: Very Low.

Exp.CVE-2015-0097

- Wed, 11 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Bloodhound.RTF.3

- Wed, 11 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Mapafes

- Wed, 11 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Gotalon

- Tue, 10 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Packed.Generic.484

- Tue, 10 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

W32.Tempedreve.E!inf

- Tue, 10 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Virus, Worm.

Trojan.Ransomcrypt.Q

- Tue, 10 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Buenosearch

- Mon, 9 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Downloader.Substrate

- Mon, 9 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Infostealer.Poscra

- Mon, 9 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen20

- Mon, 9 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SusTraffic!gen3

- Mon, 9 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen15

- Mon, 9 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Infostealer.Logpos

- Mon, 9 Mar 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Evilbunny

- Sun, 8 Mar 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Nbot

- Fri, 6 Mar 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Craspe

- Sat, 7 Mar 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptlock.H!gm

- Fri, 6 Mar 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

W32.Faedevour!gen1

- Fri, 6 Mar 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Worm.

Trojan.Cozer!gen3

- Sat, 7 Mar 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Denpur

- Sat, 7 Mar 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Cozer!gen1

- Thu, 5 Mar 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Cozer!gen2

- Thu, 5 Mar 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Boot.Dididix.B

- Thu, 5 Mar 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-0314

- Wed, 4 Mar 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-0330

- Wed, 4 Mar 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Cozer

- Wed, 4 Mar 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Android.Gazon

- Tue, 3 Mar 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Worm.

Trojan.Cryptdef!gen9

- Tue, 3 Mar 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptdef!gen10

- Tue, 3 Mar 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptdef!gen8

- Mon, 2 Mar 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Packed.Generic.482

- Mon, 2 Mar 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Downloader.Busadom!g1

- Fri, 27 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Infostealer.Predapan

- Fri, 27 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Worm.

Backdoor.Korplug.C

- Fri, 27 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Backdoor.Korplug.C!gm

- Fri, 27 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.N

- Sun, 1 Mar 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Downloader.Busadom

- Thu, 26 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Ladocosm

- Thu, 26 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Infostealer.Posteal

- Thu, 26 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspHelpRun

- Tue, 24 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

Report calls for improvements at FBI to combat terror

- Wed, 25 Mar 2015 21:10:30 -0400

FBI Director James Comey arrives to on Capitol Hill in Washington, Wednesday, March 25, 2015, testify before a House Appropriations subcommittee on Commerce, Justice, Science, and Related Agencies Budget hearing on the FBI budget. (AP Photo/Andrew Harnik)WASHINGTON (AP) ? The FBI must work speed up its efforts to confront increasingly sophisticated terrorists and improve its ability to gather intelligence on global threats to the nation's security, according to an outside review released Wednesday.


FBI needs better intelligence, information sharing: U.S. report

- Wed, 25 Mar 2015 15:28:22 -0400

Commissioner Roemer speaks during a news conference on the release of the 9/11 Review Commission report in WashingtonBy Doina Chiacu and Julia Edwards WASHINGTON (Reuters) - The FBI needs to strengthen its intelligence programs and information sharing to counter the diverse and fast-moving national threats that have evolved since the Sept. 11, 2001, attacks, a congressional commission said on Wednesday. The 9/11 Review Commission report also said the Federal Bureau of Investigation's progress in developing key intelligence programs, analysis and human intelligence collection lags its law enforcement capabilities. "Their message is: You've done great, it's not good enough," FBI Director James Comey said on Wednesday.


China's Huawei given clean bill of health by UK security board

- Wed, 25 Mar 2015 12:59:35 -0400

Journalists attend the presentation of the Huawei's new smartphone, the Ascend P7, launched by China's Huawei Technologies in ParisChina's Huawei Technologies Co Ltd [HWT.UL], the telecoms equipment company whose products are now integral to various mobile and fixed-line networks, poses no threat to Britain's national security, a board established to monitor the company's operations said. The world's second largest telecoms equipment maker set up an independent cyber security evaluation center in Oxford in 2010 in conjunction with the government to check whether its equipment could pose a threat to national security. British lawmakers said in 2013 that Huawei, which was founded by Ren Zhengfei, a former People's Liberation Army officer, should have been scrutinized more closely by ministers before it signed its first major deal with BT. "Any risks to UK national security from Huawei's involvement in the UK's critical networks have been sufficiently mitigated," it said.


