IANS Blog RSS Feed

http://www.iansresearch.com

Poulin to CSO: We Hacked a Smart Building Using ?Old-School? Techniques

- Thu, 11 Feb 2016 00:00:00 GMT

The ?smarter? buildings get, the easier they are to hack? Maybe. IANS Faculty Chris Poulin, research strategist for IBM?s X-Force ethical hacking team, recently spoke to CSO?s Maria Korolov about a penetration test in which his team was able to gain access to all of the buildings operated by a building management company.

Privacy, Security Concerns Rise as States Mull Encryption Backdoor Requirements

- Wed, 27 Jan 2016 00:00:00 GMT

National Data Privacy Day (January 28th) certainly comes at an interesting time this year, as legislators in two of the most technology-centric U.S. states recently introduced similar bills that would force smartphone manufacturers to include encryption backdoors in their devices.

Fledgling Cyber-Insurance Market Tested by Early Denials, Lawsuits

- Wed, 20 Jan 2016 00:00:00 GMT

Cybersecurity insurance policies may be relatively new, but they have one important thing in common with established, legacy business coverage: They live and die in the fine print.

Hacker-Caused Ukrainian Power Outage Marks First Known Attack With Immediate, Direct Public Impact

- Tue, 05 Jan 2016 00:00:00 GMT

Security researchers have confirmed that a recently updated version of the highly destructive BlackEnergy malware package infected the systems of at least three power authorities in Ukraine, causing a massive outage that left thousands of homes in the Ivano-Frankivsk region of the country without electricity. 

Top 10 IANS Insights from a Tumultuous 2015

- Mon, 28 Dec 2015 00:00:00 GMT

Another year is in the books and what a year it was for infosec pros. From the Ashley Madison hack to the OPM breach, to Jeep commandeering and mysterious backdoors in popular networking gear, every week brought a new security twist that forced us all to keep our heads on swivels.

Herold: Misguided CISA Heightens Security, Privacy Concerns

- Mon, 21 Dec 2015 00:00:00 GMT

The controversial Cybersecurity Information Sharing Act (CISA) is now the law of the land, slipped into an eleventh-hour spending bill designed to keep the federal government running through 2016.

Patch Now: Rogue Code Leaves Gaping Hole in Juniper Gear

- Fri, 18 Dec 2015 00:00:00 GMT

Juniper Networks says unauthorized code could allow attackers to gain administrative access to its NetScreen appliances and decrypt VPN connections without leaving any trace of their actions. Users are urged to apply fixes immediately.

Poulin: Time to Realistically Acknowledge Vehicle Vulnerabilities

- Wed, 16 Dec 2015 00:00:00 GMT

The images and breathless banter were difficult to ignore: celebrity security researchers gaining remote command of an automobile, disrupting on-board systems before forcing the vehicle and its helpless driver into a ditch.

NIST to Infosec Pros: How Is Our Framework Working?

- Mon, 14 Dec 2015 00:00:00 GMT

The National Institute of Standards and Technology is asking infosec practitioners in the public and private sectors to comment on the efficacy of its cybersecurity framework as it prepares to update the popular, two-year-old document.

As Ransomware Attacks Evolve, Security Teams Must Prepare For New ?Drive-By? Tactics

- Thu, 10 Dec 2015 00:00:00 GMT

Another week, another evolution of the popular ransomware attacks. When we last wrote about it, researchers had discovered a new iteration ? ?Linux.Encoder.1? ? that enabled attackers to inject malware into Linux-powered websites and encrypt all files in the home and backup directories. Now, it appears the popular exploit kit Angler is being used to spread the latest version of CryptoWall and other ransomware on websites as part of ?drive-by? campaigns that begin with the deployment of password-stealing malware. 

Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

Ransom.Nagini

- Wed, 28 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Ehdoor

- Thu, 29 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Downloader.Quanader

- Tue, 27 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Downloader.Quanader!g1

- Tue, 27 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.Cridex!gen10

- Mon, 26 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Worm.

Exp.CVE-2016-4282

- Mon, 26 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.MarsJoke

- Mon, 26 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Minzen

- Mon, 26 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Poweliks!gen2

- Sat, 17 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Heur.RGC!g224

- Sat, 17 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.JSDownloader!g9

- Wed, 21 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspLaunch!g14

- Wed, 21 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.BC.CryptDrop!g6

- Wed, 21 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.BC.Cryptlk!g4

- Wed, 21 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g93

- Wed, 21 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlk.NCod!g1

- Wed, 21 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.WMPlayer!gen1

- Wed, 21 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g313

- Wed, 21 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g61

- Wed, 21 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g94

- Wed, 21 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g98

- Wed, 21 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlk.AF!g2

- Wed, 21 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g317

- Wed, 21 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Elibokof

- Thu, 22 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Bayrob!g13

- Thu, 22 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.Oldigork

- Thu, 22 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Worm.

