IANS Blog RSS Feed

http://www.iansresearch.com

Poulin to CSO: We Hacked a Smart Building Using ?Old-School? Techniques

- Thu, 11 Feb 2016 00:00:00 GMT

The ?smarter? buildings get, the easier they are to hack? Maybe. IANS Faculty Chris Poulin, research strategist for IBM?s X-Force ethical hacking team, recently spoke to CSO?s Maria Korolov about a penetration test in which his team was able to gain access to all of the buildings operated by a building management company.

Privacy, Security Concerns Rise as States Mull Encryption Backdoor Requirements

- Wed, 27 Jan 2016 00:00:00 GMT

National Data Privacy Day (January 28th) certainly comes at an interesting time this year, as legislators in two of the most technology-centric U.S. states recently introduced similar bills that would force smartphone manufacturers to include encryption backdoors in their devices.

Fledgling Cyber-Insurance Market Tested by Early Denials, Lawsuits

- Wed, 20 Jan 2016 00:00:00 GMT

Cybersecurity insurance policies may be relatively new, but they have one important thing in common with established, legacy business coverage: They live and die in the fine print.

Hacker-Caused Ukrainian Power Outage Marks First Known Attack With Immediate, Direct Public Impact

- Tue, 05 Jan 2016 00:00:00 GMT

Security researchers have confirmed that a recently updated version of the highly destructive BlackEnergy malware package infected the systems of at least three power authorities in Ukraine, causing a massive outage that left thousands of homes in the Ivano-Frankivsk region of the country without electricity.†

Top 10 IANS Insights from a Tumultuous 2015

- Mon, 28 Dec 2015 00:00:00 GMT

Another year is in the books and what a year it was for infosec pros. From the Ashley Madison hack to the OPM breach, to Jeep commandeering and mysterious backdoors in popular networking gear, every week brought a new security twist that forced us all to keep our heads on swivels.

Herold: Misguided CISA Heightens Security, Privacy Concerns

- Mon, 21 Dec 2015 00:00:00 GMT

The controversial Cybersecurity Information Sharing Act (CISA) is now the law of the land, slipped into an eleventh-hour†spending bill designed to keep the federal government running through 2016.

Patch Now: Rogue Code Leaves Gaping Hole in Juniper Gear

- Fri, 18 Dec 2015 00:00:00 GMT

Juniper Networks says unauthorized code could allow attackers to gain administrative access to its NetScreen appliances and decrypt VPN connections without leaving any trace of their actions. Users are urged to apply fixes immediately.

Poulin: Time to Realistically Acknowledge Vehicle Vulnerabilities

- Wed, 16 Dec 2015 00:00:00 GMT

The images and breathless banter were difficult to ignore: celebrity security researchers gaining remote command of an automobile, disrupting on-board systems before forcing the vehicle and its helpless driver into a ditch.

NIST to Infosec Pros: How Is Our Framework Working?

- Mon, 14 Dec 2015 00:00:00 GMT

The National Institute of Standards and Technology is asking infosec practitioners in the public and private sectors to comment on the efficacy of its cybersecurity framework as it prepares to update the popular, two-year-old document.

As Ransomware Attacks Evolve, Security Teams Must Prepare For New ?Drive-By? Tactics

- Thu, 10 Dec 2015 00:00:00 GMT

Another week, another evolution of the popular ransomware attacks. When we last wrote about it, researchers had discovered a new iteration ? ?Linux.Encoder.1? ? that enabled attackers to inject malware into Linux-powered websites and encrypt all files in the home and backup directories. Now, it appears the popular exploit kit Angler is being used to spread the latest version of CryptoWall and other ransomware on websites as part of ?drive-by? campaigns that begin with the deployment of password-stealing malware.†

Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

Trojan.Zekapab

- Thu, 26 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Zekapab

- Thu, 26 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Psiload

- Wed, 25 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AV

- Wed, 25 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Furtim

- Wed, 25 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Prikormkak

- Tue, 24 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AU

- Tue, 24 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Huntpos!g1

- Wed, 25 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Huntpos!gm

- Mon, 23 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Turla!gen4

- Tue, 24 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptlock.AN!g2

- Tue, 24 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Redir

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Banswift!gen1

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

JS.Dropper

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AT

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Lostdrat

- Sun, 22 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Bayrob!gen8

- Mon, 16 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Heur.AdvML.D

- Wed, 18 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Heur.AdvML.C

- Wed, 18 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Heur.AdvML.B

- Wed, 18 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

JS.Downloader!gen20

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomlock.AS

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AR

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AS

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptlock.AH!g1

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AP

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AQ

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4117

- Fri, 13 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Wortrik

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Android.Cepsohord

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Packed.Generic.505

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ranscrypt.AP!gm

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AP

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptlock.N!g7

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ranslock.AQ!g1

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W97M.Downloader.I

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AN

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AO

- Tue, 10 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-1015

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-1016

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-1017

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Qakbot!g1

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Backdoor.Duuzer.B

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Tronariv

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Jakubot

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Heur.RGC!g108

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g136

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g147

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g185

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g90

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.CM!g13

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.DL!g5

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MSWord!g3

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic2.RGC!g8

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen57

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

PHP.Fioesrat

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AM

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

VBS.Backbat

- Mon, 2 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus.

