IANS Blog RSS Feed

http://www.iansresearch.com

Poulin to CSO: We Hacked a Smart Building Using ?Old-School? Techniques

- Thu, 11 Feb 2016 00:00:00 GMT

The ?smarter? buildings get, the easier they are to hack? Maybe. IANS Faculty Chris Poulin, research strategist for IBM?s X-Force ethical hacking team, recently spoke to CSO?s Maria Korolov about a penetration test in which his team was able to gain access to all of the buildings operated by a building management company.

Privacy, Security Concerns Rise as States Mull Encryption Backdoor Requirements

- Wed, 27 Jan 2016 00:00:00 GMT

National Data Privacy Day (January 28th) certainly comes at an interesting time this year, as legislators in two of the most technology-centric U.S. states recently introduced similar bills that would force smartphone manufacturers to include encryption backdoors in their devices.

Fledgling Cyber-Insurance Market Tested by Early Denials, Lawsuits

- Wed, 20 Jan 2016 00:00:00 GMT

Cybersecurity insurance policies may be relatively new, but they have one important thing in common with established, legacy business coverage: They live and die in the fine print.

Hacker-Caused Ukrainian Power Outage Marks First Known Attack With Immediate, Direct Public Impact

- Tue, 05 Jan 2016 00:00:00 GMT

Security researchers have confirmed that a recently updated version of the highly destructive BlackEnergy malware package infected the systems of at least three power authorities in Ukraine, causing a massive outage that left thousands of homes in the Ivano-Frankivsk region of the country without electricity. 

Top 10 IANS Insights from a Tumultuous 2015

- Mon, 28 Dec 2015 00:00:00 GMT

Another year is in the books and what a year it was for infosec pros. From the Ashley Madison hack to the OPM breach, to Jeep commandeering and mysterious backdoors in popular networking gear, every week brought a new security twist that forced us all to keep our heads on swivels.

Herold: Misguided CISA Heightens Security, Privacy Concerns

- Mon, 21 Dec 2015 00:00:00 GMT

The controversial Cybersecurity Information Sharing Act (CISA) is now the law of the land, slipped into an eleventh-hour spending bill designed to keep the federal government running through 2016.

Patch Now: Rogue Code Leaves Gaping Hole in Juniper Gear

- Fri, 18 Dec 2015 00:00:00 GMT

Juniper Networks says unauthorized code could allow attackers to gain administrative access to its NetScreen appliances and decrypt VPN connections without leaving any trace of their actions. Users are urged to apply fixes immediately.

Poulin: Time to Realistically Acknowledge Vehicle Vulnerabilities

- Wed, 16 Dec 2015 00:00:00 GMT

The images and breathless banter were difficult to ignore: celebrity security researchers gaining remote command of an automobile, disrupting on-board systems before forcing the vehicle and its helpless driver into a ditch.

NIST to Infosec Pros: How Is Our Framework Working?

- Mon, 14 Dec 2015 00:00:00 GMT

The National Institute of Standards and Technology is asking infosec practitioners in the public and private sectors to comment on the efficacy of its cybersecurity framework as it prepares to update the popular, two-year-old document.

As Ransomware Attacks Evolve, Security Teams Must Prepare For New ?Drive-By? Tactics

- Thu, 10 Dec 2015 00:00:00 GMT

Another week, another evolution of the popular ransomware attacks. When we last wrote about it, researchers had discovered a new iteration ? ?Linux.Encoder.1? ? that enabled attackers to inject malware into Linux-powered websites and encrypt all files in the home and backup directories. Now, it appears the popular exploit kit Angler is being used to spread the latest version of CryptoWall and other ransomware on websites as part of ?drive-by? campaigns that begin with the deployment of password-stealing malware. 

Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

SONAR.Cryptlocker!g59

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g239

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g57

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g311

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspLaunch!g13

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g252

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g204

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g58

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MSWord!g13

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlk.AN!g1

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Exp.CVE-2016-4173

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AX

- Fri, 22 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4203

- Fri, 22 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4251

- Fri, 22 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4252

- Fri, 22 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4192

- Fri, 22 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Cryptlocker!g74

- Wed, 20 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g75

- Wed, 20 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g247

- Wed, 20 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g281

- Wed, 20 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g264

- Wed, 20 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g265

- Wed, 20 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Ransomcrypt.BD

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.BC

- Tue, 19 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ranscrypt.BB!gm

- Sat, 16 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.BB

- Sat, 16 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Spyolog

- Thu, 14 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Pycerine

- Tue, 12 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AW

- Mon, 11 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.Hinired

- Sun, 10 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Worm.