SONAR.Kwampirs!g1

- Wed, 21 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Bayrob!g12

- Tue, 20 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.Locky!g19

- Tue, 20 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Batel

- Tue, 20 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Mdropper!gen5

- Tue, 20 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Kotver!lnk

- Tue, 20 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.HDDCryptor

- Sat, 17 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Heur.RGC!g214

- Sat, 17 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g244

- Sat, 17 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Linux.Trojan

- Sat, 17 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.Locky!g17

- Wed, 14 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Odinaff!gm

- Wed, 14 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.Cry!gm

- Wed, 14 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Dualtoy

- Wed, 14 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.Kawaii

- Mon, 12 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Riccietex

- Mon, 12 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.Philadelphia

- Sat, 17 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Linux.Luabot

- Sat, 10 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Cryptlocker!g79

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g65

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g328

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.BC.CryptDrop!g5

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g63

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g241

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g250

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g270

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g209

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.JSDownloader!g5

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g293

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MultiExt!gen4

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MSWord!g17

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.ProcHijack!gen8

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Shellcode!gen1

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen62

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen64

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SusTraffic!gen4

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SusTraffic!gen5

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.C!g19

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heuristic.152

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heuristic.154

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Bayrob!g11

- Thu, 8 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.Cry

- Wed, 7 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Pandemiya!g1

- Mon, 5 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Linux.Umreon

- Mon, 5 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Bloodhound.Exploit.574

- Fri, 2 Sep 2016 00:00:00 +0000

Risk Level: Very Low.

Ransom.Fsociety

- Sat, 3 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3294

- Thu, 15 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3375

- Thu, 15 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3247

- Thu, 15 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3351

- Thu, 15 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3377

- Thu, 15 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3324

- Thu, 15 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3297

- Thu, 15 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3295

- Thu, 15 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.Serpico

- Fri, 2 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

Samsung slammed by Chinese state TV over Note 7 recall 'discrimination'

- Fri, 30 Sep 2016 02:31:08 -0400

A Samsung Electronics' Galaxy Note 7 new smartphone is displayed at its store in SeoulBy Sijia Jiang HONG KONG (Reuters) - Chinese state broadcaster CCTV has slammed South Korean tech giant Samsung Electronics Co for what it said was "discrimination" against China consumers in its handling of a global recall of Galaxy Note 7 smartphones to replace batteries. In a commentary piece posted on its website on Thursday evening, CCTV said Samsung's behavior in China after the Sept. 2 recall of 2.5 million phones was "full of arrogance". CCTV said a video apology Samsung issued to U.S. consumers, along with various replacement options and compensation, was in stark contrast to its treatment of those in China, where the company issued a brief statement saying most phones didn't need to be replaced.


U.S. to open new vetting agency for 'secret' security clearances

- Thu, 29 Sep 2016 16:13:06 -0400

By Mark Hosenball WASHINGTON (Reuters) - The U.S. government will open the doors next week to a new agency, with stronger data protections, meant to shorten by many weeks the time it takes to vet government workers seeking "secret" and "top secret" security clearances. The National Background Investigations Bureau will be headed by Charles Phalen, who has worked as a security executive at the CIA, the FBI and defense contractor Northrop Grumman, officials said on Thursday on a conference call with reporters. The bureau will replace an Office of Personnel Management (OPM) clearance system that was hit by hackers who stole potentially sensitive personal data on as many as 22 million people, including government employees and job applicants.

Why Won?t Trump Blame the DNC Hack on Russia?

- Thu, 29 Sep 2016 14:14:00 -0400

After FBI Director Jim Comey warned a congressional panel on Wednesday that hackers are ?poking around? voter-registration systems in various states, law-enforcement officials told CNN that the U.S. suspects Russian involvement. ABC News reported that nearly half of U.S. states have come under cyberattack from hackers affiliated with Russia, which helps explain Comey?s comment during Wednesday?s hearing that the FBI is looking into ?just what mischief is Russia up to in connection with our election.?

Banks tighten SWIFT system security after hacks

- Thu, 29 Sep 2016 13:56:48 -0400

Swift code bank logo is displayed on an iPhone 6s on top of Euro banknotes in this picture illustrationBanks are tightening the security of their SWIFT messaging networks ? used by the industry to shift trillions of dollars each day ? following revelations that hackers are increasingly able to get into this system to steal money. Bankers at SWIFT's annual SIBOS conference in Geneva said they were adopting new security tools, reviewing procedures and pressing their counterparties to do the same. Some banks are also looking at alternative technologies for transferring money, such as blockchain-type systems.