Trojan.Ransomcrypt.AL

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomlock.AQ

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

U.S. panel launches trade secret theft probe into China steel

- Fri, 27 May 2016 08:17:49 -0400

A labourer welds steel frames at a steel factory in HuaibeiWASHINGTON/SHANGHAI (Reuters) - U.S. regulators launched an investigation on Thursday into complaints by United States Steel Corp that Chinese competitors stole its secrets and fixed prices, in the latest trade spat between the two countries. U.S. Steel is seeking to halt nearly all imports from China's largest steel producers and trading houses, in its complaint made under section 337 of the main U.S. tariff law. The commission identified 40 Chinese steel makers and distribution subsidiaries as respondents, including Baosteel Group, Hebei Iron and Steel Group, Wuhan Iron and Steel Co Ltd, Maanshan Iron and Steel Group, Anshan Iron and Steel Group and Jiangsu Shagang Group.


SWIFT eyes new technology to spot cyber theft

- Fri, 27 May 2016 07:00:15 -0400

A hacker works on his laptop in TaipeiBy Tom Bergin LONDON (Reuters) - The SWIFT secure messaging service, which banks use to transfer money around the world, outlined on Friday areas in which it hopes to improve security, following attacks in which hackers stole millions of dollars from banks in Bangladesh and Ecuador. SWIFT said on Friday it would consult its users, which are also its owners, about new measures, including the potential to develop new tools that could allow it to spot fraudulent payment instructions. Historically, the Society for Worldwide Interbank Financial Telecommunication's (SWIFT) core business has focused on simply passing authenticated messages between banks.


Key issues at G-7: Global economy, terrorism, women

- Fri, 27 May 2016 06:21:37 -0400

Key issues at G-7: Global economy, terrorism, womenThe leaders of the Group of Seven industrialized economies pledged to tackle major economic and political risks including terrorism, floods of refugees, climate change and cyber-attacks. Here are highlights ...


EU member states should stress-test banks' cyber risks: European Banking Authority chairman

- Fri, 27 May 2016 06:20:55 -0400

Enria attends a policy dialogue at the Asian Financial Forum in Hong KongBy Matthew Miller BEIJING (Reuters) - Domestic authorities in European Union member states should stress-test their financial institutions for cyber risks, a top E.U. supervisor said, warning banks might be required to hold extra capital as a buffer against what is an emerging threat. Speaking to Reuters in Beijing on Friday, Andrea Enria, chairman of the European Banking Authority (EBA), said cyber security had become an important issue for E.U. member states. "But if you ask me would I recommend competent authorities to think more on this and consider running this type of stress test?


Cyber firms say Bangladesh hackers have attacked other Asian banks

- Fri, 27 May 2016 04:46:35 -0400

Photo illustration of the SWIFT logoBy Dustin Volz and Jeremy Wagstaff WASHINGTON/SINGAPORE (Reuters) - Hackers who stole $81 million from Bangladesh's central bank have been linked to an attack on a bank in the Philippines, in addition to the 2014 hack on Sony Pictures, cybersecurity company Symantec Corp said in a blog post. The U.S. Federal Bureau of Investigation has blamed North Korea for the attack on Sony's Hollywood studio. A senior executive at Mandiant, the cybersecurity company investigating the Bank Bangladesh heist, also told Reuters the hackers had recently penetrated banks in Southeast Asia.


US investigating Chinese steelmakers in trade secrets case

- Fri, 27 May 2016 03:23:46 -0400

BEIJING (AP) ? U.S. regulators are investigating whether Chinese steelmakers used stolen American trade secrets in a case that adds to tensions over accusations Beijing is flooding global markets with low-cost steel.

Push for encryption law falters despite Apple case spotlight

- Fri, 27 May 2016 01:08:10 -0400

A worker checks an iPhone in a repair store in New YorkBy Dustin Volz, Mark Hosenball and Joseph Menn WASHINGTON/ SAN FRANCISCO (Reuters) - After a rampage that left 14 people dead in San Bernardino, key U.S. lawmakers pledged to seek a law requiring technology companies to give law enforcement agencies a "back door" to encrypted communications and electronic devices, such as the iPhone used by one of the shooters. Draft legislation that Senators Richard Burr and Dianne Feinstein, the Republican and Democratic leaders of the Intelligence Committee, had circulated weeks ago likely will not be introduced this year and, even if it were, would stand no chance of advancing, the sources said. Key among the problems was the lack of White House support for legislation in spite of a high-profile court showdown between the Justice Department and Apple Inc over the suspect iPhone, according to Congressional and Obama Administration officials and outside observers.


Symantec says SWIFT heist linked to Philippines attack, Sony hack

- Thu, 26 May 2016 17:33:10 -0400

Photo illustration of the SWIFT logoBy Dustin Volz WASHINGTON (Reuters) - Hackers who stole $81 million from Bangladesh's central bank have been linked to another cyber attack, this time on a bank in the Philippines, in addition to the 2014 hack on Sony Pictures Entertainment, cyber security company Symantec Corp said in a blog post on Thursday. If confirmed, the Philippines incident would represent the fourth known cyber attack against a bank involving fraudulent SWIFT messages. SWIFT, as the Society for Worldwide Interbank Financial Telecommunication is known, this week urged banks to bolster their security, saying it was aware of multiple attacks.


