IANS Blog RSS Feed

http://www.iansresearch.com

Adult Dating Site Hack Exposes Personal Information of Millions of Members

- Tue, 26 May 2015 00:00:00 GMT

How much would you pay to keep your company's name out of the Adult FriendFinder headlines? As has been reported all over the internet, ?dating? service Adult FriendFinder recently suffered a significant data breach, losing at least 3.5 million records and potentially its entire user database (if some rumors are true).

Health Insurer CareFirst Falls Victim to Data Breach

- Thu, 21 May 2015 00:00:00 GMT

The recent spate of cyberattacks targeting health insurers continues. CareFirst BlueCross BlueShield announced on Wednesday that it was victimized by a data breach in which more than 1 million records were stolen.

Dropbox for Business Granted International Cloud Security Certification

- Mon, 18 May 2015 00:00:00 GMT

Dropbox for Business has made no secret of its plans to expand internationally, and a new cloud security certification should only help the file sharing service realize these aspirations.

Report: Chinese Hacking Group Targeted Microsoft TechNet Forum

- Fri, 15 May 2015 00:00:00 GMT

It?s no surprise that online IT forums are popular targets for hackers. According to a new report, Microsoft?s TechNet forum is the latest to experience an attack, this time at the hands of Chinese hackers.

Aaron Turner to Deliver a Feature Presentation at ISSA-LA Information Security Summit

- Tue, 12 May 2015 00:00:00 GMT

When you think about the marvel that is the international cellular network, it is truly amazing to realize that the ability to communicate with one another is very nearly universal. But, as with any complex network, there are significant opportunities for attackers to exploit vulnerabilities in components of the system.

Appeals Court: NSA Phone Spying Illegal

- Fri, 08 May 2015 00:00:00 GMT

Nearly two years after Edward Snowden blew the lid off the National Security Agency?s (NSA) controversial phone spying program, an appeals court has determined the practice is illegal.

Tablet Glitch Grounds American Airlines Flights

- Wed, 29 Apr 2015 00:00:00 GMT

File this under the ?things we would have never expected to see a decade ago? category: A number of American Airlines flights were grounded last night due to a glitch that crashed iPad applications used by pilots.

Security Flaw Exposes Thousands of iOS Apps

- Mon, 27 Apr 2015 00:00:00 GMT

Another day, another security bug uncovered. This time, it?s thousands of iOS apps that are affected.

Raytheon to Acquire Websense as Part of Billion-Dollar Cybersecurity Venture

- Mon, 20 Apr 2015 00:00:00 GMT

What happens when you mix government with business? Raytheon, one of the largest defense contractors in the world, is determined to find out.

Verizon Report: Mobile Security Should Not Be Main Enterprise Focus

- Tue, 14 Apr 2015 00:00:00 GMT

Mobile security may be a hot topic these days, but enterprises should not be heavily focusing on it at this point. At least that?s what a new report from Verizon says.

Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

Trojan.Cryptolocker.U

- Thu, 28 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Linux.Moose

- Thu, 28 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Worm.

Trojan.Cidox!gen5

- Wed, 27 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Fitobrute

- Wed, 27 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Waketagat

- Tue, 26 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

SONAR.Infostealer!g6

- Tue, 26 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Worm.

SONAR.PUA!gen4

- Tue, 26 May 2015 00:00:00 -0700

Risk Level: Very Low.

SONAR.ProcHijack!gen6

- Tue, 26 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen330

- Tue, 26 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen412

- Tue, 26 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen575

- Tue, 26 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen582

- Tue, 26 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Nitovel

- Mon, 25 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Snikyprox

- Sat, 23 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Weevil!gen1

- Fri, 22 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Pollcrypto

- Wed, 20 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Wespion

- Wed, 20 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Noeskian

- Wed, 20 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Downloader.Escelar!g1

- Wed, 20 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Infostealer.Bancos!g1

- Wed, 20 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Infostealer.Stimaler

- Mon, 18 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Emulov

- Mon, 18 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

W97M.Downloader!gen1

- Mon, 18 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

OSX.Genieo!gen1

- Mon, 18 May 2015 00:00:00 -0700

Risk Level: Very Low.