SONAR.Heur.RGC!g255

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g206

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g217

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g221

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g237

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g245

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g253

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g261

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g263

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g266

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g274

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g295

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g298

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g302

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g305

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g315

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g327

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g333

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MSOffice!g1

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Asruex

- Tue, 5 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

OSX.Keydnap

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

OSX.Eelaonur

- Wed, 6 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4121

- Tue, 5 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4150

- Wed, 29 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4133

- Tue, 5 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4153

- Wed, 29 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4151

- Wed, 29 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4152

- Wed, 29 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Downloader.Asruex

- Tue, 5 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Sbidith

- Tue, 5 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

JS.Downloader!gen21

- Fri, 1 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AV

- Thu, 30 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Scarcruft!g1

- Thu, 30 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

EXP.CVE-2016-2208

- Wed, 29 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen46

- Thu, 30 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspLaunch!gen9

- Thu, 30 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Downloader.Picgoo

- Wed, 29 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AT

- Thu, 30 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AU

- Thu, 30 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4154

- Tue, 5 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4155

- Tue, 5 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4156

- Tue, 5 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3646

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3645

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3644

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Cryptlk.AH!g1

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g267

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g273

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g287

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g323

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MSWord!g6

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Fakeransomdel

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

JS.Retefe

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-2207

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-2209

- Mon, 27 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-2210

- Mon, 27 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-2211

- Mon, 27 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-0200

- Mon, 27 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Kotver!gen3

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ranscrypt.BA!gm

- Sat, 25 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.BA

- Sat, 25 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

The Latest: Cheers greet Tim Kaine on return to Richmond

- Sat, 23 Jul 2016 23:28:02 -0400

Democratic presidential candidate Hillary Clinton and Sen. Tim Kaine, D-Va., arrive at a rally at Florida International University Panther Arena in Miami, Saturday, July 23, 2016. Clinton has chosen Kaine to be her running mate. (AP Photo/Andrew Harnik)WASHINGTON (AP) ? The Latest on the 2016 presidential campaign (all times EDT):


Apple weathers anti-U.S. demo in China, where patriotic protests snowball

- Sat, 23 Jul 2016 20:12:55 -0400

A 3D printed Apple logo is seen in front of a displayed stock graph in this illustration takenApple Inc found itself on the receiving end of a small, short-lived anti-U.S. protest this week in China, the tech firm's biggest overseas market and a country where foreign firms have suffered damaging boycotts following international spats. A handful of unofficial Apple stores were picketed and social media users encouraged each other to destroy their Apple goods, in a rare instance of the tech firm being targeted as a symbol of perceived injustice following an international ruling against Chinese territorial claims. "There's not much Apple or any other foreign firm can do to prevent such patriotic protests," said analyst Nicole Peng at researcher Canalys, who sees no impact to Apple's sales from the recent protest.


The Latest: Sanders delegates assured they won't miss votes

- Sat, 23 Jul 2016 19:34:01 -0400

FILE - In this June 24, 2016, file photo, Sen. Bernie Sanders, I-Vt., speaks in Albany, N.Y. Sanders plans to meet with 1,900 of his delegates right before the start of the Democratic National Convention on Monday, part of a series of meetings aimed at providing direction to his undecided supporters after he endorsed Hillary Clinton. (AP Photo/Mike Groll, File)WASHINGTON (AP) ? The Latest on the 2016 presidential campaign (all times EDT):


The Latest: Progressives push to end use of superdelegates

- Sat, 23 Jul 2016 14:50:49 -0400

Work continues inside the convention hall before the Democratic National Convention, Saturday, July 23, 2016, in Philadelphia. (AP Photo/Alex Brandon)WASHINGTON (AP) ? The Latest on the 2016 presidential campaign (all times EDT):


Hacked emails show Democratic party hostility to Sanders

- Sat, 23 Jul 2016 14:15:17 -0400

FILE - In this June 24, 2016, file photo, Sen. Bernie Sanders, I-Vt., speaks in Albany, N.Y. Sanders plans to meet with 1,900 of his delegates right before the start of the Democratic National Convention on Monday, part of a series of meetings aimed at providing direction to his undecided supporters after he endorsed Hillary Clinton. (AP Photo/Mike Groll, File)WASHINGTON (AP) ? A cache of more than 19,000 emails from Democratic party officials, leaked in advance of Hillary Clinton's nomination at the party's convention next week in Philadelphia, details the acrimonious split between the Democratic National Committee and Clinton's former rival, Sen. Bernie Sanders.