Watch right here as SpaceX attempts a difficult rocket landing

- Thu, 26 May 2016 17:10:07 -0400

SpaceX is ramping up the number of launches of its Falcon 9 rocket, which is good for the company, and great for fans of large explosions. Tonight, Elon Musk's rocket company is shooting a commercial communications satellite to geostationary orbit. The first stage will once again try and land on a barge in the ocean, but the trajectory of the launch means that the landing will be "challenging." DON'T MISS:† Microsoft just turned Windows 10 into malware Tonight's payload is THAICOM 8, a commercial comms satellite that needs to get to a high orbit above Southeast Asia. Getting a satellite that high means going faster and higher, which creates problems for the landing. The Falcon 9 first stage uses whatever leftover fuel it has to decelerate and land, so the higher and faster the rocket has to go for launch, the less fuel it has to slow down before hitting the barge. With those caveats in mind, SpaceX is describing this landing as "challenging." But it said the same thing about the last landing it attempted, and that went more or less perfectly to plan. The launch window opens at 5.40 pm E.T, with a backup launch window tomorrow if needed. SpaceX will be streaming the entire thing, landing included, on the YouTube channel below. https://youtu.be/zBYC4f79iXc

Clinton says IG report won't affect her presidential bid

- Thu, 26 May 2016 15:41:00 -0400

Democratic presidential candidate Hillary Clinton reacts while speaking at a rally at Hartnell College, Wednesday, May 25, 2016, in Salinas, Calif. (AP Photo/John Locher)WASHINGTON (AP) ? Hillary Clinton contends a new government audit critical of her use of a private email server as secretary of state won't affect her Democratic presidential campaign.


Brazilian companies rank worst among major economies on cyber security: report

- Thu, 26 May 2016 05:03:50 -0400

A hand is silhouetted in front of a computer screen in this picture illustration taken in BerlinBy Dustin Volz WASHINGTON (Reuters) - Companies based in Brazil scored ?significantly poorer? in aggregate on a variety of cyber security indicators than those based in other major world economies, such as the United States and China, according to a report released on Thursday. The study, from Massachusetts-based security ratings company BitSight, found that Brazilian companies underperformed on metrics such as machine compromise rates, email security and file-sharing practices in an analysis conducted over the past year. "Brazil has significantly poorer performance than the other countries included in the study," the study said.


Guess which movie people want to see even more than ?The Force Awakens? and ?Civil War?

- Wed, 25 May 2016 21:30:00 -0400

Disney has been on a roll for†the past 12 months, having released not one but two huge blockbusters including Star Wars: The Force Awakens and Captain America: Civil War . As big as those two movies were, the company also has plenty of other highly anticipated titles in the making†and it looks like there's one trailer that†people wanted to watch even more†than The Force Awakens or Civil War . DON?T MISS: Microsoft?s just turned Windows 10 into malware You?ve probably seen the first teaser for the Beauty and the Beast live-action film that?s due March 17, 2017. It?s a 90-second video that will immediately remind you of the animated version of the story, also a Disney favorite. How excited are people for this movie? The teaser generated 91.8 million views in its first 24 hours, beating The Force Awakens (88 million views for the second trailer), Civil War (61 million) and Avengers: Age of Ultron (55 million), The Hollywood Reporter notes. The teaser trailer debuted on ABC?s Good Morning America †this past Monday morning, before appearing online and airing around the world. If that first 24 hours is any indication of box office performance, then Disney has likely locked down yet another blockbuster title and potential cash cow. Beauty and the Beast stars Emma Watson as Belle and Dan Stevens as the Beast. The entire cast is spectacular ? we?re looking at Kevin Kline, Luke Evans, Josh Gad, Ewan McGregor, Stanley Tucci, Gugu Mbatha-Raw, Audra McDonald, Ian McKellen and Emma Thompson. That alone should guarantee an incredible film.

Exclusive: In Ecuador cyber heist, thieves moved $9 million to 23 Hong Kong firms

- Wed, 25 May 2016 19:48:06 -0400

A branch of the Banco del Austro is seen in QuitoBy Clare Baldwin and Nathan Layne HONG KONG/CHICAGO (Reuters) - Cyber thieves who stole $12 million from an Ecuadorian bank in 2015 routed the funds through 23 companies registered in Hong Kong, some of them with no clear business activity, according to previously unreported court filings and judicial rulings. The court papers offer a first glimpse into where some of the money was moved after it reached accounts in Hong Kong. The filings stem from a lawsuit filed in early 2015 by Ecuador's Banco del Austro (BDA) in Hong Kong against the web of companies that received or handled more than $9 million in stolen funds, bank records submitted to the territory's Court of First Instance show.