Downloader.Upatre!g15

- Sat, 16 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Downloader.Picproot

- Sat, 16 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Yahamam

- Sat, 16 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Android.Becuro

- Wed, 13 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

W32.IRCBot!gen4

- Wed, 13 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Worm.

Backdoor.Tinybaron!g2

- Wed, 13 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Infostealer.Escelar

- Tue, 12 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Downloader.Escelar

- Tue, 12 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

W32.Droments

- Tue, 12 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Worm.

Trojan.Compfun

- Mon, 11 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Android.Dengaru

- Mon, 11 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

W32.Brambul

- Mon, 11 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Worm.

SONAR.Cryptolocker!g7

- Mon, 11 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen21

- Mon, 11 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen308

- Mon, 11 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen329

- Mon, 11 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen476

- Mon, 11 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen572

- Mon, 11 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen604

- Mon, 11 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen580

- Mon, 11 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen605

- Mon, 11 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Downloader.Upatre!g14

- Mon, 11 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Downloader.Bouncedoc

- Sat, 9 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Infostealer.Retga.A!gm

- Sat, 9 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

W32.Cridex!gen4

- Fri, 8 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Worm.

Trojan.Cryptolocker.S

- Thu, 7 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Linux.Mumblehard

- Thu, 7 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Packed.Generic.488

- Wed, 6 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Tinybaron!g1

- Wed, 6 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Packed.Dromedan!gen11

- Wed, 6 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-3043

- Wed, 6 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Infostealer.Retgate.A

- Tue, 5 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptlock.N!gm

- Fri, 1 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Werdlod

- Fri, 1 May 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Downloader.Upatre!gen12

- Thu, 30 Apr 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

Avago, Broadcom deal could put pressure on Qualcomm

- Thu, 28 May 2015 18:54:42 -0400

A man walks past Qualcomm stand while attending during the Mobile World Congress in BarcelonaAvago Technologies Ltd's $37 billion deal to buy chipmaker Broadcom Corp creates new competitive challenges for Qualcomm and may force the world's largest mobile chip maker to radically rethink its own strategy. Qualcomm Inc , which has dominated the market for connectivity chips on smartphones, has been looking to extend its reach into data centers and network infrastructure, but may find its way blocked by an enlarged competitor combining Avago's strength in storage and Broadcom's power in networking. "Qualcomm has aspirations of moving into Intel's data center processor incumbency that the Avago storage and now enterprise networking (from Broadcom) capability directly overlays," said Drexel Hamilton analyst Richard Whittington.


What Android M tells us about Google?s next Nexus phones

- Thu, 28 May 2015 18:40:58 -0400

Google did not announce any new Nexus devices on Thursday, though that?s hardly surprising considering its recent Google I/O history. However, the company?s newly unveiled Android M offers some clear hints at what to expect from this year?s Nexus handsets. DON?T MISS: Google may have just won the cloud wars with Google Photos Many reports this year said that Google wants to launch two Nexus smartphones, which would be a first for the company, including a 5.2-inch LG Nexus smartphone and a 5.7-inch Huawei phablet. Some of these reports mentioned certain specs for the handsets, including processor and screen choices, but nothing is confirmed yet. However, Google on stage detailed two major Android M features that should be available on next-gen

Sally Beauty says some payment cards 'at risk' in security breach

- Thu, 28 May 2015 17:34:12 -0400

(Reuters) - Sally Beauty Holdings Inc confirmed that criminals used malware at some of its point-of-sale systems between March 6 and April 17. "... Payment card information of customers that used cards at affected U.S. Sally Beauty stores during this time may have been put at risk," the company said. The company began investigating a possible security incident after it received reports of unusual activity in late April involving payment cards used at some of its U.S. stores.

After security scandal, a tech firm says it's changing focus

- Thu, 28 May 2015 17:26:30 -0400

SAN FRANCISCO (AP) ? A Silicon Valley startup says it's shutting down operations and shifting to a new business model after it was blamed earlier this year for turning unwitting computer users into targets for annoying web ads ? and hackers.

