Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

Packed.Mystic!gen14

-

Risk Level: Very Low. Type: Trojan.

W32.Gammima.AG!gen8

-

Risk Level: Very Low. Type: Virus, Worm.

Trojan.Scieron!gen2

- Tue, 29 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Gen.4

- Mon, 28 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

PUA.Gen.2

- Mon, 28 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Spyware.Gen

- Mon, 28 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

RemoteAccess.Gen

- Mon, 28 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Hacktool.Gen

- Mon, 28 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Trackware.Gen

- Mon, 28 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

SecurityRisk.Gen

- Mon, 28 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Adware.Gen.2

- Mon, 28 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Joke.Gen

- Mon, 28 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Dialer.Gen.2

- Mon, 28 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Trojan.Retefe

- Fri, 25 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

PUA.ChangeDNS

- Thu, 24 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Backdoor.Baccamun

- Fri, 25 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Scieron!gen1

- Thu, 24 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Scieron

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Android.Bankosy

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.OutBrowse.1

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.DomaIQ.2

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.InstalleRx.6

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.OutBrowse.2

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Soft32Dwn.1

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.1

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.DomaIQ.3

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.2

-

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.3

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.SoftPulse.3

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.AdGazelle.1

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Widdit.1

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Downware.1

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.InstalleRx.7

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Android.Simplocker.B

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Kasidet

- Tue, 22 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Worm.

Trojan.Gen.SMH.2

- Tue, 22 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.ADH.SMH.2

- Tue, 22 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Korgapam

- Mon, 21 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Linux.Kaiten

- Sat, 19 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus.

Trojan.Pittyger!gen1

- Thu, 17 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Bankeiya.C

- Thu, 17 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Ecsudown

-

Risk Level: Very Low. Type: Trojan.

Packed.Generic.463

-

Risk Level: Very Low. Type: Trojan.

PUA.Downloader

- Thu, 17 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Trojan.Cryptolocker.G

- Wed, 16 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Pittyger

- Wed, 16 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Asterope

- Tue, 15 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Linux.Netweird

- Tue, 15 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Packed.Dromedan!gen10

- Tue, 15 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Worm.

Trojan.Chikdos.B!gen1

- Tue, 15 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Zbot!gen78

- Mon, 14 Jul 2014 00:00:00 +0000

Risk Level: Low. Type: Trojan.

Infostealer.Mysayad

- Mon, 14 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.M

- Sat, 12 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Snifula.F

- Thu, 10 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Packed.Generic.462

- Thu, 10 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Worm.

Trojan.Celptex

- Wed, 9 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.FakeAV!gen126

- Thu, 10 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomlock!g73

- Mon, 7 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Crossid

- Mon, 7 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Shylock!gen1

- Mon, 7 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Infostealer!g1

- Mon, 7 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Necurs!gen1

- Mon, 7 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Infostealer.Posdump

- Sun, 6 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Dynopage

- Sun, 6 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Posscrape

- Sun, 6 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Injecta

- Sun, 6 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomlock!g74

- Mon, 7 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cidox!gen3

- Mon, 7 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Kivars

- Sun, 6 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptdef!gen2

- Fri, 4 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Android.Milipnot

- Fri, 4 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Typideg

- Sat, 5 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Typideg!gen1

-

Risk Level: Very Low. Type: Trojan.

SONAR.Ransomlock.Q!g1

- Mon, 7 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.L

- Thu, 3 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Klovbot!gen2

- Wed, 2 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Viknok.D!inf

- Thu, 3 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Eupuds

- Thu, 3 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

Microsoft spreads Cortana abroad in Windows Phone

- Wed, 30 Jul 2014 09:49:40 -0400

Microsoft spreads Cortana abroad in Windows PhoneMicrosoft is spreading its Cortana digital assistant abroad, starting with China and the U.K. The company's corporate vice president of operating systems, Joe Belfiore, said Wednesday in Beijing that Chinese ...