China's ZTE 2014 profit almost doubles on smartphones, 4G roll-out

- Wed, 25 Mar 2015 09:29:23 -0400

File photo of visitors attending the ZTE stand at the Mobile World Congress in BarcelonaHONG KONG (Reuters) - Chinese telecom equipment maker ZTE Corp posted a 94 percent rise in 2014 net profit on Wednesday, in line with its own forecast, due to strength in its smartphone business overseas and high-speed 4G network division at home. The Shenzhen-based company recorded profit of 2.63 billion yuan ($423.4 million) from 1.36 billion yuan a year earlier, in line with the company's forecast of 2.6 billion yuan. Operating revenue rose 8.3 percent to 81.4 billion yuan. ...


U.S. urges companies to do more to fight cyber crime

- Wed, 25 Mar 2015 07:16:54 -0400

Illustration file picture shows a man typing on a computer keyboard in WarsawBy Huw Jones LONDON (Reuters) - Cyber crime is probably the biggest risk facing companies across the world, and they need to do more to help governments tackle the problem, U.S. Deputy Treasury Secretary Sarah Bloom Raskin said on Wednesday. "Each of us must recognize this risk is perhaps the most pressing operational risk of our time," she told the CityWeek conference in London. Financial services firms were making substantial investments in reinforcing their resilience to cyber attacks but they needed to embed this resilience into their existing business units rather than grafting improvements on top of them, she said. Cyber threats undermined freedom of expression and hampered global economic recovery, and governments needed to ensure international legal principles that respect state sovereignty and human rights apply to conduct online as well as offline, Raskin said.


Multistate investigation announced into Premera cyberattack

- Tue, 24 Mar 2015 19:47:19 -0400

Washington state's insurance commissioner announced Tuesday a multistate investigation into this winter's cyberattack on Premera Blue Cross. Insurance Commissioner Mike Kreidler said he plans to work with ...

U.S. Joint Chiefs drafting military cyber standards: arms tester

- Tue, 24 Mar 2015 15:03:21 -0400

By Andrea Shalal WASHINGTON (Reuters) - The chief U.S. weapons tester said on Tuesday he was working with the Joint Chiefs of Staff to draft military requirements to address widespread cyber vulnerabilities in nearly every arms program and military command. An announcement is expected soon from the Joint Chiefs, who oversee and set requirements for all military weapons purchases, said Michael Gilmore, the Pentagon's director of operational test and evaluation. Gilmore said the office of Navy Admiral James Winnefeld, vice chairman of the Joint Chiefs, has made "a lot of progress" on developing a "sensible and measurable" joint military requirement for cybersecurity.

Why people are wrong about the world needing an Android that Google can?t control

- Tue, 24 Mar 2015 13:41:41 -0400

Ahhhhh! Save yourselves! Google is evil! We hear it time and time again; people erupting with concern over Google?s ?evil? policies that play it fast and loose with our privacy. And who complains about Google and its evil policies more frequently and much louder than anyone else? Why, it?s Google?s competitors, of course. Case in point: A new blog post published by one of Cyanogen?s investors on Monday. DON?T MISS:†Galaxy S6 and iPhone 6 Plus face off in the ultimate camera shootout For those unaware, Cyanogen is a company started by a bunch of Android hackers ? that?s ?hackers? in the good sense, not malicious hackers ? who were out to offer users a more customizable version of Android. They

House unveils cyber bill and signals bipartisan compromise

- Tue, 24 Mar 2015 13:29:03 -0400

WASHINGTON (AP) ? House intelligence committee leaders unveiled a bipartisan cybersecurity bill Tuesday amid signs of broad agreement on long-sought legislation that would allow private companies to share with the government details of how they are hacked, without fear of being sued.