Kickass Torrents is back but don?t trust any of the clones just yet

- Fri, 22 Jul 2016 18:10:57 -0400

Anyone who used to get their movie fix via torrenting sites are probably still mourning the unexpected departure of Kickass Torrents (KAT). The site became the world?s biggest piracy resource after The Pirate Bay went offline for more than a month following a police raid in December 2014. However, the US government led an operation that ultimately took down Kickass Torrents this week. The site went down almost immediately after its alleged owner was arrested in Poland a few days ago. Since then, Kickass Torrents resumed activity online, but you should be very wary of the unofficial sites that pop up after takedowns like this. Some of them may have ulterior motives in mind apart from simply restoring a renowned piracy site. DON?T MISS:  Two of the best iPhone 7 leaks yet both surfaced last night According to The Verge , at least two KAT clones were spotted online, including KickassTorrents.website (which is believed to originate from IsoHunt) and KAT.am . However, TorrentFreak notes that KickassTorrents.website has no ties to IsoHunt whatsoever. This copycat just lists torrent files from the past one and a half years, but it doesn?t have a working forum or even upload functionality. ?It?s not perfect, but if users need to save and archive something, it?s time. We don?t know how long it can last, but at least it?s something,? the people behind the site told TorrentFreak . The creators of KAT.am claim that the site is ?hosted on multiple cloud servers to prevent blockade, and the hosting information is well hidden behind Cloudflare.? Furthermore, they told The Verge that the site features am a mobile version and that it "will has [sic] the complete torrent database of KAT, including the comments, user information intact." Kickass.la is one other site that has advertised itself to reporters as an ?official? backup of KAT, but that?s not the case, as the person behind it isn?t involved with KAT at all. With all that in mind, you should pay attention which KAT-branded piracy sites you visit in the next few days, if that?s your thing. Some of them might be fronts and you might end up downloading a whole mess of malware instead of the movie you were trying to steal.

Samsung sues Huawei for alleged patent violations

- Fri, 22 Jul 2016 03:48:28 -0400

In this photo taken Oct. 29, 2015, the corporate logo of Samsung Electronics Co. is seen at its shop in Seoul, South Korea. Samsung has sued Chinese smartphone maker Huawei for allegedly violating six of its patents. The South Korean company said on Friday, July 22, 2016, that it chose to take legal action to defend its intellectual property despite trying to resolve the dispute amicably. (AP Photo/Lee Jin-man)SEOUL, South Korea (AP) ? Samsung Electronics Co. sued Chinese smartphone maker Huawei for allegedly violating six of its patents in the latest move in a series of deepening patent disputes between Asian smartphone giants.


Samsung Elec sues Huawei in China for patent infringement

- Fri, 22 Jul 2016 03:35:28 -0400

The logo of Samsung Electronics is seen at its headquarters in SeoulSEOUL/HONG KONG (Reuters) - Tech giant Samsung Electronics Co Ltd said on Friday it sued Huawei Technologies Co Ltd [HWT.UL] for patent infringements through multiple courts in China, escalating a legal conflict between the smartphone rivals. The South Korean firm sued Huawei in a Beijing court about two weeks ago for allegedly infringing six of its patents, a spokeswoman said. "Despite our best efforts to resolve this matter amicably, it has regrettably become necessary to take legal action in order to defend our intellectual property," Samsung told Reuters in a statement.


Thai police arrest Russian, Uzbeki for alleged cybertheft

- Thu, 21 Jul 2016 11:48:41 -0400

BANGKOK (AP) ? A Russian man and an Uzbek woman were arrested at beach resorts in Thailand and accused of stealing more than $28.5 million by planting malware on the victims' computers and depleting bank accounts in the United States and other countries.

Special Report: How the New York Fed fumbled over the Bangladesh Bank heist

- Thu, 21 Jul 2016 11:20:58 -0400

Federal Reserve and New York City Police officers stand guard in front of the New York Federal Reserve BuildingWhen hackers broke into the computers of Bangladesh's central bank in February and sent fake payment orders, the Fed was tricked into paying out $101 million. It was a "total fluke" that the New York Fed did not pay out the $951 million requested by the hackers, said a person familiar with the Fed's handling of the matter. The Reuters examination has also found that the payment orders sent by the hackers were exceptional in several ways.


How millions from the Bangladesh Bank heist disappeared

- Thu, 21 Jul 2016 07:03:25 -0400

By Krishna N. Das and Jonathan Spicer DHAKA/NEW YORK (Reuters) - When the Federal Reserve Bank of New York cleared five transactions made by the Bangladesh Bank hackers, the money went in two directions. The Sri Lankan transaction contained a small but crucial error: The money was being sent to a bank account in the name of a nonprofit foundation, but the electronic message spelled it "fundation." That prompted Deutsche Bank, an intermediary in the transaction, and a Sri Lankan bank to contact Bangladesh Bank, which led to the payment being canceled and the money returned. Each account was in the name of an individual, according to RCBC lawyer Maria Cecilla Estavillo, who testified at a Philippine Senate committee examining the heist.