Wife of officer charged in shooting details threats, bills

- Thu, 29 Sep 2016 12:15:35 -0400

FILE - In this Tuesday Sept. 20, 2016, file photo, defendants Keith Sandy, former Albuquerque Police Department detective and former Repeat Offender Project officer, left, and Dominique Perez, right, former Albuquerque police officer and SWAT member are seen in court in Albuquerque, N.M. Sandy and Dominique Perez are charged with the 2014 fatal shooting of an armed, homeless man, James Boyd. Defense attorneys have argued that Boyd, who was mentally ill and had history of violence against law enforcement, was a threat. Perez?s legal team began laying out its case Wednesday, Sept. 28, saying he was obligated to shoot to protect the life of a K-9 handler. (Jim Thompson/The Albuquerque Journal via AP, Pool, File)ALBUQUERQUE, N.M. (AP) ? The telephone death threats to the home of Officer Dominique Perez began soon after he and an Albuquerque police detective ended a hillside standoff by opening fire on a homeless man who died after being hit in the arms and back.


Car industry shows off cooperation as way to rival technology firms

- Thu, 29 Sep 2016 10:16:11 -0400

Graphic depicts the range of sensor information feeding a new set of live traffic servicesBy Edward Taylor and Eric Auchard PARIS/FRANKFURT (Reuters) - Alarmed by the threat posed by Silicon Valley firms developing autonomous driving systems, carmakers at this week's Paris Motor Show showed signs they are ready to hit back by cooperating in areas where they might have been expected to compete. "This is how the automotive industry may be able to fight off the threat that Apple and particularly Google represent to their brands as digital services become more and more important," technology investment analyst Richard Windsor said. BMW , Daimler and VW's Audi announced this week they would launch new traffic monitoring services next year which give drivers a view of road conditions miles ahead.


Clinton vows to retaliate against foreign hackers

- Thu, 29 Sep 2016 03:44:30 -0400

In this Sept. 26, 2016, photo, Democratic presidential candidate Hillary Clinton answers a question during the presidential debate with Republican presidential candidate Donald Trump at Hofstra University in Hempstead, N.Y. Clinton has vowed to respond to foreign hacking the same as any other attack against the United States. She?s openly blamed Russia for recent U.S. cyber break-ins while Donald Trump wondered if overseas governments or overweight hackers at home were responsible. (AP Photo/David Goldman)WASHINGTON (AP) ? Hillary Clinton is vowing anew to respond to foreign hacking the same as any other attack against the United States. When she openly blamed Russia for recent U.S. cyber break-ins, Donald Trump wondered whether to blame overseas governments or overweight hackers working from home.


The most dangerous celebrities to look up on Google

- Wed, 28 Sep 2016 20:30:56 -0400

One of the more common ways that purveyors of malware are able to trick unsuspecting users into downloading malicious software is to prey upon the public?s insatiable appetite for celebrity news, photos and gossip. As a result, some celebrity-oriented search queries tend to be associated with a greater likelihood of downloading malware than others. As Intel notes , malicious actors are quick to put up websites ?loaded with malware that can steal passwords and personal information,? especially in the days preceding new movie and music releases and in the days following a major celebrity breakup a?la the recent divorce news involving Brad Pitt and Angelina Jolie. DON'T MISS:  An Apple employee just leaked details about the iPhone 8 Earlier today, Intel published its list of the ?most dangerous celebrities? to search for, and checking in at the top of the list is comedian Amy Schumer. Filling out the top 10 are Justin Bieber, Carson Daly, Will Smith, Rhianna, Miley Cyrus, Chris Hardwick, Danieth Tosh, Selena Gomez  and Kesha. All in all, the list isn?t too surprising, though the presence of Carson Daly at number three is somewhat startling. Looking specifically at musicians, artists of note that didn?t crack the top-10 still include a who?s who of entertainers. This year?s riskiest celebrities included some of the most sensational, chart-topping pop artists such as Justin Bieber (No. 2), Rihanna (No. 5), Miley Cyrus (No. 6), Selena Gomez (No. 9) and Kesha (10). Pop, rap, hip-hop and a bit of country were represented by Drake (No. 13), Katy Perry (No. 14), Jason Aldean (No. 16), Justin Timberlake (No. 17), Jennifer Lopez (No. 18), Lady Gaga (No. 19), Nicki Minaj (No. 20), Iggy Azalea (No. 27), Beyoncé (No. 28) and Usher (No. 29) as they rounded out the top 30. While it should go without saying, Intel urges users to only click on search results from reputable sites and, naturally, to avoid any and all Torrent links.