IT security firm NCC buys UK rival Accumuli to boost capabilities

- Tue, 24 Mar 2015 06:14:55 -0400

(Reuters) - British IT security firm NCC Group said it had agreed to buy rival Accumuli to bolster its capabilities in round-the-clock operational support and incident management, and develop its consulting business. NCC is paying about 55 million pounds ($82 million) for the equity of the AIM-listed group, representing a 19 percent premium on its closing price on Monday, funded by the issue of about 20.4 million new NCC shares and 10 million pounds in cash. Accumuli is growing revenue quickly, expecting to post about 27 million pounds in the year to end-March up from 16.6 million pounds, but made a loss from continuing operations of 500,000 pounds in its first half. "A growing number of customers today are looking for 24-7, 365 (days) operational security support and incident management services that Accumuli provides," NCC Chief Executive Rob Cotton said in an interview.

Carter: Troop data in online kill list was not stolen

- Mon, 23 Mar 2015 17:39:25 -0400

WASHINGTON (AP) ? The names, photos and addresses of 100 U.S. military members posted online by a group calling itself the Islamic State Hacking Division were not stolen from confidential government files, Defense Secretary Ash Carter said Monday.

Server attack briefly disrupts New Hampshire tourism website

- Mon, 23 Mar 2015 17:04:06 -0400

CONCORD, N.H. (AP) ? New Hampshire's tourism website was inaccessible for less than an hour Monday due to a cyberattack against an outside server.

Canadian film and TV actress Alberta Watson dies at 60

- Mon, 23 Mar 2015 16:57:06 -0400

TORONTO (AP) ? Canadian film and television actress Alberta Watson has died. She was 60.

The story behind the first computer viruses ever

- Mon, 23 Mar 2015 16:24:50 -0400

When we think about computer viruses, one tends to think about Windows or perhaps cross-platform malware that comes†from visiting questionable websites. But truth be told, computer viruses have a long and storied history, both on the PC and Apple side of the equation. To be fair, most of the earlier computer viruses weren?t terribly dangerous. If anything, they were more often than not proof-of-concept type of exploits rather than anything malicious. Don?t Miss: No one is safe: All 4 major web browsers hacked at Pwn2Own Taking an interesting step back through time, Priceonomics recently†took a close look at two of the first computer viruses to ever be released in the wild, Elk Cloner and Brain. Elk Cloner was the first

Why Android Wear may never catch on like Android did

- Mon, 23 Mar 2015 09:41:43 -0400

When Google unveiled Android back in 2007, it was an OEM?s dream come true ? Google wouldn?t charge any licensing fees to use the bare-bones version of it and OEMs could customize it to their hearts? desires. Android Wear, on the other hand, is another beast entirely and OEMs are showing significantly less enthusiasm for it than they did with the original Android. DON?T MISS: Our HTC One M9 review! Exhibit A in this case is Huawei. As Android Authority reports, Huawei vice president of product management Yang Yong recently explained why Android Wear just isn?t as appeal to manufacturers. Essentially, the company thinks Google needs to open up the platform for more customization so OEMs can more easily differentiate

No one is safe: All 4 major web browsers hacked at Pwn2Own

- Mon, 23 Mar 2015 08:55:36 -0400

Given the myriad of security mechanisms and technologies†tech companies have developed, it?s easy to fall into a sense of complacency and think that what you?re doing is safe from prying eyes. Truth be told, if skilled attackers really want to see what you?re up to online, there?s not really much you can do to stop them. Case in point: Last week at the annual Pwn2Own hacking competition, all 4 major browsers were exploited.Safari, Firefox, IE, Google Chrome ? none of these browsers can provide safe refuge from hackers. DON?T MISS: Meet the tweak every Netflix user needs: ?God mode? Incredibly, three of the web browsing hacks ? IE 11, Chrome, and Safari ? were carried out by one extremely skilled

US Attorney Preet Bharara faces setbacks amid NY success run

- Sun, 22 Mar 2015 17:29:44 -0400

FILE - In this Jan. 22, 2015 file photo, U.S. Attorney Preet Bharara addresses members of the media during a news conference, in New York. Bharara and his team in the Manhattan U.S. Attorney's Office have suffered some major setbacks in recent months of a kind not seen since he arrived on the job nearly six years ago. (AP Photo/Mary Altaffer, File )NEW YORK (AP) ? It was bad enough that New York's most famous prosecutor, Preet Bharara, lost in the sweepstakes to become the next U.S. attorney general nominee to a fellow federal prosecutor from his own city.