Don text and drive in Canada, or cops will bust you with this camera rig

- Wed, 25 May 2016 18:50:55 -0400

Texting and driving is a menace that's up there with chugging vodka while at the wheel, and cops the world over are slowly cracking down on it. But how do you catch errant texters? With a DSLR and†some serious glass, if you're Canada's Mounties. DON'T MISS:† Microsoft?s just turned Windows 10 into malware A† CBC News† report spotted by† PetaPixel † shows RCMP officers in British Columbia using a new set-up to catch drivers who are texting and driving at intersections. The rig consists of a DSLR, a 50mm lens, and a target-shooting spotting scope. It's a reasonably affordable set of kit -- certainly cheaper than a 500mm zoom lens -- but it should be good enough to capture photos of offenders from three-quarters of a mile away. That's bad news for anyone who likes to drive distracted. Even if you think it's reasonable to check your phone at a red light, it's illegal under Canadian law, and the Mounties are coming for your texts. The good news for distracted drivers is that due to the limitations of the rig (and in general, limitations of trying to photograph a car going at 70mph), it's only going to work at intersections for now. To catch highway phone users, cops are going to be relying on the old-fashioned Mk. 1 eyeball for now. Canada's set-up is the lastest in a list of technology to catch distracted drivers. Legislation was recently introduced in New York state to give cops "textalyzers," devices that could be used on driver's phones after a crash to see if they had been using it in the run-up to an accident. A spotting scope is a little more old-school, but nonetheless effective in issuing tickets.

Exclusive: Bangladesh probes 2013 hack for links to central bank heist

- Wed, 25 May 2016 16:27:31 -0400

bangladeshBy Krishna N. Das and Ruma Paul DHAKA (Reuters) - Bangladesh police are reviewing a nearly forgotten 2013 cyber heist at the nation?s largest commercial bank for connections to February's $81 million heist at the country's central bank, a senior law enforcement official said on Wednesday. The unsolved theft of $250,000 at Sonali Bank involved fraudulent transfer requests sent over the SWIFT international payments network. It is not widely known outside of Bangladesh, and in fact was treated as a cold case until Bangladesh police revived the investigation after thieves in February also used the SWIFT network to steal $81 million from Bangladesh Bank.


Key findings from inspector general report on Clinton emails

- Wed, 25 May 2016 14:25:13 -0400

WASHINGTON (AP) ? Key findings from the State Department inspector general's report on former Secretary of State Hillary Clinton's emails and private server and the department's email practices:

Report: Upgraded Xbox One with 4K, Oculus Rift support will launch in 2017

- Wed, 25 May 2016 13:55:56 -0400

With less than a month to go until E3 2016 , the rumor mill has begun to kick into high gear. On Wednesday, Kotaku published a report claiming that Microsoft will release a cheaper, smaller Xbox One before the end of the year while†an†upgraded Xbox One console with upgraded specs will launch in 2017. DON'T MISS:† Microsoft?s just turned Windows 10 into malware According to Kotaku's sources, the upgraded Xbox carries the codename Scorpio, and will have a more powerful GPU than the current model.†Sources also say that the new console will be able to support the Oculus Rift , which is why Microsoft is currently working to partner with Oculus in the months leading up to launch. As for the smaller Xbox One, there's a chance it will come equipped†with a 2TB hard drive, although Kotaku couldn't offer many more details regarding the 2016 console. Providing the smaller Xbox One†is real, we'll probably see it at E3 . Together, these two consoles make up a new strategy that sources are calling "Project Helix." This strategy will see the companies two major platforms, Windows and Xbox, come together as one. Developer sources tell Kotaku that Microsoft is going to require games to be made available for both platforms in the future. Finally, it appears that both of these consoles are part of a new iterative approach to console releases that will continue throughout the hardware generation. Sources say that Microsoft will continue to release new hardware on a more consistent basis than ever before, while keeping its games compatible with as much of the available hardware as it possibly can at once. We'll likely hear more about these plans when Microsoft takes the stage at E3 2016 on†Monday, June 13th at 9:30 a.m. PDT. You can read all about the company's currently announced plans for E3 right here .

Clinton faulted on emails by State Department audit

- Wed, 25 May 2016 13:49:52 -0400

Clinton email use broke federal rules: inspector's reportHillary Clinton and her team ignored clear guidance from the State Department that her email setup broke federal standards and could leave sensitive material vulnerable to hackers, an independent audit has found. The inspector general?s review also revealed that hacking attempts forced then-Secretary of State Clinton off email at one point in 2011, though she insists the personal server she used was never breached. Clinton and several of her senior staff declined to be interviewed for the State Department investigation.