Almost anyone can make ransomware with this horrifying new program

- Thu, 28 May 2015 11:44:41 -0400

We might be entering a whole new era of malware, one where even those who lack any semblance of deep technical expertise will be able to acquire and disseminate viruses and the like on the fly. Speaking to this point, security researchers at McAfee recently discovered a new piece of software which makes it exceedingly easy for anyone to create their own ransomware. The online software, which runs on TOR, is called Tox and, believe it or not, is completely free to use. The developers of the software aim to make money on the back end by taking a cut of any successful ransomware campaigns its users run. Here?s how it all works. DON?T MISS: 10 Netflix movies you need to watch

China's Huawei sees strong smartphone growth in southeast Asia

- Thu, 28 May 2015 08:31:01 -0400

A worker adjusts the logo at the stand of Huawei at the CeBIT trade fair in HanoverChina's Huawei Technologies [HWT.UL], the world's No. 2 telecom equipment maker, expects total shipments of smartphones in southeast Asia to rise 160 percent to 8 million units in 2015, boosted by strong demand in Myanmar, it said on Thursday. In the first quarter, Huawei posted a 120 percent increase in smartphone shipments in the region, one of the most promising markets in the world, Thomas Liu, President for Huawei's southeast Asian consumer business group, told reporters. Liu was in Bangkok on Thursday to launch its flagship P8 smartphones in Thailand, the second largest market in southeast Asia.


U.S. IRS tax data hack traced to Russia: CNN

- Wed, 27 May 2015 17:27:26 -0400

People wait outside the Internal Revenue Service office in the Brooklyn borough of New YorkBy Lisa Lambert WASHINGTON (Reuters) - The U.S. Internal Revenue Service believes the theft of about 100,000 taxpayers' personal data from its computer system originated in Russia, CNN reported on Wednesday. The tax agency's criminal unit is leading an investigation into the cyber attack, in which criminals stole information through an online IRS application over the course of four months, and the Treasury Department's inspector general and the Department of Homeland Security are also looking into the breach, CNN said. On Wednesday, the IRS had no immediate comment to the CNN report.


Turn old iPhones into useful home security devices with Presence

- Wed, 27 May 2015 17:25:16 -0400

A new project on Indiegogo aims to improve home security by turning old iPhones and Android devices into security cameras and adding extra home sensors that can monitor certain activities. DON?T MISS: Watch a crazy iOS bug cause iPhones to crash just by receiving a text message Presence Security, available for preorder starting at $179 on Indiegogo, comes with a variety of wireless sensors that can be managed directly from a mobile app, including two entry sensors, a motion sensor, a gateway sensor and a window sticker sensor. The number of sensors can be further increased by selecting a more expensive package that can include water, touch and temperature sensors, and extra sensors should be added to Presence systems in

Yahoo must face email spying class action: U.S. judge

- Wed, 27 May 2015 14:08:03 -0400

The Yahoo logo is shown at the company's headquarters in SunnyvaleA U.S. judge ordered Yahoo Inc to face a nationwide class-action lawsuit accusing it of illegally intercepting the content of emails sent to Yahoo Mail subscribers from non-Yahoo Mail accounts, and using the information to boost advertising revenue. In a decision late Tuesday night, U.S. District Judge Lucy Koh in San Jose, California said people who sent emails to or received emails from Yahoo Mail subscribers since Oct. 2, 2011 may sue as a group under the federal Stored Communications Act for alleged privacy violations. Holders of non-Yahoo Mail accounts accused Yahoo of copying and then analyzing their emails, including keywords and attachments, with a goal of creating "targeted advertising" for its estimated 275 million Yahoo Mail subscribers, in addition to detecting spam and malware.


Pakistan judge orders CEO held for faked diploma allegations

- Wed, 27 May 2015 08:58:38 -0400

A Pakistani police officer stands guard at the office of Axact software company in Karachi, Pakistan, Wednesday, May 27, 2015. Pakistani authorities on Wednesday detained the owner of a software company accused of running a global network in selling fake degrees, officials said. (AP Photo/Fareed Khan)KARACHI, Pakistan (AP) ? A Pakistani judge ordered police Wednesday to hold and question the embattled CEO of a software company for a week on allegations he oversaw a global diploma mill, as broadcasters aired images of blank degrees stacked in his firm's offices.


Pakistan detains owner of firm said to market fake degrees

- Wed, 27 May 2015 05:24:00 -0400

Pakistani authorities on Wednesday detained the owner of a software company accused of running a global network in selling fake degrees, officials said. In a raid on the Axact company offices in the southwestern ...