Auto industry sharing info on cyber attacks

- Thu, 21 Jul 2016 04:30:00 -0400

Automakers are sharing information on cyber security threats and working together on ways to respond when hackers strike, under guidelines being developed by the industry. Nearly all companies that sell ...

General Electric to make $500 million productivity savings from industrial internet

- Wed, 20 Jul 2016 03:37:18 -0400

SHANGHAI (Reuters) - General Electric Co will make $500 million of productivity savings in 2016 from using industrial internet applications, a company executive said on Wednesday. GE Chief Digital Officer Bill Ruh made the comments at a press conference in Shanghai, where the company also announced a partnership with China's Huawei Technologies [HWT.UL]. (Reporting by Brenda Goh; Editing by Stephen Coates)

GE remains upbeat on slower-growing China, says Rice

- Wed, 20 Jul 2016 03:37:18 -0400

General Electric still sees plenty of opportunities in a slower-growing China, even as the government's anti-corruption campaign causes some deals to take longer to get approved, a senior executive said on Wednesday. GE vice chairman John Rice, speaking on the sidelines of a company event in Shanghai, told Reuters there was some "level of caution" in reaction to President Xi Jinping's crackdown on corruption even though he broadly welcomed the campaign. "There?s some level of caution, people in some cases reacting to the anti-corruption campaign ... The effort to clean this up and deal with some of these issues will be really helpful to China and very helpful to companies like GE." Rice also said the fall in the value of the British pound after the vote to leave the European Union would help GE's exports and the company had no long-term plans to make substantive changes to its business in the United Kingdom.

GE takes digital strategy to China with Huawei tie-up

- Wed, 20 Jul 2016 03:36:52 -0400

The logo of Down Jones Industrial Average stock market index listed company General ElectricBy Brenda Goh SHANGHAI (Reuters) - General Electric Co on Wednesday said it would partner with Huawei Technologies Co Ltd [HWT.UL] to develop smart machines designed to boost productivity, part of a drive to promote its "industrial internet" business in China. The U.S. industrial giant announced the partnership as it launched an $11 million digital space in Shanghai, where it plans to incubate start-ups and have developers work on new software applications to make machines more intelligent. Chief Digital Officer Bill Ruh said the world's biggest maker of jet engines and diesel locomotives had already made $500 million in productivity savings for itself this year by using smarter machines, and he expected this to grow to $1 billion in total by 2020.


Scary Android malware blocks calls to your bank so it can keep stealing money from you

- Mon, 18 Jul 2016 21:00:04 -0400

Most Android users will never have to deal with malware apps on their devices, or at least not as long as they don?t download potentially malicious apps from third-party app stores. But there are people who can?t get apps from Google Play or choose to ignore the official app store, and they are more exposed to malicious apps. One malware app was just updated with a feature that can block calls to customer support numbers belonging to certain banks so that affected users can?t stop fraudulent transactions. DON?T MISS: Everything Nintendo?s mini NES can and can?t do Android.Fakebank is a malware app Symantec first discovered in October 2013. What the app does is to replace any banking apps on a device with fraudulent versions that let the attacker access the victim?s bank account and transfer funds. A new version that was released in March includes the call blocking feature mentioned above. When a victim tries to call the customer service of a bank to stop a fraudulent transaction, the malware blocks that call. Sure, the target can contact the bank in person, using a different handset, or by email. But until that happens, the hackers still have access to that bank account. Currently, Android.Fakebank.B affects users in South Korea and Russia, blocking only phone numbers that belong to banks in these regions. Again, the best way to avoid malware on Android is to stick to downloading only apps from the Google Play store. Monitoring your bank accounts for fraudulent activity on a constant basis might also be a good idea.

Baseball-Major League Baseball roundup

- Mon, 18 Jul 2016 20:42:39 -0400

Former St. Louis Cardinals scouting director Chris Correa was sentenced to 46 months in federal prison for unlawful intrusions into the Houston Astros' database. Correa, who pled guilty to five charges on Jan. 8, must also pay restitution of $279,038.65 to the Astros. - - The last-place Minnesota Twins fired executive vice president/general manager Terry Ryan.

Former Cardinals exec sentenced to prison for hacking Astros

- Mon, 18 Jul 2016 18:46:05 -0400

FILE - In this Jan. 8, 2016, file photo, Chris Correa, the former director of scouting for the St. Louis Cardinals, leaves the Bob Casey Federal Courthouse in Houston. Correa has been sentenced to nearly four years in jail for hacking the Houston Astros' player personnel database. Correa?s sentencing in Houston federal court Monday, July 18, 2016, came after he pleaded guilty in January to five counts of unauthorized access of a protected computer. (AP Photo/Bob Levey, FIle)HOUSTON (AP) ? A federal judge sentenced the former scouting director of the St. Louis Cardinals to nearly four years in prison Monday for hacking the Houston Astros' player personnel database and email system in an unusual case of high-tech cheating involving two Major League Baseball clubs.