Microsoft just turned Windows 10 into malware

- Wed, 25 May 2016 10:58:59 -0400

For months now, Microsoft has done everything in its power to shove† Windows 10 down your throat. The free update is mandatory at this point, and we?ve heard from many Windows users who discovered their computers updated to the newest version automatically , without their knowledge or explicit permission. Microsoft kept offering excuses for these annoying occurrences, and even said it will stop pushing upgrades to Windows users refuse to hope aboard†the Windows 10 train. Now, the company has come up with its†most†evil†trick yet to get you to update your PC to†Windows 10, and it's based on the same methodology hackers use to trick people into installing malware. DON'T MISS:† New free app and site makes watching online videos like regular TV channels Pop-ups often appear when you visit malicious websites and when you click the "X" to close them, malware is installed on your computer. Well,†Microsoft just tweaked its Windows 10 upgrade alert pop-up so that the update is triggered when clicking the X, PC World explains . The Get Windows X app that pushes the update prompt has recently changed the behavior of the ?X? button. Earlier, users would have been able to dismiss†the pop-up by pressing the button, as you would expect. But you can?t do that anymore. Pressing the X now has a different function. It tells the company you?re happy to have your computer updated at the time shown inside the pop-up. The only way to get rid of it is to change the update time manually. But of course, that?s not intuitive at all†and many†people are about to be tricked into†upgrading. The trick is disingenuous at best, since†Microsoft isn?t technically doing anything wrong. It?s just turning the function†of the X button from ?close and do nothing? to ?close and†upgrade later.? You know, without explaining this tiny change to anyone. Come July 29th, Microsoft will stop prompting users to upgrade, Business Insider reminds us, so make sure you change your Windows 10 upgrade time to August†or†later!

Huawei files lawsuits accusing Samsung of violating patents

- Wed, 25 May 2016 03:22:41 -0400

In this May 13, 2016 photo, Chinese sales representatives wait for customers at a Huawei retails shop in Beijing, China. Chinese tech giant Huawei said Wednesday, May 25 it has filed patent infringement lawsuits against South Korean mobile phone rival Samsung in the United States and China, in a case that highlights the rise of Asian competitors as technology creators. (AP Photo/Ng Han Guan)BEIJING (AP) ? Chinese tech giant Huawei said Wednesday it has filed patent infringement lawsuits against South Korean mobile phone rival Samsung in the United States and China, in a case that highlights the rise of Asian competitors as technology creators.


Top Asian News 3:38 a.m. GMT

- Tue, 24 May 2016 23:38:21 -0400

TOKYO (AP) ? Leaders of the Group of Seven rich nations will undoubtedly voice unity over fighting terrorism, pandemics and tax evasion at their summit in Japan this week. Finding a consensus on how to breathe life into their sluggish economies is proving more elusive. Aging workforces, sagging productivity and lingering damage from the 2008 financial crisis are complicating efforts to spur growth while the effects of the slowdown in China and the other big developing economies ripple across the globe. At a pre-summit meeting in northern Japan's Sendai, finance ministers and central bank governors of the G7 failed to concur on a coordinated approach to fighting what Nobel prize-winning economist Joseph E.

China's Huawei files patent suits against Samsung Elec

- Tue, 24 May 2016 22:11:03 -0400

People walk past a sign board of Huawei at CES Asia 2016 in ShanghaiBy Yimou Lee and Anne Marie Roantree HONG KONG (Reuters) - Huawei Technologies Co Ltd [HWT.UL] on Wednesday said it sued Samsung Electronics Co Ltd claiming infringement of smartphone patents, the Chinese firm's first intellectual property challenge against the world's top mobile maker. Huawei has filed lawsuits in the United States and China seeking compensation for what it said was unlicensed use of fourth-generation (4G) cellular communications technology, operating systems and user interface software in Samsung phones. "We hope Samsung will ... stop infringing our patents and get the necessary license from Huawei, and work together with Huawei to jointly drive the industry forward," Ding Jianxing, president of Huawei's Intellectual Property Rights Department, said in a statement.


Samsung Elec to defend interests against Huawei patent suits

- Tue, 24 May 2016 21:08:20 -0400

A man speaks on his mobile phone near a Samsung store in central KievSEOUL (Reuters) - Tech giant Samsung Electronics Co Ltd said on Wednesday it will defend itself against patent lawsuits filed by smartphone rival Huawei Technologies Co Ltd [HWT.UL]. Huawei, the world's third-largest smartphone maker, has filed lawsuits against Samsung in the United States and China claiming infringement of smartphone patents. "We will thoroughly review the complaint and take appropriate action to defend Samsung's business interests," Samsung, the world's top smartphone maker, said in an email to Reuters. (Reporting by Se Young Lee; Editing by Stephen Coates)


Apple rehires prominent security pro as encryption fight boils

- Tue, 24 May 2016 14:30:18 -0400

People wait in line for the grand opening of the next generation Apple Store in San Francisco, CaliforniaBy Joseph Menn SAN FRANCISCO (Reuters) - Apple Inc , which has resisted pressure from U.S. law enforcement to unlock encrypted iPhones, this month rehired a top expert in practical cryptography to bring more powerful security features to a wide range of consumer products. Jon Callas, who co-founded several well-respected secure communications companies including PGP Corp, Silent Circle and Blackphone, rejoined Apple in May, an Apple spokesman said. Callas had worked at Apple in the 1990s and again between 2009 and 2011, when he designed an encryption system to protect data stored on a Macintosh computer.


China's Huawei sues Samsung Electronics claiming mobile patent infringement

- Tue, 24 May 2016 12:43:23 -0400

People walk past a sign board of Huawei at CES Asia 2016 in ShanghaiBy Yimou Lee and Anne Marie Roantree HONG KONG (Reuters) - Huawei Technologies Co Ltd [HWT.UL] said on Wednesday it has filed lawsuits against Samsung Electronics Co Ltd claiming infringement of smartphone patents, in the first such case by the Chinese firm against the world's biggest mobile maker. Huawei has filed lawsuits in the United States and China seeking compensation for what it said was unlicensed use of fourth-generation (4G) cellular communications technology, operating systems and user interface software in Samsung phones. "We hope Samsung will ... stop infringing our patents and get the necessary license from Huawei, and work together with Huawei to jointly drive the industry forward," Ding Jianxing, president of Huawei's Intellectual Property Rights Department, said in a statement.