APNewsBreak: IRS says thieves stole tax info from 100,000

- Tue, 26 May 2015 22:28:29 -0400

IG: IRS takes significant steps to stop tea party targetingSophisticated criminals used an online service run by the IRS to access personal tax information from more than 100,000 taxpayers, part of an elaborate scheme to steal identities and claim fraudulent tax ...


Watch the official Galaxy S6 edge ?Iron Man Edition? unboxing video

- Tue, 26 May 2015 19:45:48 -0400

If you?ve ever wanted a smartphone that looks like a Marvel superhero, this is the moment you?ve been waiting for. Samsung on Tuesday unveiled its Galaxy S6 edge Iron Man Limited Edition, which will go on sale on May 27th in Korea and will then launch in China and Hong Kong in June. The device will be much the same as the regular Galaxy S6 edge, only it will be colored red and gold and will feature an image of Iron Man on its rear panel. The device also comes with 64GB of storage, which makes it a step up from the basic 32GB tier of the original Galaxy S6 edge. FROM EARLIER: Linux creator says Windows, OS X, iOS and Android are

Our favorite Android smartwatch so far might be a lot cheaper than we thought

- Tue, 26 May 2015 19:00:08 -0400

Quietly unveiled at MWC in early March, the Huawei Watch might just be the best Android Wear watch made to date. We expected it to be rather pricey, but the gadget might actually be more affordable than we thought, especially when compared with Apple?s Watch price tiers. DON?T MISS: I broke the sapphire screen on my Apple Watch A Reddit user discovered three Huawei models already listed for sale on MobileFun.com, coming in silver, black and gold. The website does list prices for all these models even though it doesn?t list their official release dates. According to MobileFun, the silver and black versions of the Huawei Watch cost $386.99, while the gold model is slightly more expensive at $451.49. For

Time Warner Cable, McDermott are big market movers

- Tue, 26 May 2015 16:53:18 -0400

Stocks that moved substantially or traded heavily Tuesday on the New York Stock Exchange and the Nasdaq Stock Market: NYSE Time Warner Cable Inc., up $12.42 to $183.60 The cable company is being bought ...

The top 10 audiobooks on Audible.com

- Tue, 26 May 2015 15:44:58 -0400

Audible.com best-sellers for week ending May 23, 2015: Fiction 1. The Girl on the Train by Paula Hawkins, narrated by Clare Corbett, Louise Brealey and India Fisher (Penguin Audio) 2. Seveneves: A Novel ...

Android fans? delight: Report confirms two new Nexus phones coming this year

- Tue, 26 May 2015 12:28:30 -0400

Over the past month we?ve been hearing plenty of rumors that Google might release two different Nexus handsets in stores in 2015, and now a website with a solid track record on Android leaks has confirmed that two new Nexus devices are indeed coming this year. DON?T MISS: Pirate?s paradise: cCloud TV streams HBO, ESPN and 50 other live channels for free In addition to detailing various Android M features over the past few days, Android Police has also spilled the beans on Google?s Nexus plans for 2015. Just as rumored, Google will release two distinct Nexus handset versions this year, which marks the first time Android fans will have two different Nexus phones to choose from at once. The new LG Nexus smartphone is

Android fans? delight: Report claims two new Nexus phones coming this year

- Tue, 26 May 2015 12:28:30 -0400

Over the past month we?ve been hearing plenty of rumors that Google might release two different Nexus handsets in stores in 2015, and now a website with a solid track record on Android leaks has confirmed that two new Nexus devices are indeed coming this year. DON?T MISS: Pirate?s paradise: cCloud TV streams HBO, ESPN and 50 other live channels for free In addition to detailing various Android M features over the past few days, Android Police has also spilled the beans on Google?s Nexus plans for 2015. Just as rumored, Google will release two distinct Nexus handset versions this year, which marks the first time Android fans will have two different Nexus phones to choose from at once. The new LG Nexus smartphone is

Linux creator says Windows, OS X, iOS and Android are all malware

- Tue, 26 May 2015 06:50:51 -0400

Richard Stallman, known for his instrumental role in the creation of Linux, has written an opinion piece arguing that nearly any operating system you might use today can be considered malware, and that goes for popular mobile platforms as well as desktop operating systems. DON?T MISS: Pirate?s paradise: cCloud TV streams HBO, ESPN and 50 other live channels for free According to Stallman?s post in The Guardian, any software that?s not distributed free of charge can be considered malware. ?In the 21st century, proprietary software is computing for suckers,? he wrote. Stallman says OS software is currently designed to spy on users, shackle them via DRM and even have backdoors that can be used for malicious purposes. ?What kinds of programs constitute malware? Operating systems, first of all,? he