Taiwan says foreign suspects arrested over $2 million ATM cyber robbery

- Sun, 17 Jul 2016 11:11:17 -0400

Police in Taiwan said on Sunday they had arrested three out of 16 foreign suspects they believe hacked into the cash machines of a major local bank, withdrawing more than $2 million. A policeman recognized one of the suspects, a Latvian, while he was eating in a restaurant in the northeastern city of Yilan. Police arrested him later, an official of the Taipei City Police Department told a news briefing.

Governors descend on Iowa to focus on policy, not politics

- Thu, 14 Jul 2016 17:53:43 -0400

A women walks through the hall before the start of the National Governors Association meeting, Thursday, July 14, 2016, in Des Moines, Iowa. Half of the nation's governors are expected in Des Moines for the summer meeting, which begins Thursday and runs through Sunday. (AP Photo/Charlie Neibergall)DES MOINES, Iowa (AP) ? For a change, governors will get to see Iowa without campaigning for the White House.


Emirati gets 3-month prison sentence over Instagram insult

- Thu, 14 Jul 2016 08:54:37 -0400

DUBAI, United Arab Emirates (AP) ? A state-owned newspaper in the United Arab Emirates is reporting that an Emirati man has received a three-month prison sentence and a fine after being convicted of insulting his brother on Instagram.

Chinese man to serve U.S. prison term for military hacking

- Thu, 14 Jul 2016 07:07:56 -0400

By Dan Whitcomb LOS ANGELES (Reuters) - A Chinese businessman who pleaded guilty in March to conspiring to hack into the computer networks of Boeing and other major U.S. defense contractors was sentenced on Wednesday to nearly four years in prison, prosecutors said. Su Bin, 51, was charged with taking part in a years-long scheme by Chinese military officers to obtain sensitive military information. In addition to the 46-month prison term, a judge in U.S. District Court in Los Angeles ordered Su to pay a $10,000 fine.

Likely hack of U.S. banking regulator by China covered up: probe

- Thu, 14 Jul 2016 04:33:15 -0400

Photo illustration of a computer mouse illuminated by a projection of a Chinese flagThe report cited an internal FDIC investigation as identifying Beijing as the likely perpetrator of the attacks, which the probe said were covered up to protect the job of FDIC Chairman Martin Gruenberg, who was nominated for his post in 2011. "The committee's interim report sheds light on the FDIC's lax cyber security efforts," said Lamar Smith, a Republican representative from Texas who chairs the House of Representatives Committee on Science, Space and Technology. "The FDIC's intent to evade congressional oversight is a serious offense." The report was released amid growing concern about the vulnerability of the international banking system to hackers and the latest example of how deeply Washington believes Beijing has penetrated U.S. government computers.


Chinese businessman gets nearly 4 years in US hacking case

- Wed, 13 Jul 2016 18:45:21 -0400

LOS ANGELES (AP) ? A Chinese businessman was sentenced to nearly four years in prison Wednesday for conspiring to export sensitive military information to China after accessing the computer systems of U.S. defense contractors, including Boeing.

Chinese government suspected of hacking into FDIC computers

- Wed, 13 Jul 2016 18:25:54 -0400

The Chinese government is believed to have hacked into computers at the Federal Deposit Insurance Corp. in 2010, 2011 and 2013, including the workstation of then-FDIC Chair Sheila Bair, a congressional ...