HP promises fix for printer software that barred outside ink

- Wed, 28 Sep 2016 18:32:13 -0400

SAN JOSE, Calif. (AP) ? HP Inc. has apologized to customers for a software update that made some of its printers stop working with ink cartridges from competing suppliers, even if the printers had accepted the same cartridges in the past.

Cyber firm challenges Yahoo claim hack was state-sponsored

- Wed, 28 Sep 2016 17:42:14 -0400

File photo of a man walking past a Yahoo logo during the Mobile World Congress in BarcelonaBy Dustin Volz WASHINGTON (Reuters) - A cyber security company on Wednesday asserted that the hack of 500 million account credentials from Yahoo was the work of an Eastern European criminal gang, adding another layer of intrigue to a murky investigation into the unprecedented data heist. Arizona-based InfoArmor issued a report whose conclusion challenged Yahoo?s position that a nation-state actor orchestrated the heist, disclosed last week by the internet company. InfoArmor, which provides companies with protection against employee identify theft, said the hacked trove of user data was later sold to at least three clients, including one state-sponsored group.


FBI director: More 'attempted intrusions' in voter databases

- Wed, 28 Sep 2016 16:58:16 -0400

FBI Director James Comey testifies on Capitol Hill in Washington, Wednesday, Sept. 28, 2016, before the House Judiciary Committee hearing on 'Oversight of the Federal Bureau of Investigation.' (AP Photo/Pablo Martinez Monsivais)WASHINGTON (AP) ? FBI Director James Comey says there have been additional "attempted intrusions" into voter registration databases beyond what was previously known, and that the agency is looking "very, very hard" at Russian hackers who may try to disrupt the U.S. election.


The Latest: Minnesota weather making Europeans feel at home

- Wed, 28 Sep 2016 16:52:06 -0400

A replica of the Ryder Cup is seen on a cloudy day Wednesday, Sept. 28, 2016, at Hazeltine National Golf Club in Chaska, Minn. (AP Photo/Charlie Riedel)CHASKA, Minn. (AP) ? The Latest on the Ryder Cup (all times local):


See how Google?s new Pixel phones stack up to last year?s Nexus phones

- Wed, 28 Sep 2016 16:37:35 -0400

Google is ditching Nexus branding on this year's new smartphones in favor of a new "Pixel" moniker. The devices also come with a new pitch. They?re no longer pure Android devices, nor are they affordable. The Pixel and Pixel XL will be high-end smartphones that are meant to rival the iPhone 7 and this year?s top Android devices. We?ve already seen them pop up in several leaks, but now it's time to see exactly how Google's two new Pixel phones measure up to last year's Nexus handsets. DON?T MISS: An Apple employee just leaked details about the iPhone 8 In 2015, Google released the Nexus 5X and Nexus 6P made by LG and Huawei, respectively. These are 5.2-inch and 5.7-inch handsets that?ll be slightly bigger than their Pixel-branded alternatives. The Pixel, also known as the Sailfish, is supposed to have a 5-inch display. The Pixel XL, or the Marlin, will have a 5.5-inch screen. Android Central  used the recently leaked Pixel and Pixel XL press renders to compare them to last year?s Nexus devices ? as seen in the image at the top of this post. From left to right, we have the Pixel, the Nexus 5X, the Pixel XL and the Nexus 6P. We will point out that we don?t have the official specs list for the Pixel handsets, which means their exact dimensions aren?t known at this time. But the image above is still useful, as it gives us a general idea of what to expect from Google?s next-gen flagship smartphones when it comes to size and pocketability. Google will unveil the Pixel and Pixel XL on October 4th during a special media event that?s also supposed to bring us at least one big surprise as well.

Pro-Assad Syrian pleads guilty in US to role in hacking

- Wed, 28 Sep 2016 16:12:37 -0400

ALEXANDRIA, Va. (AP) ? A Syrian national pleaded guilty Wednesday to federal charges for his role in a scheme that hacked computers and targeted perceived enemies of Syrian President Bashar al-Assad.

Syrian hacker sympathetic to Assad pleads guilty in U.S. court

- Wed, 28 Sep 2016 14:51:15 -0400

A computer hacker sympathetic to Syrian President Bashar al-Assad's government pleaded guilty for his role as a middleman in an extortion scheme targeting U.S. media outlets and governments, the U.S. Department of Justice said on Wednesday. It said in a statement that Peter Romar, 37, was a member of the Syrian Electronic Army hacking group and had joined an operation to infiltrate computers of Assad's "perceived detractors" in the media, U.S. government and other governments. Romar's guilty plea was entered in the U.S. District Court for the Eastern District of Virginia.