New app brings free encrypted voice calling to your iPhone

- Wed, 30 Jul 2014 08:45:28 -0400

New app brings free encrypted voice calling to your iPhoneAre you worried that hackers ? or even worse, the NSA ? are listening in on your phone calls? Well it?s time to lay those fears to rest; Open Whispersystems has released a new app that brings encrypted voice calling to the iPhone. And best of all, perhaps, the firm?s new app is free to download and it supports worldwide calling, also for free. ?Over the past year, we?ve been working to bring the privacy software we?ve developed for Android to the iPhone, and today we?re releasing Signal ? free, worldwide, encrypted voice calls for iPhone, and fully compatible with RedPhone for Android,? Open Whispersystems†said in a blog post. The app uses the†ZRTP encryption protocol to protect voice communications between


Israel's 'Iron Dome' makers were hit by hackers, expert says

- Tue, 29 Jul 2014 19:51:46 -0400

By By Eric Auchard VIENNA (Reuters) - Three Israeli defense contractors behind the Iron Dome missile shield and related systems were robbed of hundreds of documents by hackers linked to the Chinese government starting in 2011, a U.S.-based computer forensics expert said on Tuesday. Comment Crew, as the hacking group is known, stole designs for Israeli rocket systems in a spree of attacks during 2011 and 2012, Joseph Drissel, chief executive of Cyber Engineering Services (CyberESI), said in a phone interview. The targets of the online attacks were top military contractors Elisra Group,†Israel Aerospace Industries[ISRAI.UL],†and†Rafael Advanced Defense Systems. The companies built the system that now partially insulates Israel from rocket barrages fired from the Gaza Strip.

Analysts: Samsung phone shipments falter in 2Q

- Tue, 29 Jul 2014 16:53:21 -0400

NEW YORK (AP) ? Samsung Electronics Co., the world's biggest maker of smartphones, saw its sales drop in the second quarter, a research firm said Tuesday.

Canada: Chinese hackers infiltrated government org

- Tue, 29 Jul 2014 16:22:19 -0400

TORONTO (AP) ? Chinese hackers infiltrated the computer systems of Canada's top research and development organization, the Canadian government said Tuesday.

?Fake ID? security flaw could be the greatest threat to Android phones yet

- Tue, 29 Jul 2014 11:40:06 -0400

?Fake ID? security flaw could be the greatest threat to Android phones yetOne Android feature that never made its way to iOS may be the cause of one of the most worrying security exploits ever on the mobile platform. AppleInsider reports that Bluebox Security has found an Android design flaw that†could potentially allow malware apps to take over someone?s device without requiring users to manually give the app permission†to access their phones. Dubbed ?Fake ID,? the flaw allows the malicious apps to send†fake credentials to Android, granting the app the ability to take on the form of another legitimate app that would have more extensive†access to the device. Perhaps unsurprisingly, one of the trusted apps that ?Fake ID? can assume the identity of is Adobe Flash, an Android-specific feature that†Steve Jobs refused


In rare move, Canada accuses Chinese of trying to hack government network

- Tue, 29 Jul 2014 11:35:13 -0400

Illustration file picture shows a man typing on a computer keyboard in WarsawBy David Ljunggren OTTAWA (Reuters) - Canada on Tuesday took the unusual step of singling out Chinese hackers for attacking a key computer network and lodged a protest with Beijing, raising tensions at a time when Ottawa wants to boost oil sales to China. Officials said "a highly sophisticated Chinese state-sponsored actor" had recently broken into the National Research Council. The council, the government's leading research body, works with major firms such as aircraft and train maker Bombardier Inc.. Canada has reported hacking incidents before but this was the first time it had singled out China. China is often cited as a suspect in various hacking attacks on companies in the United States and other nations.


Canada foreign minister protests to China over hacking attempt

- Tue, 29 Jul 2014 10:39:09 -0400

Canadian Foreign Minister John Baird protested to his Chinese counterpart on Tuesday about what he said was an attempt by China-sponsored hackers to break into a key computer system in Ottawa, a government official said. Baird had "a full and frank exchange of views" with Chinese Foreign Minister Wang Yi during a meeting in Beijing, spokesman Adam Hodge said. Canada said "a highly sophisticated Chinese state-sponsored actor" recently broke into computers at the National Research Council, the Canadian government's leading research and technology organization.