What's hot? Life sciences challenge tech in global innovation

- Tue, 26 May 2015 00:28:38 -0400

By Ben Hirschler LONDON (Reuters) - The life sciences industry is increasingly taking over from the tech sector in driving global innovation, according to a Thomson Reuters analysis of global patents. With more patents applied for or granted in 2014 than in any other year in history, humankind has never been more inventive, whether in designing driverless cars, discovering new drugs for cancer or building bionic limbs. While part of that may be due to tighter patenting rules in the United States, there are also signs of more fundamental shifts, with the volume of published scientific literature -- a precursor to patents -- down 22 percent across 12 industries.

Plane safe? Hacker case points to deeper cyber issues

- Mon, 25 May 2015 17:05:39 -0400

An illustration picture shows projection of binary code on man holding aptop computer in WarsawSecurity researcher Chris Roberts made headlines last month when he was hauled off a plane in New York by the FBI and accused of hacking into flight controls via his underseat entertainment unit. Other security researchers say Roberts - who was quoted by the FBI as saying he once caused "a sideways movement of the plane during a flight" - has helped draw attention to a wider issue: that the aviation industry has not kept pace with the threat hackers pose to increasingly computer-connected airplanes. It will force the hand of organizations (in the aviation industry)," says Jonathan Butts, a former US Air Force researcher who now runs a company working on IT security issues in aviation and other industries.


Alibaba's latest gambit in fighting fakes: foster local brands

- Sun, 24 May 2015 17:07:10 -0400

Employee works at a Shuangwei factory in PutianBy John Ruwitch PUTIAN, China (Reuters) - Criticized and even sued by luxury brand Gucci and others for facilitating the counterfeit goods trade, Chinese e-commerce giant Alibaba Group Holding Ltd has been quietly piloting a scheme to try to curb fakes at source. In the coastal city of Putian, in Fujian province, Alibaba is working with 17 shoe manufacturers to cultivate home-grown brands online, revitalize a flagging industry and offer would-be counterfeiters an alternative source of livelihood. Critics say the scheme is misguided and Alibaba should instead focus on scrubbing its online marketplaces of widespread listings of fakes.


Sliver of Clinton emails hint at lingering political trouble

- Sat, 23 May 2015 04:23:35 -0400

Democratic presidential candidate Hillary Rodham Clinton speaks to child care workers during a visit to the Center For New Horizons Wednesday, May 20, 2015, in Chicago. (AP Photo/M. Spencer Green)WASHINGTON (AP) ? Former Secretary of State Hillary Rodham Clinton received information on her private email account about the deadly attack on U.S. diplomatic facilities in Benghazi that was later classified "secret" at the request of the FBI, underscoring lingering questions about how responsibly she handled sensitive information on a home server.


Clinton received sensitive info on private email account

- Fri, 22 May 2015 18:08:01 -0400

Then US Secretary of State Hillary Clinton testifies before the Senate Foreign Relations Committee during a hearing on Capitol Hill in Washington, DC on January 23, 2013WASHINGTON (AP) ? Former Secretary of State Hillary Rodham Clinton received information on her private email account about the deadly attack on U.S. diplomatic facilities in Benghazi that was later classified "secret" at the request of the FBI, according to documents released Friday, underscoring lingering questions about how responsibly she handled sensitive information on a home server.


Adult dating site investigating breach of user data

- Fri, 22 May 2015 17:54:55 -0400

PALO ALTO, Calif. (AP) ? The operator of a popular adult dating website said Friday it's investigating a data security breach following reports that hackers stole names, email addresses and information about the sexual orientation or habits of up to 4 million members.

Adult dating site investigating possible breach of user data

- Fri, 22 May 2015 16:44:45 -0400

The operator of a popular adult dating website said Friday it's investigating a potential security breach, following reports that hackers stole names, email addresses and information about the sexual preferences ...