Pentagon wraps up new acquisition rules to protect weapons from cyberattacks

- Sun, 22 Mar 2015 14:37:11 -0400

By Andrea Shalal WASHINGTON (Reuters) - The U.S. Defense Department is taking aggressive action to bolster the security of U.S. weapons systems against cyberattacks, including issuing new rules for acquisitions that will be finalized in coming months, officials told Reuters. In addition to the acquisition policy, the department is producing a guidebook to help program managers assess the cost and risk tradeoffs in structuring new weapons programs and making them more secure, said Assistant Secretary of Defense Katrina McFarland. Both documents should be completed in the fourth quarter of this fiscal year, which ends Sept. 30, McFarland told Reuters in an interview this week. Chief U.S. arms buyer Frank Kendall said this month cyberattacks on U.S. weapons and manufacturers are a "pervasive" problem that requires greater attention.

Ethiopia launches 4G mobile service in the capital

- Sun, 22 Mar 2015 03:25:49 -0400

Ethiopia's state-run telecoms monopoly has launched a fourth generation (4G) mobile service in the capital Addis Ababa, aiming to catch up with the high-speed communications available in some east African neighbours such as Kenya and Uganda. Africa's telecoms industry is booming, with subscribers across the continent totalling almost 650 million in 2013, up from just 25 million in 2001, according to the World Bank. Ethiopia is one of the last African countries to have a state monopoly in telecoms and has lagged some neighbours in rolling out 4G, which offers much faster speeds than 3G, allowing users to browse the Internet more easily and run complex applications. State-run Ethio Telecom is committed to improving its network, however.

Hilarious CollegeHumor video lampoons the new Retina MacBook charger

- Fri, 20 Mar 2015 20:15:05 -0400

The transition from MagSafe†ports to USB Type-C is a painful-yet-necessary step for Apple and its customers, but that doesn?t mean we have to like it. Having a bunch of useless cords lying around the house is not something that any MacBook owner is looking forward to, which is why CollegeHumor?s latest video should strike a chord with Apple fans. DON?T MISS:†The funniest thing you?ll see today: The real reason the Apple Watch costs $10,000 Google showed us how great the new charging standard could be, but we also learned that, with only one port, the Retina MacBook is more susceptible to certain exploits involving USB-based malware. If you?ve ever wondered why Apple changes the cords to charge its devices so

Exclusive: Cyber IPO pipeline grows as data breaches boost security spending

- Fri, 20 Mar 2015 15:45:38 -0400

A magnifying glass is held in front of a computer screen in this picture illustration taken in BerlinBy Liana B. Baker, Olivia Oran and Jim Finkle NEW YORK/BOSTON (Reuters) - Rapid7, LogRhythm and Mimecast are joining a growing list of cybersecurity firms planning to go public in 2015 to capitalize on investor interest following a spate of hacker attacks, according to people familiar with the matter. Shares of publicly traded cybersecurity firms have outperformed the market in recent months, as high-profile data breaches at Sony Corp, JPMorgan Chase & Co and Anthem Inc prompt businesses to spend more to secure their computer networks. It has more than 3,500 customers, including Amazon.com Inc, American Express Co and Bank of America Corp. Mimecast, also based in Boston, is an email security firm with 10,000 customers. Rapid7, whose investors include Bain Capital Ventures and Technology Crossover Ventures, has chosen Morgan Stanley and Barclays to assist with an initial public offering, the people said.


Can't remember your password? Here are 2 new ways to log in

- Fri, 20 Mar 2015 13:47:32 -0400

FILE - In this Feb. 27, 2013, file photo illustration, hands type on a computer keyboard in Los Angeles. Tech experts agree that traditional passwords are annoying, outmoded and too easily hacked. Yahoo and Microsoft are offering new log-in solutions via text, facial recognition and fingerprint-identification technology. (AP Photo/Damian Dovarganes, File)SAN JOSE, Calif. (AP) ? Tired of trying to remember a different password for each of your online accounts? Or worried about re-using the same password too many times? You're not alone. Tech experts agree that traditional passwords are annoying, outmoded and too easily hacked.