WADA says electronic database is safe despite cyber attack

- Wed, 28 Sep 2016 10:41:08 -0400

PARIS (AP) ? Despite the hack of personal medical information from some of the world's leading athletes, the World Anti-Doping Agency says its overall electronic database is safe.

WADA defends TUE system after leaked data

- Wed, 28 Sep 2016 10:28:21 -0400

A woman walks into the head offices of WADA in MontrealThe World Anti-Doping Agency (WADA) on Wednesday defended the Therapeutic Use Exemption (TUE) system after some athletes' confidential medical data was leaked by a group of Russian hackers, shedding light on potential abuse. A group identified as APT28 and Fancy Bear by U.S. cyber-security researchers revealed TUEs for leading athletes including Tour de France cycling champions Chris Froome and Bradley Wiggins and tennis grand slam winners Serena Williams and Rafa Nadal. "TUEs fall under international standards... They are scrutinized by the medical community," WADA Senior Science Director Olivier Rabin told a joint news conference with International Bureau of Weights and Measures (BIPM).


Doping-WADA defends TUE system after leaked data

- Wed, 28 Sep 2016 10:24:01 -0400

The World Anti-Doping Agency (WADA) on Wednesday defended the Therapeutic Use Exemption (TUE) system after some athletes' confidential medical data was leaked by a group of Russian hackers, shedding light on potential abuse. A group identified as APT28 and Fancy Bear by U.S. cyber-security researchers revealed TUEs for leading athletes including Tour de France cycling champions Chris Froome and Bradley Wiggins and tennis grand slam winners Serena Williams and Rafa Nadal. "TUEs fall under international standards... They are scrutinised by the medical community," WADA Senior Science Director Olivier Rabin told a joint news conference with International Bureau of Weights and Measures (BIPM).

Galaxy Note 7 explosions in China sends customers running to the iPhone 7

- Wed, 28 Sep 2016 08:49:31 -0400

China is the one major market that was not affected by the massive Galaxy Note 7 recall. Samsung said the phones in the region are safe because they contain batteries made by a local supplier, not Samsung SDI. The Samsung subsidiary made the exploding batteries that equipped Galaxy Note 7 units sold outside of China, which is why Galaxy Note 7 sales were not interrupted in the country. But recent Galaxy Note 7 explosions in China may end up hurting Samsung anyway. DON?T MISS: One of the iPhone 8?s hottest new features was just unveiled by another company Samsung did not recall the phones sold to Chinese buyers and explained in recent days that the explosions within China were related to external heating . But the company did not fully explain what really happened. Even worse, a new Galaxy Note 7 went up in flames  days after Samsung released a press statement saying the battery was not at fault. Consulting firm  iiMedia Research found that Chinese buyers may be willing to switch to some of Samsung?s competitors in the near future, following the Galaxy Note 7 explosions. iiMedia asked 12,000 Samsung users in China whether the Galaxy Note 7 issues have affected their decision to stick with the company. 51.9% of respondents said they would definitely switch away from the brand. Samsung stated that 90% of the Galaxy Note 7 buyers who had to exchange the phone remained loyal to the brand so far. But it looks like Chinese consumers may think differently. Of the people who said they would switch to a different smartphone maker, 37% stated that they would buy an iPhone, and 26% will get a Huawei handset. Others picked local brands including Oppo, Vivo, Xiaomi and Meizu.

Galaxy Note 7 explosions in China send customers running to the iPhone 7

- Wed, 28 Sep 2016 08:49:31 -0400

China is the one major market that was not affected by the massive Galaxy Note 7 recall. Samsung said the phones in the region are safe because they contain batteries made by a local supplier, not Samsung SDI. The Samsung subsidiary made the exploding batteries that equipped Galaxy Note 7 units sold outside of China, which is why Galaxy Note 7 sales were not interrupted in the country. But recent Galaxy Note 7 explosions in China may end up hurting Samsung anyway. DON?T MISS: One of the iPhone 8?s hottest new features was just unveiled by another company Samsung did not recall the phones sold to Chinese buyers and explained in recent days that the explosions within China were related to external heating . But the company did not fully explain what really happened. Even worse, a new Galaxy Note 7 went up in flames  days after Samsung released a press statement saying the battery was not at fault. Consulting firm  iiMedia Research found that Chinese buyers may be willing to switch to some of Samsung?s competitors in the near future, following the Galaxy Note 7 explosions. iiMedia asked 12,000 Samsung users in China whether the Galaxy Note 7 issues have affected their decision to stick with the company. 51.9% of respondents said they would definitely switch away from the brand. Samsung stated that 90% of the Galaxy Note 7 buyers who had to exchange the phone remained loyal to the brand so far. But it looks like Chinese consumers may think differently. Of the people who said they would switch to a different smartphone maker, 37% stated that they would buy an iPhone, and 26% will get a Huawei handset. Others picked local brands including Oppo, Vivo, Xiaomi and Meizu.