The stupidest ransomware for Windows is also the most dangerous

- Wed, 13 Jul 2016 18:00:02 -0400

Ransomware is a real problem for many institutions and consumers who do not know how to protect their PCs while surfing the web. Ransomware apps lock certain files on a computer with encryption, making them inaccessible until the target pays a ransom, usually in virtually untraceable Bitcoin. The scam is very lucrative for some hackers, who usually restore access to temporarily encrypted files as soon as a computer owner pays the fee, and these ransomware apps aren?t exactly easy to code. Ranscam is one such example of a badly executed ransomware app. But because it?s a bad type of malware, it?s also the worst Windows infection you can currently get. MUST SEE:  Look at this new leaked photo and tell me which phone is hotter than the iPhone 7 "You must pay 0.2 Bitcoins to unlock your computer,? a warning message says after a computer is infected with Ranscam. ?Your files have been moved to a hidden partition and crypted. Essential programs in your computer have been locked and your computer will not function properly. Once your Bitcoin payment is received your computer and files will be returned to normal instantly." That sounds like your average ransomware message, but security researchers from Cisco Talos told Ars Technica this isn?t your typical malware threat. The malware app deletes everything on your computer. It doesn't encrypt anything either. You can?t pay to get the decryption key and restore access to your files. Even if you try to pay, you?ll simply get an error message. But what?s clear is that your files are going to be deleted no matter what. The messages these hackers present on screen come from web addresses traced to a server hosted in California and are retrieved ?through an unprotected, unencrypted, unobfuscated" HTTP request. The malware was discovered on a small number of computers, and it?s not clear how these computers were infected. Usually, ransomware is delivered via phishing attacks, but Ranscam isn?t widespread enough to determine how it?s being delivered. Researchers tried to reach the amateur creators of the program, but the hackers just sent back an email explaining how an affected customer can buy and transfer Bitcoin. If you?ve been affected by this silly, yet very dangerous Windows malware, you can still try to recover the deleted files using specialized software, or by enlisting the help of a company that can do it for you. If you perform regular backups of your hard drive, you should be fine.

Los Angeles woman sentenced in global cybercrime scam

- Wed, 13 Jul 2016 08:03:07 -0400

GULFPORT, Miss. (AP) ? A woman from Los Angeles has been sentenced for her role in global cybercrime schemes uncovered after a Mississippi woman reported she'd been scammed.

Taiwan seeks two Russian suspects in $2 million ATM malware heist

- Wed, 13 Jul 2016 05:30:56 -0400

Taiwanese First Bank automated teller machines are seen suspended after T$70 million was reported stolen from its automated teller machines (ATM) in TaipeiBy Faith Hung TAIPEI (Reuters) - Taiwan investigators suspect two Russian nationals hacked into a major domestic bank's ATMs last weekend, using malware to withdraw more than $2 million from dozens of machines in the country's first recorded case of its kind. Combining cybercrime with daylight robbery after a typhoon battered greater Taipei, the suspects may have used a cellphone to trigger 41 First Bank ATMs to dispense fat wads of bills, investigators said on Wednesday. In each case, the still-at-large suspects took the money and left quickly, filmed on close-circuit TV cameras.


FCA to offer rewards to hackers who help it find security flaws

- Wed, 13 Jul 2016 00:10:16 -0400

Sergio Marchionne, CEO of Fiat Chrysler, speaks at the North American International Auto Show in DetroitFiat Chrysler Automobiles NV will offer rewards of as much as $1,500 to ethical hackers who tell the auto maker about data security weaknesses in its vehicles, the company said. FCA's move comes a year after independent cybersecurity researchers used a wireless connection to turn off a Jeep Cherokee's engine. The hack, reported in Wired Magazine, alarmed auto makers and regulators, and it led FCA to recall 1.4 million vehicles to prevent the use of a wireless connection to gain control of the vehicle.


Fiat Chrysler offers hackers bounty to report cyber threats

- Wed, 13 Jul 2016 00:03:29 -0400

DETROIT (AP) ? Fiat Chrysler is turning to weekend car tinkerers and good-guy hackers to expose software vulnerability in its cars and trucks.

The Bleak Cynicism of Mr. Robot

- Tue, 12 Jul 2016 15:34:59 -0400

You might wonder, watching the past few years of prestige television, if drama is having an identity crisis. As comedy increasingly encroaches on its territory, tackling subjects like depression, captivity, racism, abortion, and mass shootings with sensitivity and intellectual heft, drama seems to be compensating by going full-throttle toward bleakness. Season two of Netflix?s Daredevil was a gory, 13-episode slog through mutilated body parts and sexualized torture; Starz?s The Girlfriend Experience made the story of a high-class sex worker into chilly psychological horror; True Detective?s sophomore season seemed to mistake brooding intensity and seething darkness for narrative cohesion and recognizable dialogue. TV?s grimness has even been echoed in film, with Zack Snyder?s Batman v. Superman being pilloried by critics for its unrelenting self-seriousness.