3 new iOS 9 features were just revealed in a huge new leak

- Fri, 22 May 2015 11:58:51 -0400

9to5Mac?s Mark Gurman has been all over iOS 9 leaks this week and he?s back with a new report today that outlines more features the new software will deliver. In the preface to his article, Gurman makes clear that this is not going to be the most exciting iOS release. In fact, he says that Apple is putting most of its work into adding stability improvements for the platform, which went through several less-than-stellar releases with iOS 7 and iOS 8. That said, he did highlight three features we can expect to see at WWDC this year. DON?T MISS: Former Android diehard ?never looking back? after switch to iPhone 6 ? find out why The first feature is something called Rootless

A major feature from Android M and the next-gen Nexus phone has leaked

- Fri, 22 May 2015 07:45:14 -0400

Google has already unwillingly confirmed that it?s going to unveil Android M at its I/O 2015 conference next week, and a few reports now claim to have knowledge of one of the major features that are going to be available to Android M users in the near future. DON?T MISS: Key iPhone 6s specs seemingly detailed in new report According to independent reports from BuzzFeed and ArsTechnica, Android M might be finally getting native support for fingerprint authentication. ?The new functionality will allow users to log in to all of the supported applications on their Android devices without entering a password,? BuzzFeed has learned from its sources. Other details about the fingerprint functionality or Android M have not been shared.

Do this now: Secure your adult dating profiles ? a major site was just hacked

- Fri, 22 May 2015 07:00:49 -0400

In case you happen to have one or multiple adult dating website profiles, you might consider securing them right away, as one of the world?s largest such websites has been hit by hackers. The attackers managed to steal highly sensitive personal data for four million users, leaking them online in spreadsheet format. DON?T MISS: Key iPhone 6s specs seemingly detailed in new report According to Channel 4, the dating site in question is Adult FriendFinder which has more than 63 million global users. In addition to usual personal data including usernames, email addresses, dates of birth and addresses, the stolen data also contains more sensitive information regarding the user?s sexual orientation and preferences, and whether they?re looking for extramarital affairs

Audi will enhance Chinese connected-car services with Baidu

- Fri, 22 May 2015 06:54:37 -0400

People sit in front of the company logo of Baidu at its headquarters in BeijingGermany's Audi will enhance connected-car services in China to meet growing demand for driver-assistance systems and driverless technology in the world's largest auto market. Volkswagen's flagship luxury brand said on Friday it will jointly develop navigation map data, positioning algorithms and point-of-interest functions with China's web services provider Baidu. Chinese Internet companies and auto makers have been quick to team up to start developing partly self-driving and Internet-connected cars, following a path already trodden by U.S. tech giants Google Inc and Apple Inc. "We are now taking our next big step in China," Chief Executive Rupert Stadler said at the carmaker's annual shareholder meeting in Neckarsulm, Germany.


The NSA came up with a brilliantly sneaky way to hack your Android phone

- Thu, 21 May 2015 22:30:04 -0400

Once again, we have to tip our cap in grudging admiration for the lengths the National Security Administration will go to hack into our mobile devices. The Intercept has published some new documents leaked by Edward Snowden that show how the NSA and other spy agencies at one point planned to conduct man-in-the-middle attacks between end users and Android app stores to infect users? phones with spyware. FROM EARLIER: Here are the most ridiculous questions al-Qaeda asks on its official job application ?The agencies used the Internet spying system XKEYSCORE to identify smartphone traffic flowing across Internet cables and then to track down smartphone connections to app marketplace servers operated by Samsung and Google,? writes The Intercept. ?As part of a pilot project codenamed

Hewlett-Packard sells stake in Chinese unit for $2.3B

- Thu, 21 May 2015 16:27:52 -0400

FILE - This Feb. 21, 2012 file photo shows a Hewlett Packard logo in Frisco, Texas. On May 21, 2015, Hewlett-Packard announced it is selling a 51 percent stake in its China sever, storage and technology storage unit for about $2.3 billion as it restructures its business in that country. (AP Photo/LM Otero, File)NEW YORK (AP) ? Hewlett-Packard is selling a controlling stake in its China server and storage unit, a move that comes as the Chinese government, apparently worried about U.S. cyberspying, has encouraged the use of local companies.