Europol: Ransomware now top cybercrime threat

- Wed, 28 Sep 2016 07:52:14 -0400

PARIS (AP) ? European police agency Europol says the threat from ransomware has now eclipsed other forms of online theft, a sign of how quickly the computer-scrambling software has found favor in the electronic underworld.

The Company That Wants to Fight Your Medical Bills

- Wed, 28 Sep 2016 07:00:00 -0400

If you?re the special kind of person who?s interested in medical billing, I?ve had an exciting past few months. One day this spring, I was frantically chopping carrots after work when I noticed that my left hand was covered in lukewarm blood. When I washed it off, I saw my skin splaying open to reveal my pale-blue thumb joint. That necessitated not one, but two trips to an urgent-care center, a strange hybrid of an emergency room and doctor?s office where payment can be similarly muddled.

Exclusive: U.S. seeks accused Manila banker's help to crack Bangladesh heist

- Wed, 28 Sep 2016 06:37:35 -0400

Maia Santos Deguito, a branch manager of the Rizal Commercial Banking Corp testifies during a Senate hearing on the money laundering involving $81 million stolen from Bangladesh central bank, at the Philippine Senate in ManilaThe FBI is negotiating with a former branch manager of a Philippines bank for information relating to $81 million that she handled after it was stolen from the Bangladesh central bank's account at the New York Federal Reserve, her lawyer said. Federal Bureau of Investigation officials have presented a "proffer", or proposal, to the branch manager, Maia Deguito, to tell them all she knows about who received the money, the attorney, Ferdinand Topacio, told Reuters. According to Topacio, U.S. investigators are trying to get Deguito, who has been fired by the Rizal Commercial Banking Corp (RCBC) for her role in the case, to share details about long-time bank client Kim Wong, who is a casino owner and agent.


Factbox: Clinton's policies on economy, Islamic State, other issues

- Wed, 28 Sep 2016 05:41:44 -0400

Democratic presidential candidate Hillary Clinton has pledged to raise taxes on the wealthy, preserve the Dodd-Frank financial reform law and provide a path to citizenship for undocumented workers. Here are the proposals the former secretary of state has made as part of her argument that she is best qualified to occupy the Oval Office: ECONOMIC POLICY Clinton has said the rich, not the middle class, would see their taxes go up. Clinton has also called for an additional 4 percent tax on those making more than $5 million annually.

At your service: cyber criminals for hire to militants, EU says

- Wed, 28 Sep 2016 02:11:57 -0400

File photo of a magnifying glass held in front of a computer screen in this picture illustration taken in BerlinCybercriminals offering contract services for hire offer militant groups the means to attack Europe but such groups have yet to employ such techniques in major attacks, EU police agency Europol said on Wednesday. "There is currently little evidence to suggest that their cyber-attack capability extends beyond common website defacement," it said in its annual cybercrime threat assessment in a year marked by Islamic State violence in Europe. "Europol is concerned about how an expanding cybercriminal community has been able to further exploit our increasing dependence on technology and the internet," its director, Rob Wainwright, said in a statement.


Amy Schumer most dangerous celebrity online

- Wed, 28 Sep 2016 01:18:49 -0400

FILE - In this Jan. 17, 2016 file photo, Amy Schumer accepts the Critics' Choice MVP award at the 21st annual Critics' Choice Awards in Santa Monica, Calif. Schumer is the most dangerous celebrity on the internet - and not just because of her no-holds-barred personality. Intel Security announced Wednesday, Sept. 28, that the actress-comedian topped its 10th annual list of the most dangerous celebrities online. (Photo by Chris Pizzello/Invision/AP, File)LOS ANGELES (AP) ? Amy Schumer is the most dangerous celebrity on the internet ? and not just because of her no-holds-barred personality.


FBI probes hacks targeting phones of Democratic Party officials: sources

- Tue, 27 Sep 2016 22:28:16 -0400

The headquarters of the Democratic National Committee is seen in WashingtonBy Mark Hosenball WASHINGTON (Reuters) - The FBI is investigating suspected attempts to hack mobile phones used by Democratic Party officials as recently as the past month, four people with direct knowledge of the attack and the investigation told Reuters. The revelation underscores the widening scope of the U.S. criminal inquiry into cyber attacks on Democratic Party organizations, including the presidential campaign of its candidate, former U.S. Secretary of State Hillary Clinton. U.S. officials have said they believe those attacks were orchestrated by hackers backed by the Russian government, possibly to disrupt the Nov. 8 election in which Clinton faces Republican Party candidate Donald Trump.