Huawei says ships 34 million smartphones in H1 globally, up 62 percent year-on-year

- Tue, 29 Jul 2014 00:12:52 -0400

Journalists attend the presentation of the Huawei's new smartphone, the Ascend P7, launched by China's Huawei Technologies in ParisBy Yimou Lee HONG KONG (Reuters) - China's Huawei Technologies Co Ltd said smartphone shipments in the first half rose 62 percent year-on-year, as it targets the more expensive smartphone sector dominated by Samsung Electronics Co Ltd and Apple Inc. Shenzhen-based Huawei has shipped 34.27 million smartphones globally in the first six months ending June 30 - about 43 percent of its annual shipment target of 80 million, according to Reuters' calculations based on figures provided by Huawei. "We recorded faster growth in areas such as Middle East and Africa and Latin America, with 275 percent and 550 percent year-on-year growth in the second quarter, respectively," Shao Yang, vice president of marketing in the consumer business group, told Reuters in a written statement. "Based on the growth momentum at the moment, we are firmly moving toward our full-year target," Shao said, adding that smartphones are now accounting for 97 percent of Huawei's global phone shipments.


Aretha Franklin Kicked Out of Johnny Rockets

- Mon, 28 Jul 2014 18:23:37 -0400

Aretha Franklin Kicked Out of Johnny RocketsToday in celebrity gossip: A Johnny Rockets waiter out-diva'd Aretha Franklin, Keith Urban's fans nearly drank themselves to death at his concert, and Comic-Con yielded so many celebrity group-selfies. Ordering a hamburger to go and then deciding to eat it in the restaurant.


Apple iPhones allow extraction of deep personal data, researcher finds

- Fri, 25 Jul 2014 21:00:54 -0400

The exploded view of the home button which doubles as a fingerprint sensor is seen on an image of the new iPhone 5S at Apple Inc's media event in CupertinoBy Joseph Menn SAN FRANCISCO (Reuters) - Personal data including text messages, contact lists and photos can be extracted from iPhones through previously unpublicized techniques by Apple Inc employees, the company acknowledged this week. The same techniques to circumvent backup encryption could be used by law enforcement or others with access to the "trusted" computers to which the devices have been connected, according to the security expert who prompted Apple's admission. In a conference presentation this week, researcher Jonathan Zdziarski showed how the services take a surprising amount of data for what Apple now says are diagnostic services meant to help engineers. As word spread about Zdziarski?s initial presentation at the Hackers on Planet Earth conference, some cited it as evidence of Apple collaboration with the National Security Agency.


Senior U.S. Homeland Security cyber official Larry Zelvin to retire

- Thu, 24 Jul 2014 07:47:49 -0400

A U.S. Department of Homeland Security employee stands inside the National Cybersecurity and Communications Integration Center in ArlingtonLarry Zelvin, the head of the U.S. Department of Homeland Security's center for countering cyber threats, is retiring next month after a government career of nearly 30 years during which he advised U.S. businesses on fighting hostile hackers. Zelvin helped coordinate efforts to advise U.S. banks as they responded to denial of service attacks believed to have originated from Iran, which disrupted their websites in recent years. He also assisted U.S. retailers looking to prevent cyber attacks on their point of sales systems after last year's unprecedented breach at Target Corp. A spokesman said a successor has not been named to run the agency's National Cybersecurity and Communications Integration Center (NCCIC) in suburban Virginia, which helps government agencies and private firms identify and respond to cyber attacks.


ECB says website hacked, no sensitive data affected

- Thu, 24 Jul 2014 07:18:12 -0400

A passerby uses his smartphone to take a picture of the euro sign landmark in front of the headquarters of the European Central Bank (ECB) in FrankfurtThe European Central Bank said on Thursday its website had been hacked and some email addresses and other contact information stolen but insisted no market-sensitive data were affected. The hackers broke into a database storing details of people who had registered for ECB conferences, visits and other events, the bank said. "No internal systems or market sensitive data were compromised," the ECB said in a statement. The ECB is currently running a particularly sensitive review of the euro zone's top lenders, collecting streams of data to gauge whether banks have valued loans and other assets correctly, before it starts supervising them.