Pebble just re-invented the iPod Shuffle, and it runs Spotify

- Tue, 24 May 2016 12:05:33 -0400

Back in the days before RunKeeper and GPS watches, my jogs were a beautifully simple thing: I strapped on an iPod Shuffle loaded with a strong mix of Britney and Eminem, and vanished into my own little world for an hour. A couple years later, I transitioned to Spotify and never really looked back. But running with an armband and a 5-inch phone never felt quite the same, and clearly other people agree. That's why I'm absurdly happy that Pebble, a small†Canadian company that makes wearables, is making a Shuffle-sized device that clips on to your shorts, plays your Spotify playlists, and tracks runs. DON'T MISS: iPhones will finally get the OLED screens they deserve The Core is a $70 device about the same size as an old Shuffle, complete with a little clip. It allows you to store Spotify playlists on the 4GB of built-in storage, or stream them over a 3G connection. It also has built-in GPS and integration with popular apps like RunKeeper and Strava, so you can track your workouts. Finally, it builds in an emergency SOS button using that cellular radio, so you still have the comfort value of not being completely cut off from the world in an emergency. It feels like someone's sat down, thought about what my ideal device would be to take running or biking, and then built that. It's a stripped-down machine for people who just want to know how far they've run, and listen to music along the way. My only concern is the controls: Core only has two buttons, so you'll really need to pair it to a Pebble smartwatch over Bluetooth to make the most of it. Pebble actually has other plans for the Core beyond just workouts. As Pebble points out, Core is really just a tiny Android 5.0-powered computer, complete with a full suite of sensors like GPS and microphones, and Bluetooth, Wi-Fi and cellular connectivity. Pebble is making the device completely open to hackers, so you can expect a bunch of Core-powered lifehacks coming soon. Alongside the Core, Pebble also revamped its line of smartwatches with a new focus on fitness. The Pebble 2 is a $100 smartwatch that looks a lot like the original Pebble, but with the notable addition of built-in heartrate tracking. The Pebble Time 2 is an update to last summer's Pebble Time Steel, with a color e-ink display and heart-rate monitoring again. Overall, the smartwatch updates stick to Pebble's core philosophy of the simpler, the better. Pebble watches have buttons instead of touchscreens, and week-long battery life rather than 24 hours. They're meant to be smartwatches for people who mostly want a watch, only with this update, they're now also cheap and powerful fitness trackers. All three devices are up for pre-order on Kickstarter right now, Pebble's tried-and-tested method of selling products. The Core is $69 with delivery in January next year, Pebble 2 is $99 in September this year, while the Pebble Time 2 is $169, delivery November 2016.

Saudi Arabia's rulers adapt message for social media age

- Tue, 24 May 2016 11:12:28 -0400

Saudi men explore social media on their mobile devices as they sit at a cafe in RiyadhBy Sylvia Westall and Angus McDowall DUBAI/RIYADH (Reuters) - The participation of tens of thousands of young Saudis in a social media debate over plans to reform the kingdom's oil-reliant economy last month marked a shift in how Riyadh's conservative rulers interact with their subjects. Saudi Arabia's dynastic leaders, who rule by fiat and strictly limit public dissent, have historically courted public opinion only via informal councils with tribal, religious and business leaders or citizens seeking to petition them. "It's a new focus for the government as it reaches out to a young Saudi population that is more likely to use social media," Saudi analyst and commentator Mohammed Alyahya said.


Japan an alluring target for Standard Bank ATM thieves

- Tue, 24 May 2016 08:36:11 -0400

People stand outside 7-Eleven convenience store outside headquarters of Seven & I Holdings in TokyoThe gang used counterfeit Standard Bank credit cards to withdraw 1.4 billion yen ($13 million) in 14,000 transactions from ATMs at 7-Eleven convenience†stores over three hours on a Sunday morning, according to a source familiar with the matter.


SWIFT to unveil new security plan after hackers' heists

- Tue, 24 May 2016 06:47:22 -0400

Photo illustration of the SWIFT logoBy Huw Jones and Tom Bergin LONDON (Reuters) - The SWIFT secure messaging service that underpins international banking said on Tuesday it plans to launch a new security program as it fights to rebuild its reputation in the wake of the Bangladesh Bank heist. The Society for Worldwide Interbank Financial Telecommunication (SWIFT)'s chief executive, Gottfried Leibbrandt, told a financial services conference in Brussels that SWIFT will launch a five-point plan later this week. In February, thieves hacked into the SWIFT system of the Bangladesh central bank, sending messages to the Federal Reserve Bank of New York allowing them to steal $81 million.