Justice Dept. top national security official to leave post

- Tue, 27 Sep 2016 21:04:31 -0400

The Justice Department's top national security official is leaving his position next month, the department announced Tuesday. John Carlin, who has led the department's national security division since ...

Password breach could have ripple effects well beyond Yahoo

- Tue, 27 Sep 2016 19:44:13 -0400

FILE - This Jan. 14, 2015 file photo shows Yahoo's headquarters in Sunnyvale, Calif. As investors and investigators weigh the damage of Yahoo's massive breach to the internet icon, information security experts worry that the record-breaking haul of password data could be used to open locks up and down the web. While it's unknown to what extent the stolen data has been or will be circulating, giant breaches can send ripples of insecurity across the internet. (AP Photo/Marcio Jose Sanchez, File)LONDON (AP) ? As investors and investigators weigh the damage of Yahoo's massive breach to the internet icon, information security experts worry that the record-breaking haul of password data could be used to open locks up and down the web.


Senators accuse Yahoo of 'unacceptable' delay in hack discovery

- Tue, 27 Sep 2016 17:23:56 -0400

File photo of Yahoo CEO Marissa Mayer delivering her keynote address at the annual Consumer Electronics Show (CES) in Las VegasBy Dustin Volz and Lisa Lambert WASHINGTON (Reuters) - Six senators on Tuesday demanded that Yahoo Inc explain why hackers' theft of user information for 500 million accounts two years ago came to light only last week and called the company's handling of the breach "unacceptable." The lawmakers, all Democrats, said they were "disturbed" that the 2014 intrusion, which was disclosed by the company on Thursday, was detected so long after it occurred. "That means millions of Americans? data may have been compromised for two years," the senators wrote in a letter to Yahoo Chief Executive Marissa Mayer. "This is unacceptable." A Yahoo spokesman said the company would respond in a "timely and appropriate manner" to the letter, which was signed by Senators Patrick Leahy, Al Franken, Elizabeth Warren, Richard Blumenthal, Ron Wyden and Edward Markey.


Senior national security official to leave Justice Department

- Tue, 27 Sep 2016 15:38:51 -0400

Carlin, flanked by Comey, addresses a news conference to announce indictments on Iranian hackers at the Justice Department in WashingtonBy Dustin Volz WASHINGTON (Reuters) - A senior U.S. Justice Department official who oversaw efforts to prosecute Islamic State sympathizers and pursue cyber criminals is leaving the Obama administration next month, he told Reuters on Tuesday. Assistant Attorney General John Carlin, chief of the national security division at the Justice Department, is departing on Oct. 15, less than a month before the U.S. presidential election. Carlin, who has served in government for more than 15 years, oversaw a range of prominent cases in three and a half years since assuming an acting rank of the Justice Department's top national security lawyer in March 2013, including the prosecution of one of the 2013 Boston Marathon bombers.


Forget Google?s Pixel phones, leak says the Nexus brand isn?t dead just yet

- Tue, 27 Sep 2016 14:39:24 -0400

The Pixel phones will replace Google's Nexus handsets this year, many recent reports have claimed, suggesting that the Nexus family of devices will be retired. However, Nexus isn?t as dead as we thought, as Google may be releasing several more Nexus brand devices in the very near future, complete with a few surprises. DON?T MISS: One of the iPhone 8?s hottest new features was just unveiled by another company Apparently, Huawei is working on a Nexus tablet that will run Andromeda out of the box. Andromeda is said to be the hybrid Android operating system that has Chrome OS features. Reports earlier this week indicated that Andromeda will represent a significant milestone for Android and that Google will unveil it on stage on October 4th . However, the first Andromeda device, a MacBook-killer , apparently won't launch until next summer. Meanwhile, 9to5Google learned that the Google will launch at least two Andromeda devices in the future, including the Huawei Nexus tablet mentioned above and the MacBook rival detailed on Monday. The Huawei Nexus tablet made the news a few weeks ago when recognized leaker Evan Blass tweeted about it , making it sound like a successor to the Nexus 7 tablet. The device may pack a 7-inch display and 4GB of RAM. People familiar with the matter  also told 9to5Google that a Nexus tablet is coming. Google is testing Andromeda on the Nexus 9, ?because of hardware constraints and availability,? according to one source, so the Nexus 9 will likely not get Andromeda. The Andromeda-powered Nexus tablet could launch by the end of the year, while the Andromeda Pixel 3 laptop that targets MacBook Pro users is likely almost a year away.