Nokia's fortunes brighten on heavy network spending

- Thu, 24 Jul 2014 06:40:03 -0400

By Sakari Suoninen and Jussi Rosendahl HELSINKI (Reuters) - Nokia surprised investors with strong quarterly earnings and raised its full-year profit margin forecast as network operators install more powerful systems to cope with surging mobile data traffic. The Finnish company sold its once-dominant phone business to Microsoft in April, leaving it more reliant on a mobile network equipment business that shrank by 8 percent in the April-to-June quarter. Much of the decline was due to foreign currency fluctuations and divestments and Nokia said it expected network sales to return to growth in the second half of the year after a period in which the company sought to exit unprofitable contracts. The company raised its profitability estimate for networks, saying its operating margin this year would be at or slightly above the high end of a long-term target of 5 to 10 percent.

U.S. says Chinese man pleads guilty in military technology sting

- Wed, 23 Jul 2014 20:04:28 -0400

A 28-year-old Chinese man pleaded guilty on Wednesday of attempting to smuggle military technology obtained from undercover U.S. agents out of the United States to China, the U.S. Justice Department said. Bo Cai, an employee of a Chinese technology firm, was accused along with his cousin Wentong Cai, 29, of trying to illegally export sensors primarily manufactured for sale to the U.S. Department of Defense. Wentong Cai, who was in the United States on a student visa, has pleaded not guilty to the charges against him. The U.S. Arms Export Control Act and International Traffic in Arms Regulations prohibit the export of defense-related materials from the United States without a license or written approval from the U.S. Department of State.

NYC official: Thieves got into 1K StubHub accounts

- Wed, 23 Jul 2014 18:59:47 -0400

Bryan Caputo, left, and Daniel Petryszyn sit during arraignment proceedings in New York state Supreme Court, Wednesday, July 23, 2014. They are two of six people who were indicted Wednesday in an international ring that took over more than 1,600 StubHub users' accounts and fraudulently bought tickets to such prime events as Jay-Z and Elton John concerts and Broadway shows like "The Book of Mormon," the Manhattan district attorney said Wednesday. (AP Photo)NEW YORK (AP) ? Some of the hottest tickets in town ? to Broadway hits, Jay-Z and Justin Timberlake concerts, a New York Yankees-Boston Red Sox game ? were snapped up by an international ring of cyber thieves who commandeered more than 1,000 StubHub users' accounts to make big money by fraudulently buying tickets and reselling them, prosecutors said Wednesday.


Seven arrests made in $1.6 million StubHub cyberfraud case

- Wed, 23 Jul 2014 18:16:30 -0400

Manhattan District Attorney Cyrus Vance Jr. speaks during a news conference at his office in midtown Manhattan, New YorkBy Karen Freifeld NEW YORK (Reuters) - Police have arrested seven people on charges they were tied to an international ring that defrauded eBay Inc's StubHub online ticketing service of some $1.6 million, the latest in a string of high-profile cybercrime busts in recent months. Manhattan District Attorney Cyrus Vance Jr announced the arrests on Wednesday. They were charged with involvement in a cybercrime ring that used stolen credit card numbers to purchase thousands of tickets to events, including concerts of Justin Timberlake and Jay-Z as well as games for sports teams including the Boston Red Sox and New York Giants, according to court documents unsealed Wednesday. StubHub's head of global communications, Glenn Lehrman, told Reuters his firm has been working with law enforcement around the world for the last year on the case.


Reuters U.S. Sports Schedule at 2 PM EDT on Wednesday, July 23

- Wed, 23 Jul 2014 14:31:04 -0400

July 23 (Reuters) - Reuters U.S. sports schedule at 2 PM ET on Wednesday: - - - - The duty editor is Steve Ginsburg, 202-898-8427 - - - - NATIONAL FOOTBALL LEAGUE Wednesday: NFC previews and rankings by division - - Broncos owner Bowlen battling Alzheimer's, resigns control of team Denver Broncos owner Pat Bowlen is resigning control of the team to focus on battling Alzheimer's Disease. ...

Six indicted in New York for involvement in StubHub cyber fraud

- Wed, 23 Jul 2014 14:12:50 -0400

Manhattan District Attorney Cyrus Vance Jr. speaks during a news conference at his office in midtown Manhattan, New YorkNew York (Reuters) - Six people were indicted in New York for involvement in a global cybercrime ring that took over more than 1,000 accounts of eBay Inc's StubHub online ticket reselling service, according to a statement released by the office of Manhattan District Attorney Cyrus R. Vance Jr. Cybercriminals are believed to have defrauded StubHub of $1 million, the statement said, citing City of London Police Commissioner Adrian Leppard. (Reporting by Karen Freifeld in New York. Writing by Jim Finkle in Boston; Editing by Chris Reese)


AP source: Thieves got into 1K StubHub accounts

- Wed, 23 Jul 2014 12:50:30 -0400

Cyber thieves got into more than 1,000 StubHub customers' accountsNEW YORK (AP) ? Cyber thieves got into more than 1,000 StubHub customers' accounts and fraudulently bought tickets for events through the online ticket reseller, a law enforcement official and the company said.