Many U.S. boards lack vision, just tick boxes in search for women directors

- Fri, 20 Mar 2015 12:17:52 -0400

BAE Systems Inc CEO Hudson smiles during the Reuters Aerospace and Defense Summit in WashingtonBy Nadia Damouni NEW YORK (Reuters) - Linda Hudson, former CEO of the U.S. arm of British defense company BAE Systems Plc, is among the women that boards call on when they are looking for a female director. The demand for the 64-year-old Hudson underscores an issue women directors are noticing: companies may be talking about how they want to have more diverse boards but a lot aren't putting in the effort needed to make it happen. "You often don't get the enlightened thinking of reaching beyond the obvious candidates," said Hudson, who sits on the boards of Bank of America Corp and utility Southern Co.,†and is thinking of joining a third. Of the 478 new directors appointed to Fortune 500 boards in 2014, only 27 percent were women, according to research firm BoardEx.


New next-gen Nexus smartphone rumor could mean great news for Android fans

- Fri, 20 Mar 2015 08:55:02 -0400

After a series of reports suggested that a Chinese smartphone maker might build†the next-gen Nexus smartphone for Google, a report from South Korea indicates the company behind two popular Nexus devices might be working on†a third one this year. MASSIVE SALE:†Download over $100 worth of paid Android apps for free right now from Amazon Apparently, Google engineers have visited LG headquarters, with Etoday suggesting that LG might make the Nexus 6 successor this year. The company is an old Google partner when it comes to Nexus handsets, having created the Nexus 4 and Nexus 5 in previous years, which were both very popular with Nexus fans. One of the recent rumors did say that Google is considering both LG and

Chinese military denies role in reported U.S. hacking

- Fri, 20 Mar 2015 06:13:39 -0400

China Central Television Headquarters and other office buildings are pictured in Beijing's central business districtChina's Defense Ministry on Friday denied that it had anything to do with a cyber attack on Register.com, a unit of Web.com, following a report in the Financial Times that the FBI was looking into the Chinese military's involvement. "The relevant criticism that China's military participated in Internet hacking is to play the same old tune, and is totally baseless," the ministry said in a fax to Reuters in response to a question about the story. It is not clear what the Chinese military would be looking for or what it would gain from Register.com's data. China and the United States regularly accuse each other of hacking attacks.


Website skirting Chinese censorship says it's under attack

- Thu, 19 Mar 2015 22:29:41 -0400

BEIJING (AP) ? A website that helps Chinese Internet users see censored pages says it is the target of a massive denial-of-service attack and is struggling to stay online.

China web freedom group faces online disruption

- Thu, 19 Mar 2015 20:25:35 -0400

WASHINGTON (AP) ? A U.S.-subsidized advocacy group that helps Internet users inside China bypass blockages on censored content says it is suffering a mysterious denial-of-service attack disrupting its operations.

US hopes reward offers can help net foreign cyber criminals

- Thu, 19 Mar 2015 13:45:59 -0400

This image provided by the FBI shows the FBI's wanted poster of Evgeniy Bogachev. The FBI considers Bogachev one of the world?s most prolific and brilliant cyber criminals, slapping his photos _ bald, beefy-faced and smiling faintly _ on ?Wanted? fliers posted online. The Russian would be an ideal target for prosecution _ if only the Justice Department could find him. Unable to bring him into custody in the nine months since his indictment, the government has turned to a time-honored technique long used for more conventional crime: putting a bounty on Bogachev?s head. (AP Photo/FBI)WASHINGTON (AP) ? The FBI considers Evgeniy Bogachev one of the world's most prolific and brilliant cyber criminals, slapping his photos ? bald, beefy-faced and smiling faintly ? on "Wanted" fliers posted online. The Russian would be an ideal target for prosecution ? if only the Justice Department could find him.


The Next Cybersecurity Target: Medical Data

- Thu, 19 Mar 2015 11:35:14 -0400

The Next Cybersecurity Target: Medical DataHackers often carry out massive cyberattacks to gain access to financial data through banks and retail companies, but this week's cybercrime hit a seemingly new target: medical data, taken from the health insurance company Premera Blue Cross.††The attack affected 11 million patients, making it the largest cyberattack involving medical information to date. The healthcare industry has been catching hackers' attention lately. In February, the health insurance company Anthem reported a breach in which hackers accessed to about 80 million records, and in 2014, the Tennessee-based hospital operator Community Health Systems saw 4.5 million records accessed, though both companies said no medical data was exposed. "The healthcare industry is not immune to attacks," he told me.