U.S. established working group to stop Middle East migrant smugglers

- Tue, 27 Sep 2016 13:47:32 -0400

Department of Homeland Security Secretary Johnson testifies before Senate Homeland Security and Governmental Affairs Committee in WashingtonDepartment of Homeland Security Secretary Jeh Johnson told a Senate panel on Tuesday the United States was cracking down on Middle Eastern migrants illegally crossing the southern U.S. border. Johnson, FBI Director James Comey and National Counterterrorism Center Director Nicholas Rasmussen all were pressed on a range of security issues by the Homeland Security Committee, including migration, cyber hackers manipulating voting systems and recent bombings in New York City and New Jersey.


Britain's fear of European army muddles EU defense plan

- Tue, 27 Sep 2016 10:55:37 -0400

German Defence Minister von der Leyen gestures to French Defence Minister Le Drian at the Munich Security Conference in MunichBy Robin Emmott and Sabine Siebold BRATISLAVA (Reuters) - Britain said on Tuesday it would oppose any EU proposals to combine European forces into a single army while it is still in the bloc, but France and Germany said no such plans existed and won support from NATO to strengthen EU defenses. At a meeting of EU defense ministers in Bratislava, Britain's Michael Fallon said it was up to NATO, not the European Union, to defend Europe against a more hostile Russia and that some northern and eastern EU countries agreed.


Tour winner Froome says anti-doping system 'open to abuse'

- Tue, 27 Sep 2016 08:07:16 -0400

LONDON (AP) ? Three-time Tour de France winner Chris Froome says the anti-doping system is "open to abuse" by letting athletes take banned substances as medication.

German carmakers and technology firms form 5G telecoms association

- Tue, 27 Sep 2016 06:50:36 -0400

IAA truck show in HanoverGerman car makers Audi, BMW and Daimler on Tuesday launched an alliance with mobile telecoms network equipment firms Ericsson , Huawei [HWT.UL], Intel , Nokia and Qualcomm to accelerate development of the infrastructure needed for self-driving cars. The new alliance, branded the 5G Automotive Association, will "develop, test and promote communications solutions, support standardization and accelerate commercial availability and global market penetration," the founders said in a statement. One of the aims of 5G, the technology standards for the next generation of much faster and more reliable mobile telecoms networks, is to enable a wide variety of devices to connect up and operate via the Internet - the "Internet of Things." Network equipment providers such as Ericsson and Nokia have said the 5G technology currently in development could be available for use as early as next year but mass-market upgrades to mobile networks are not expected until some time around 2020.


AP FACT CHECK: Trump, Clinton deny their own words in debate

- Tue, 27 Sep 2016 00:21:21 -0400

Donald Trump?s habit of peddling hype and fabrication emerged unabated in the first presidential debate while Hillary Clinton played it cautiously in her statements, though not without error. TRUMP, denying Clinton?s accusation that he supported the Iraq war: ?Wrong. THE FACTS: There is no evidence Trump expressed public opposition to the war before the U.S. invaded, despite his repeated insistence that he did.

Team Sky boss Brailsford defends Wiggins

- Mon, 26 Sep 2016 14:24:56 -0400

Cyclist Bradley Wiggins speaks on the BBC's Andrew Marr Show in this undated photograph received via the BBC in LondonDave Brailsford defended Bradley Wiggins and Team Sky on Monday over the 2012 Tour de France winner's use of medical exemptions to receive legal injections of a banned drug ahead of three major races. "It was not being used to enhance performance," the general manager told the BBC, adding that Team Sky "do not cross the line" when it comes to performance-enhancing drugs. Brailsford said Sky would seek to be more transparent in future about riders' use of Therapeutic Use Exemptions (TUEs).


Cycling-Team Sky boss Brailsford defends Wiggins

- Mon, 26 Sep 2016 14:15:35 -0400

* Brailsford defends Wiggins and Team Sky * Sky 'do not cross the line', says Briton (Adds more detail) LONDON, Sept 26 (Reuters) - Dave Brailsford defended Bradley Wiggins and Team Sky on Monday over the 2012 Tour de France winner's use of medical exemptions to receive legal injections of a banned drug ahead of three major races. "It was not being used to enhance performance," the general manager told the BBC, adding that Team Sky "do not cross the line" when it comes to performance-enhancing drugs. Brailsford said Sky would seek to be more transparent in future about riders' use of Therapeutic Use Exemptions (TUEs).

Get Started: Internet security bill may aid small businesses

- Mon, 26 Sep 2016 12:25:43 -0400

CYBERSECURITY BILL Small businesses would get more information from the government about internet security under a bill that has passed the U.S. House. The Improving Small Business Cyber Security Act of ...