Apple denies intentionally compromising iOS security, explains ?backdoor? features

- Wed, 23 Jul 2014 08:45:14 -0400

Apple denies intentionally compromising iOS security, explains ?backdoor? featuresFollowing an extensive security report from an iOS forensic and security expert that questioned some of Apple?s iOS tools when it comes to the user?s security and privacy (see his questions in the image above), Apple has taken another step to address ?backdoor? concerns on top of stating that it?s not working with anyone to include backdoors in any of its products. Researcher Jonathan Zdziarski said in his paper that certain tools available in iOS will allow governmental spying agencies and other third parties to remotely control an iOS device and install silent malware that could then be used to spy on an unsuspecting user. Apple has published a new support document on its website, offering some explanations on how


PayPal signs "ten of thousands" customers in Nigerian launch

- Wed, 23 Jul 2014 02:39:47 -0400

Onasanya, managing director of First Bank of Nigeria, and Dahan, PayPal's regional director of Israel and Africa shake hands at the announcement of a partnership between First Bank of Nigeria and PayPal, in LagosBy Chijioke Ohuocha LAGOS (Reuters) - PayPal has signed up "tens of thousand" of Nigerians in its first week of operating in Africa's biggest economy, with consumers already purchasing items from Britain, China and the United States via its online platform, a company official said. E-commerce remains in its infancy in most of Africa but is growing exponentially with the advent of online retailers such as Jumia, partly owned by South African phone operator MTN, and a growing middle class with money to spend. ...


Integrating Into the 'Internet of Things' (Op-Ed)

- Tue, 22 Jul 2014 13:36:45 -0400

Integrating Into the 'Internet of Things' (Op-Ed)Kevin Curran is a reader in Computer Science at the University of Ulster and an IEEE Senior Member. The Internet of Things †(IoT) will allow consumers to interact with nearly every appliance and device they own. We are seeing elements of the IoT in the marketplace already, with home automation having a strong consumer pull ? controlling the lights and temperature, closing the garage door while across town, getting alerts from a smoke detector. If IoT is campaigning to run nearly every aspect of people's digital lives, we need to consider factors that will ensure a seamless and safe introduction.


China's Xiaomi hopes Mi 4 smartphone can take on Apple

- Tue, 22 Jul 2014 08:36:19 -0400

Lei Jun, founder and CEO of China's mobile company Xiaomi, shows new features at launch ceremony of Xiaomi Phone 4 in BeijingXiaomi launched its flagship Mi 4 smartphone at a glitzy event in Beijing, where the Chinese budget handset maker's chief executive sought to challenge larger U.S. rival Apple Inc. The Mi 4 comes as budget handset makers in China are competing more aggressively on price and generous features, with even high-end manufacturers feeling the pressure. Dressed in a black T-shirt and blue jeans, Xiaomi CEO Lei Jun took aim repeatedly at iPhone maker Apple during the presentation on Tuesday, comparing the design and manufacturing process of his new 4G handset to the U.S. firm's more expensive offerings. "Even our white color is whiter!" Apple, which was due to announce second-quarter earnings later on Tuesday, was not immediately available to comment. The forthright Jun spent nearly an hour on stage describing the Mi 4 phone's construction - particularly its beveled metal rim whose similarity with Apple's phones drew murmurs of "iPhone" from the journalists at the event.


Apple denies having included a backdoor in iOS or other products

- Tue, 22 Jul 2014 07:15:56 -0400

Apple denies having included a backdoor in iOS or other productsAn extensive research paper from a security specialist revealed earlier this week that governments and other third-parties with malicious intentions would be able to use certain tools in iOS to extract information from iPhones and other iOS devices, without the user?s consent or knowledge. Apple has already issued a response on the matter, denying the existence of backdoors in its products, and further emphasizing the security and privacy features of iOS. ?We have designed iOS so that its diagnostic functions do not compromise user privacy and security, but still provides needed information to enterprise IT departments, developers and Apple for troubleshooting technical issues,? Apple wrote in an email statement that was published on Twitter by Financial Times journalist Tim Bradshaw.