New bugs uncovered in encryption software

- Thu, 19 Mar 2015 11:20:54 -0400

A lock icon, signifying an encrypted Internet connection, is seen on an Internet Explorer browser in ParisBy Jim Finkle and Eric Auchard BOSTON/FRANKFURT (Reuters) - New bugs in the widely used encryption software known as OpenSSL were disclosed on Thursday, though experts say do not pose a serious threat like the "Heartbleed" vulnerability in the same technology that surfaced a year ago. Cybersecurity watchers had feared the new round of bugs would be as serious as "Heartbleed," according to experts who help companies identify vulnerabilities in their networks. The concerns surfaced after the OpenSSL Project, which distributes OpenSSL software, warned several days ago that it planned to release a batch of security patches. "You need to take all vulnerabilities seriously, but I?m kind of disappointed.


China's Huawei leads international patent filings: WIPO

- Thu, 19 Mar 2015 07:28:52 -0400

Huawei mobile phones are displayed in one of its offices in ShenzhenBy Gerry Shih BEIJING (Reuters) - Chinese telecom giant Huawei Technologies Co Ltd [HWT.UL] became the world's No. 1 applicant for international patents in 2014, a United Nations agency said Thursday, underscoring the innovative strides made by Chinese technology companies. Huawei was followed by San Diego-based chipmaker Qualcomm Inc while Huawei's crosstown rival ZTE Corp, which was the world's leading applicant in 2012, took third place in its number of filings, according to the World Intellectual Property Organization (WIPO).


US turns to rewards in hunt for overseas cyber criminals

- Thu, 19 Mar 2015 06:45:03 -0400

This image provided by the FBI shows the FBI's wanted poster of Evgeniy Bogachev. The FBI considers Bogachev one of the world?s most prolific and brilliant cyber criminals, slapping his photos _ bald, beefy-faced and smiling faintly _ on ?Wanted? fliers posted online. The Russian would be an ideal target for prosecution _ if only the Justice Department could find him. Unable to bring him into custody in the nine months since his indictment, the government has turned to a time-honored technique long used for more conventional crime: putting a bounty on Bogachev?s head. (AP Photo/FBI)WASHINGTON (AP) ? The FBI considers Evgeniy Bogachev one of the world's most prolific and brilliant cyber criminals, slapping his photos ? bald, beefy-faced and smiling faintly ? on "Wanted" fliers posted online. The Russian would be an ideal target for prosecution ? if only the Justice Department could find him.


In boon for bitcoin, UK to regulate digital currency exchanges

- Wed, 18 Mar 2015 15:54:27 -0400

A bitcoin ATM machine is shown at a restaurant in San DiegoBy Jemima Kelly LONDON (Reuters) - Britain took a significant step towards becoming a global bitcoin hub on Wednesday as the government announced it would regulate digital currencies for the first time by applying anti-money laundering rules to exchanges. Already the center of the $5-trillion-a-day market for traditional currencies, the UK is fast emerging as a center for digital currencies too, cementing its place as European's financial technology, or "FinTech", capital. In a report published alongside finance minister George Osborne's annual budget statement, Britain's Treasury said the new regulation would support innovation and prevent criminal use of digital currencies. "I think it is a good balance between on the one hand the U.S. and specifically New York, which I think have gone too far, and what a lot of countries are doing which is just completely ignoring it." The potential for digital currencies to be used for illicit financial transactions has led many to steer well clear of the them.


FBI probes possible China military link in cyber attack: FT

- Wed, 18 Mar 2015 12:01:06 -0400

The FBI is looking into whether the Chinese military was involved in a cyber attack on Register.com, a unit of Web.com, the Financial Times reported Wednesday, citing sources familiar with the probe. A Federal Bureau of Investigation spokesperson said she was not familiar with the probe and that the agency does not comment on such matters. According to the Financial Times, hackers apparently have had access to Register.com's network for about a year, but the attack did not disrupt or result in theft of client data. It was not clear what the Chinese military would be looking for or what it would gain from Register.com's data.