Clinton email probe in late stage, FBI may question her

- Tue, 24 May 2016 03:19:14 -0400

In this photo taken Dec. 19, 2015, Huma Abedin, center, aide to Hillary Clinton, stands on stage after a Democratic presidential primary debate in Manchester, N.H. FBI agents probing whether Hillary Clinton?s use of a private email server imperiled government secrets appear close to completing their work, a process experts say will likely culminate in a sit-down with the former secretary of state. (AP Photo/Jim Cole)WASHINGTON (AP) ? FBI agents probing whether Hillary Clinton's use of a private email server imperiled government secrets appear close to completing their work, a process experts say will probably culminate in a sit-down with the former secretary of state.


Soccer-Lewandowski has score to settle on biggest stage

- Mon, 23 May 2016 22:01:51 -0400

By Adrian Krajewski WARSAW, May 24 (Reuters) - Poland's Robert Lewandowski has chalked up so many big-game landmarks during his club career that the 27-year-old seems overdue a major tournament performance with his country. Few strikers in Europe can match his astonishing scoring record which will leave Germany particularly wary of facing the Bundesliga's leading scorer when the two countries meet at Euro 2016. For the last six years, since joining Borussia Dortmund and then Bayern Munich, goals have come readily.

Ocean?s 100: Thieves steal $12.7 million from ATMs in just three hours

- Mon, 23 May 2016 21:00:29 -0400

The Ocean's 11 movies are spectacular stories about†crazy†heists that take†lots of effort, careful planning and just a touch of skillful improvisation to pull off. But it turns out that†jobs like this exist in real life, too. And they?re equally impressive. A few days ago, 100 coordinated thieves stole no less than $12.7 million (1.4bn yen) from ATMs. The entire thing took just three hours, and no suspect was apprehended since then. DON?T MISS: Watch the Britney Spears BMA performance that the internet is going crazy over According to The Guardian , the operation was orchestrated by an organized crime ring. 100 people targeted 1,400 ATMs and used fake†credit cards that contained details stolen from an unidentified South African bank. Thieves stole precisely 100,000 yen per withdrawal. That means each card was used only for a single transaction worth around $914, but the grand total was†just under $13 million. The thieves started withdrawing cash on Sunday, May 15th, at†5:00AM, completing the entire process just before 8:00AM. They targeted cash machines in Tokyo and 16 other districts. Because it was a day when banks were closed and the cards used belonged to a bank in a different country, it took a while before the caper†was discovered. That was probably enough time for the members of the gang to have left in Japan without being in any danger of getting caught†by police. It?s unclear at this time who was behind the heist, what bank?s security was cracked, or who stole the credit card data to manufacture the fake credit cards.

Bangladesh Bank heist trail goes cold in Manila as probes falter

- Mon, 23 May 2016 19:07:07 -0400

A slot machine is pictured at Solaire Casino in Pasay City, Metro ManilaBy Raju Gopalakrishnan MANILA (Reuters) - More than three months have passed since $81 million was stolen in a brazen cyber-heist from Bangladesh's central bank and sent to Manila ? yet authorities in the Philippines appear no closer to nabbing those who laundered most of the money through a bank and casinos here. Nobody has been arrested, the National Bureau of Investigation (NBI) - the nation?s equivalent of the FBI - has not been allowed to get fully involved in the probe, and a Philippines Senate investigation petered out last week. Several official and private investigators said they had hoped to make headway by following the money trail in the Philippines, but they told Reuters it has gone cold.


NY lawmaker warns on U.S. financial security after SWIFT attacks

- Mon, 23 May 2016 19:01:29 -0400

Photo illustration of the SWIFT logoRecent hacks of international banks through the SWIFT messaging system raise serious questions about cyber-related risks to U.S. firms, Representative Carolyn Maloney wrote on Monday in a letter to the country's top banking regulators that asked about measures to strengthen systems' security. Maloney, a Democrat who represents part of Manhattan - home to many people employed in finance and banking - wrote to Federal Reserve Chair Janet Yellen, U.S. Comptroller Thomas Curry and Federal Deposit Insurance Corporation Chairman Martin Gruenberg that she remains "deeply concerned about U.S. banks' exposure to these new, sophisticated cyber attacks." The SWIFT network that allows banks to process billions of dollars in transfers each day is considered the backbone of international banking.