Amazon?s best Prime Day deals on smartphones: Nexus 6P, Moto X Pure Edition, more

- Tue, 12 Jul 2016 10:59:17 -0400

Amazon's huge Prime Day 2016 shopping event has definitely lived up to the hype. With more than 100,000 different products on sale across every single category you can possibly imagine, it's probably more difficult to find something that's not on sale than it is to find something that's on sale. Of course, if you stick with the BGR Deals team and follow our Prime Day coverage, you'll have a much easier time finding the best bargains of the bunch. Here's a perfect example: With just two links, we're going to show you all the best smartphone deals Amazon has running right now for Prime Day. Top Prime Day deals: Samsung Curved 55-Inch 4K Ultra HD TV for $650 Amazon Echo for $50 off 50% off Bose headphones First up, Amazon is offering up to 40% off a whole slew of different Huawei smartphones and smart watches. Huawei isn't as big a brand in the US as Apple or Samsung, but you'll find that the company's smartphones are just as good. In fact, they might be even better because they're so much more affordable and they're all unlocked. There are more than a dozen different devices included in this sale, but the star of the show has to be the Nexus 6P. This pure Android handset made in conjunction with Google offers the best Android experience in the world, period. It ships with Android Marshmallow and you can install Nougat the instant it's released. You can even install it now if you want to try the developer preview. Huawei's 64GB Nexus 6P typically sells for $510 on Amazon, but it's available for Prime Day in both Graphite and Gold for just $403.75! There's also a 128GB model available. Check out all the Huawei models on sale right here . Amazon's second big smartphone sale covers more than two dozen Amazon Warehouse Deals that offer even bigger discounts than normal for Prime Day. These smartphones are new, open box, or preowned devices that people have traded in when purchasing a new smartphone. They're all cleaned up and confirmed to be in perfect working order, so this is a great opportunity to get a new unlocked smartphone with no contract for next to nothing. Highlights in this sale include the  Moto X Pure Edition new for $250, the Nexus 6, the Nexus 5, Samsung's Galaxy S6 and the  Moto G for as little as $129. Check out all the models in this big sale right here  (you'll have to drill down to cell phones by selecting that option in the left-hand column). As the name of this big shopping event might suggest, you'll need a Prime subscription to enjoy any of these deals. If you don't already have a Prime subscription, you can sign up for a free 30-day Amazon Prime trial right now and enjoy all the huge Prime Day deals coming today. Make sure you don't miss anything by following along in our Prime Day 2016 hub .

Taiwan banks suspend cash withdrawal at ATMs due to malware theft

- Tue, 12 Jul 2016 07:20:34 -0400

At least three major Taiwan banks have suspended cash withdrawal services at their Automated Teller Machines after First Bank reported T$70 million ($2.2 million) was stolen from its ATMs. Two individuals withdrew cash from First Bank's ATMs but were not seen on close-circuit TV camera to be physically operating the machines, First Bank said in a statement. The theft took place at ATMs manufactured by Wincor Nixdorf, First Bank's Executive Vice President Yeh Chung-huei said, adding it has about 300 of such ATMs.

In rare consensus, Australian MPs call for e-voting as poll count drags on

- Tue, 12 Jul 2016 03:04:01 -0400

A voter casts her ballot paper at a polling station at Mount Alexander College in FlemingtonBy Tom Westbrook and Yuzuha Oka SYDNEY (Reuters) - Australians have elected a divided parliament stacked with fractious independents and minor parties but the nation's weary political leaders are united on at least one front: the need for electronic voting. Counting in Australia's July 2 election dragged into its 10th day on Tuesday, drawing unfavorable comparisons with Japan, Iceland and Spain, where recent elections were all decided in less than a day. Britons took just seven hours to calculate their contentious Brexit vote to leave the European Union last month.


NY Fed, Bangladesh Bank meeting on heist postponed: sources

- Tue, 12 Jul 2016 02:33:04 -0400

Commuters pass by the front of the Bangladesh central bank building in DhakaA meeting between Bangladesh central bank officials and the New York Federal Reserve scheduled for this week to speed up efforts to recover $81 million stolen from Bangladesh Bank's account at the Fed has been postponed, officials in Dhaka said. A four-member Bangladesh Bank team headed by deputy governor Mohammad Razee Hassan, who also heads its financial intelligence unit, was to meet Fed officials in New York on July 15. "We are in talks with the Fed and hoping that the meeting will take place anytime at the end of this month or next month," said a senior Bangladesh Bank official, declining to be named.