Swedish crowdfunding platform launches bitcoin pilot

- Wed, 18 Mar 2015 07:36:30 -0400

Bitcoin (virtual currency) coins are seen in an illustration picture taken at La Maison du Bitcoin in ParisSwedish crowdfunding platform FundedByMe is launching a bitcoin pilot project, allowing investors to use the virtual currency to buy stakes in a bitcoin trading company. It will see the trading company, Safello, accept the digital currency from investors during its 45-day campaign that starts on Wednesday. Crowdfunding allows individuals and small businesses, often start-ups, to raise money from pools of investors who can buy equity in a company or put money into peer-to-peer lending schemes.


Parma owner Manenti arrested in new blow to crisis-hit club

- Wed, 18 Mar 2015 07:30:29 -0400

Sassuolo's Domenico Berardi, left, competes for the ball with Parma's Alessandro Lucarelli, during their Serie A soccer match at Reggio Emilia's Mapei stadium, Italy, Sunday, March 15, 2015.(AP Photo/Marco Vasini)ROME (AP) ? Crisis-hit Serie A club Parma suffered another blow on Wednesday with the arrest of its new owner and president, Giampietro Manenti, accused in a failed hacker credit card scam.


Premera Blue Cross says data breach could affect 11M people

- Tue, 17 Mar 2015 16:36:05 -0400

NEW YORK (AP) ? Premera Blue Cross, a health insurer based in the Pacific Northwest, said Tuesday that it was the victim of a cyberattack that could affect 11 million people.

Microsoft to offer biometric sign-in for Windows 10

- Tue, 17 Mar 2015 12:07:00 -0400

A shadow of a man using his mobile phone is cast near Microsoft logo at the 2014 Computex exhibition in TaipeiMicrosoft Corp will introduce an automatic biometric sign-in option with its Windows 10 operating system due out later this year, the first time it has offered such a service widely across devices. The feature, called Windows Hello, means users will be able to scan their face, iris or fingerprint to verify identity and access Windows phones, laptops and personal computers. Microsoft, which announced the feature on Tuesday, said users' biometric data would be stored locally on the device and kept anonymous to make sure personal data is safe from hackers. Windows Hello will only be available on new devices that are capable of running the new feature.


Google app store gets more oversight

- Tue, 17 Mar 2015 09:10:53 -0400

A Google logo is seen at the garage where the company was founded on Google's 15th anniversary in Menlo Park, CaliforniaBy Alexei Oreskovic SAN FRANCISCO (Reuters) - Google Inc is tightening supervision of its freewheeling Play store, forming a special team to screen new apps for malware and sexually explicit material, and strengthening its age-based rating system. The change brings Google Play, a bazaar for digital games, social media apps and entertainment software, closer to Apple Inc's tightly controlled App Store. Google, whose Android software runs most of the world's smartphones, and the iPhone and iPad maker each manage online hubs with more than one million apps ranging from calendars to video games. Google said in its official blog on Tuesday that its expert team will screen each app submitted by developers to spot earlier anything that runs afoul of its rules.


South Korea blames North Korea for December hack on nuclear operator

- Tue, 17 Mar 2015 08:21:34 -0400

North Korean leader Kim Jong Un gives field guidance to the newly built Wisong Scientists Residential District in this undated photo released by KCNABy Ju-min Park and Meeyoung Cho SEOUL (Reuters) - South Korea on Tuesday blamed North Korea for cyberattacks against the country's nuclear reactor operator last December, based upon investigations into Internet addresses used in the hacking, but Pyongyang denied any involvement. The conclusion reached by South Korean prosecutors comes less than a week after a hacker believed to be behind the cyberattacks on Korea Hydro and Nuclear Power Co Ltd released more files believed to have been taken in December. "The malicious codes used for the nuclear operator hacking were the same in composition and working methods as the so-called 'kimsuky' that North Korean hackers use," a statement from the Seoul central prosecutors' office said. Prosecutors said the cyber attacks were made between Dec. 9 and 12 by sending 5,986 phishing emails containing malicious codes to 3,571 employees of the nuclear plant operator.