Watch this immediately: The most amazing airplane safety video of all time

- Thu, 21 May 2015 15:53:04 -0400

With the advent of mobile devices, odds are pretty high that most people these days don?t pay attention to airline safety videos. Delta, however, is out to change that with a new Internet-meme themed video that splices together your standard flight safety instructions with an avalanche of Internet memes, both new and old. To top it all off, the video even features a few cameos worth keeping an eye out for. DON?T MISS: One simple trick could free up gigabytes of space on your iPhone While there are innumerable Internet memes to choose from, Delta did a good job picking some of the more recognizable ones when putting this video together. If this becomes the default safety video on Delta flights, well,

U.S. aims to limit exports of undisclosed software flaws

- Thu, 21 May 2015 13:48:03 -0400

(This story refiles the May 20 story to change "fund" to "find" in paragraph 13) By Joseph Menn SAN FRANCISCO (Reuters) - The U.S. Commerce Department proposed new export controls Wednesday that would treat unknown software flaws as potential weapons, a move aimed at reducing the security industry?s aid to rival nations. The regulations are broadly written and cover what are known as ?zero-day? flaws, or security vulnerabilities that the software vendors do not know about. Hackers and defense contractors often sell information about such flaws to government agencies or the maker of the software, and internal U.S. sales could continue.

Stuck in Gaza, hackers open lines to the world

- Thu, 21 May 2015 09:23:27 -0400

By Nidal al-Mughrabi GAZA (Reuters) - With jobs scarce and time on their hands, some tech-savvy Gazans have found a new way to make money - hacking Internet-based phone lines and routing international calls for a fee. Voice Over Internet Protocol (VoIP) hacking has been a phenomenon for years. There are various ways of hacking VoIP networks, but people familiar with the practice in Gaza say it involves using dedicated servers to scoop up as many telephone IP addresses as possible, especially from big corporations and businesses.

Tanzanian leader says aid conditions degrading

- Thu, 21 May 2015 09:02:53 -0400

Tanzania's President Kikwete attends the Ordinary session of the Assembly of Heads of State and Government of the AU at the African Union headquarters in Ethiopia's capital Addis AbabaBy Fumbuka Ng'wanakilala DAR ES SALAAM (Reuters) - Tanzanian President Jakaya Kikwete said on Thursday that Western donors are setting degrading conditions for aid to the east African nation and he could be forced in time to tell them: "keep your aid".     Tanzania, one of Africa's biggest per capita aid recipients, has experienced repeated delays in payments due to donor concerns about corruption, poor governance and the slow pace of reforms. ...


U.S. Navy secretary says paying attention to cyber threats

- Wed, 20 May 2015 19:19:43 -0400

By Andrea Shalal WASHINGTON (Reuters) - The U.S. Navy is working hard to improve the cyber security of its computer networks and weapon and communications systems, while bracing for potential attacks on power grids and fuel supplies, Navy Secretary Ray Mabus said Wednesday. Mabus said cyber warfare was a clear threat given Russia's use of cyber attacks before its physical invasions of Crimea and Georgia. It's in every system because we are so networked." Mabus confirmed recent media reports that the Navy was looking at replacing IBM servers used for its Aegis combat system after International Business Machines Corp's $2.1 billion sale of its server division to China's Lenovo Group Ltd last year.

CareFirst says cyberattack stole data of 1.1 million users in U.S

- Wed, 20 May 2015 15:34:48 -0400

(Reuters) - CareFirst BlueCross BlueShield, which sells health insurance in Maryland, Virginia and the District of Columbia, said on Wednesday that a cyberattack compromised the data of 1.1 million current and former members. In May, Premera Blue Cross said that 11 million customers' information may have been exposed in a hack. CareFirst said that the attackers accessed one database and could have potentially acquired member user names created by individuals to use CareFirst's website, names, birth dates, email addresses and member identification numbers.

Panel OKs $51B for Justice, NASA over Democratic protests

- Wed, 20 May 2015 14:10:54 -0400

WASHINGTON (AP) ? A GOP-controlled House panel Wednesday approved a $51 billion measure providing the Justice Department and NASA with modest budget hikes, but the legislation falls well short of what's needed to win President Barack Obama's signature.

Interpol seeks ways to dismantle foreign fighter networks

- Wed, 20 May 2015 10:04:53 -0400

BUCHAREST, Romania (AP) ? International police meeting in Romania are discussing measures to dismantle terrorist fighter networks which have become a major global security issue.