9 craziest things that happened to people while they were playing Pokemon Go

- Mon, 11 Jul 2016 13:45:59 -0400

Unless you?ve been living under a rock for the past few days, then you?ve certainly heard of the Pokemon Go mobile phenomenon . Even if you?re not playing the highly addictive iPhone and Android game, you probably know people who are, and most of them are having a blast. However, there are several unwanted side effects of playing Pokemon Go, and you should be aware of some of them. DON?T MISS:  Tomorrow is Prime Day 2016: Here?s everything you need to know A pinch of malware in the app Researchers discovered that there?s malware in certain APK versions of the Android app, so make sure you only download Pokemon Go from Google's Play store. Otherwise, there?s always the risk of grabbing one of these malicious versions that can then hijack your entire phone. Thieves use Pokemon Go rob players According to USA Today , police in O?Fallon, Missouri arrested four suspects who used beacons near a pokestop to lure in more players, at which point they would rob them at gunpoint. The four suspects are believed to be behind as many as 11 robberies. And that's not the only place where it's happening. https://twitter.com/PPD35Dist/status/752302490666827776 Assaulting police stations for Pokemon Police in Australia isn?t dealing with Pokemon Go crimes, too. But Australia?s Northern Territory did warn Pokemon Go players not to enter the Darwin Police Station in hopes of finding some of the creatures in the game. Don?t Pokemon Go and drive Some of the lazy Pokemon Go players out there ? you know who you are ? are using their cars to catch the creatures. Rather than going for walks, they drive their vehicles at around 10 mph or under, Jalopnik reports , to catch Pokemon that might be located nearby. Needless to say, that?s the kind of behavior that can endanger the lives of everyone else driving around lazy Pokemon hunters. Pokemon chasing is tiring https://twitter.com/pandabeebe/status/751860096100028416 Assuming you?re not using your car to catch them, running around all day after Pokemon is very tiring. As Gizmodo points out , social media is filled with reports of sore legs caused by too much Pokemon Go-ing. That time Pokemon Go sent you to a strip club https://twitter.com/gogogajman/status/751298328462143488 If you've ever had trouble explaining strip club visits to a significant other, then Pokemon Go is for you. The app will apparently send you to strip clubs on occasion, so there's your excuse. However, as Gizmodo reports , it'll also send you to graveyards. That time you discovered a dead body and a Pokemon It?s probably safe to say that you don?t want to discover anything else when you?re hunting your next Pokemon. But a teenager in Riverton, Wyoming stumbled upon a body floating in the Wind River last week, KTVQ.com reports . That?s definitively not the kind of Pokemon experience I?d want. 2-in-1: Fighting ISIS and catching Pokemon Who said you can't fight ISIS and catch Pokemon at the same time? That?s apparently a thing on the Mosul frontline by Teleskuf, at least according to a certain Louis Park's Facebook post . If you thought that driving and Pokemon Go-ing was the most dangerous thing you could do with the app, then you were wrong. Delivering a baby and a Pokemon at the same time This is so insensitive and so hilarious at the same time: finding a Pokemon in the same room where your wife is getting ready to give birth to your child. Read more about it on Reddit .

Get Started: Small businesses at risk for cyberattacks

- Mon, 11 Jul 2016 12:38:53 -0400

SMALL BUSINESSES AND CYBERATTACKS Small businesses' inability or failure to deal with their vulnerability to cyber criminals puts them increasingly at risk for online attacks, witnesses told a congressional ...

Global bank messaging system calls in help to bolster cyber defenses

- Mon, 11 Jul 2016 10:57:03 -0400

Photo illustration of the Swift bank logoBy Huw Jones LONDON (Reuters) - SWIFT, a messaging system used by banks across the world, announced further steps on Monday to bolster its defenses against hackers, after criminals sent fraudulent payment instructions across its network. The Society for Worldwide Interbank Financial Telecommunication said it has hired two outside cyber security firms, BAE Systems and Fox-IT, to reinforce in-house expertise, and has set up a team to share cyber defense "best practice" among its customers. In February, thieves hacked into the Bangladesh central bank's interface with SWIFT's network, which is a pipeline for transferring funds and the backbone of international finance.


Two international meetings switched from Bangladesh after attack

- Mon, 11 Jul 2016 06:30:00 -0400

By Ruma Paul DHAKA (Reuters) - An Asia-Pacific money laundering group has moved its meeting out of Bangladesh citing security concerns, officials said on Monday, 10 days after militants stormed a cafe in an upscale part of the capital and killed 20 people, mostly foreigners. Some 350 foreign delegates had been expected in Dhaka to attend the July 24-28 annual meeting of The Asia Pacific Group on Money Laundering that seeks to pool efforts to fight illegal money transfers and terrorist financing. Several countries, including the United States, have issued warnings about traveling to Bangladesh or asked citizens to take extra care following the assault claimed by Islamic State.

Obama says U.S. government must improve cyber security

- Sun, 10 Jul 2016 09:58:31 -0400

Obama answers a reporter's questions after meeting with Rajoy at the Palacio de la Moncloa in Madrid, SpainU.S. President Barack Obama said on Sunday that the U.S. government has to improve its cyber security practices for the modern age of smart phones and other technology, saying that hackers had targeted the White House. "We know that we have had hackers in the White House," he added. Concerns have been raised about the security of government information after the head of the FBI said presidential nominee Hillary Clinton's email servers may have been accessed by foreign actors when she was Secretary of State.