Whatever you do, don?t buy these smartphones

- Mon, 23 May 2016 18:00:18 -0400

There is nothing in consumer tech right now that's as hot as the smartphone market, even as it nears saturation in many regions, and the real beauty of it is that there are so many options. Every company out there wants a piece of the action and they're all looking for ways to differentiate their products, so there really is something for everyone. It's not easy to make a choice that can truly be considered wrong since different people have different needs and wants, but there is one line of smartphones that people probably shouldn't bother with unless they having a burning desire to dump hundreds of dollars into a dead platform. As noted by market research firm Gartner, Windows Phone's share of the global smartphone market actually fell below 1% this past quarter for the first time ever, market yet another stop on Microsoft's one-way trip†to smartphone irrelevance. As such, the worst mistake you can make when buying a new phone is to buy†a Windows Phone, unless you're fine with burning cash on a platform that's on its way out. Actually, there is one smartphone platform that somehow has an even lower share of the global market†?†BlackBerry OS ? but it's so low that it's not even worth discussing anymore. HUGE LEAK:† This is our first look at a real iPhone 7 According to Gartner's estimates , smartphone shipments grew 3.9% in the first quarter of 2016 compared the same quarter one year earlier. That seems like a small figure, but it's pretty impressive when you consider how far iPhone sales fell between January and March . Gartner says total "smartphone sales," which is a figure that actually includes end-user iPhone sales and estimated channel sales for other brands, reached†349 million units in the quarter. Samsung led the way with estimated shipments totaling 81 million units, which is indeed a massive number that was bolstered by the launch of the Galaxy S7 and Galaxy S7 edge. Chinese Android brands grew too fast in the quarter though, so Samsung's global market share actually fell to 23.2% in the first quarter from 24.1% in the same quarter last year. Meanwhile, Apple's global smartphone market share saw a much bigger drop, from 17.9% in Q1 2015 to 14.8% in Q1 2016. "In a slowing smartphone market where large vendors are experiencing growth saturation, emerging brands are disrupting existing brands' long-standing business models to increase their share," Gartner research director†Anshul Gupta. "With such changing smartphone market dynamics, Chinese brands are emerging as the new top global brands. Two Chinese brands ranked within the top five worldwide smartphone vendors in the first quarter of 2015, and represented 11 percent of the market. In the first quarter of 2016, there were three Chinese brands ? Huawei, Oppo and Xiaomi ? and they achieved 17 percent of the market."

Correction: Campaign 2016-Foreign Hacking story

- Mon, 23 May 2016 11:30:08 -0400

FILE - In this Feb. 9, 2016 file photo, Director of the National Intelligence James Clapper speaks on Capitol Hill in Washington. Clapper said Wednesday,May 18, 2016, that the U.S. has already seen evidence that cyber hackers, possibly working for foreign governments, are snooping on the presidential candidates, and government officials are working with them to tighten security as they expect the problem to grow as the campaigns intensify. (AP Photo/Alex Brandon, File)WASHINGTON (AP) ? In a story May 18 about possible foreign hacking into presidential campaigns, The Associated Press used the wrong configuration for the name of the chief executive officer of PKWARE. His name is V. Miller Newton, not V. Newton Miller.


Hackers probe defenses of Middle East banks : FireEye

- Mon, 23 May 2016 06:27:21 -0400

A magnifying glass is held in front of a computer screen in this picture illustration taken in BerlinHackers are probing the defenses of banks in the Middle East, targeting employees with infected emails which gather information about the banks' network and user accounts, FireEye researchers said.† FireEye, a U.S. cyber security company investigating the February attack on Bangladesh's central bank in which hackers stole $81 million, said there was no apparent connection with the heist or related attacks on banks in Ecuador and Vietnam. A FireEye spokesman said Qatar National Bank was not one of the "several banks" in the Middle East where researchers had found the malware.


To halt smartphone slide, Samsung rewrites playbook

- Sun, 22 May 2016 22:45:21 -0400

File photo of a model posing for photographs with Samsung Electronics' new smartphone Galaxy S7 during its launching ceremony in SeoulBy Se Young Lee SEOUL (Reuters) - From the way it chooses smartphone components to the models it brings to market, Samsung Electronics has undergone a painful process of breaking from its past to reverse a slide in its handset business. For example, the world's largest smartphone maker agonized over camera specs for its flagship Galaxy S7 until the last moment - ultimately defying industry convention by opting for fewer pixels in exchange for improved autofocus features and low-light performance, a move that contributed to early success. "We've now gotten to a point where we can secure a baseline profit even if the market stagnates, so long as we don't make a bad mistake," said Kim Gae-youn, vice president in charge of Samsung's smartphone product planning.


Apple CEO Cook, Indian Prime Minister Modi meet in New Delhi

- Sat, 21 May 2016 08:52:12 -0400

FILE - In this April 30, 2015 file photo, Apple CEO Tim Cook responds to a question during a news conference at IBM Watson headquarters, in New York. Apple CEO Tim Cook laid out his company?s plans for the vast Indian market in a meeting Saturday, May 21, 2016, with Prime Minister Narendra Modi, who in turn sought Apple's support for his "Digital India" initiative focusing on e-education, health and increasing farmers' incomes. (AP Photo/Richard Drew, File)NEW DELHI (AP) ? Apple CEO Tim Cook laid out his company's plans for the vast Indian market in a meeting Saturday with Prime Minister Narendra Modi, who in turn sought Apple's support for his "Digital India" initiative focusing on e-education, health and increasing farmers' incomes.


SWIFT tells banks to share information on hacks

- Fri, 20 May 2016 19:26:31 -0400

Photo illustration of the SWIFT logoBy Tom Bergin LONDON (Reuters) - International financial messaging service SWIFT told clients on Friday to share information on attacks on the system to help prevent hacking, after criminals used SWIFT messages to steal $81 million from the Bangladesh central bank. Earlier on Friday, Reuters reported that Wells Fargo, Ecuador's Banco del Austro (BDA) and Citibank, whose managing director, Franchise Risk & Strategy, Yawar Shah, is SWIFT's chairman, did not inform SWIFT of an attack last year in which more than $12 million was stolen from BDA. The network is considered the backbone of international finance but faith in its security has been rocked by the theft from Bank Bangladesh's account at the Federal Reserve Bank of New York.