Fund managers unconvinced by Apple rebound

- Tue, 22 Jul 2014 05:45:59 -0400

The leaf on the Apple symbol is tinted green at the Apple flagship store on 5th Ave in New YorkBy David Randall and Edwin Chan NEW YORK/SAN FRANCISCO (Reuters) - Apple, once a can't-miss stock, is finding it tough to persuade portfolio managers to come back into the fold. Yet the company remains one of the most significantly underweighted stocks among large cap fund managers, according to a Goldman Sachs report. Part of the reason for a lack of portfolio manager enthusiasm is that Apple Inc no longer seems to be the hot growth company of old, fund managers say. Apple reports results for its fiscal third quarter on Tuesday, July 22.


Fund managers unconvinced by Apple rebound as firm readies results

- Mon, 21 Jul 2014 18:13:33 -0400

The Apple logo is pictured at a retail store in the Marina neighborhood in San FranciscoBy David Randall and Edwin Chan NEW YORK/SAN FRANCISCO (Reuters) - Apple, once a can't-miss stock, is finding it tough to persuade portfolio managers to come back into the fold. Yet the company remains one of the most significantly underweighted stocks among large cap fund managers, according to a Goldman Sachs report. Part of the reason for a lack of portfolio manager enthusiasm is that Apple Inc no longer seems to be the hot growth company of old, fund managers say. Apple reports results for its fiscal third quarter on Tuesday, July 22.


Hacking talks axed over the years

- Mon, 21 Jul 2014 15:08:19 -0400

(Reuters) - A highly anticipated talk on how to identify users of the Tor service, widely used to access the Internet anonymously, has been withdrawn from next month's annual Black Hat security conference. Hacking experts disclose vulnerabilities at conferences to alert the public about security flaws, both to pressure developers to fix them and to warn users about products that may not be completely safe. Here are some examples of other hacking talks that have been pulled from conferences over the past decade: 2013 - Three European computer scientists canceled a talk on hacking the locks of luxury cars at a prestigious U.S. academic conference known as USENIX, after Volkswagen AG obtained a restraining order from a British court. 2007 - Security firm IOActive Inc pulled a talk at Black Hat DC on bugs in radio-frequency identification, or RFID, technology, saying it was pressured to do so by RFID technology firm HID Global Corp. 2005 - Cisco Systems Inc persuaded security firm Internet Security Systems to pull a discussion on hacking routers by researcher Michael Lynn at the Black Hat hacking conference in Las Vegas.

Security researcher: iOS security has been intentionally compromised by Apple

- Mon, 21 Jul 2014 12:33:07 -0400

Apple denies intentionally compromising iOS security, explains ?backdoor? featuresApple?s placing a lot of emphasis on iOS security (especially when compared with that ?toxic hellstew? Android) and on privacy (again, compared to its rival) but it turns out that iOS might not be as secure or private as Apple has led customers to believe. Security researcher Jonathan Zdziarski has a new paper out†called ?Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices,? in which he†reveals Apple?s complex tools inside iOS that would allow Apple to share†certain user data†at the request of law enforcement without the user knowledge. More importantly, with or without Apple?s help, spying agencies such as NSA and other third parties that are very familiar with how iOS operates can apparently†use these vulnerabilities to grab plenty


Kenya military Twitter account hacked

- Mon, 21 Jul 2014 11:58:28 -0400

The Twitter account run by Kenya's military was taken over by hackers claiming to be from the international activist collective Anonymous, a military spokesman said Monday No internal military systems ...

Huawei's H1 revenue up 19 percent year-on-year at $22 billion

- Sun, 20 Jul 2014 22:45:58 -0400

A man walks past a Huawei company logo outside the entrance of a Huawei office in Wuhan, Hubei provinceHuawei Technologies Co Ltd, the world's No. 2 telecom equipment maker, said on Monday it will achieve sustainable growth in 2014 after posting a 19 percent jump in first-half revenue to 135.8 billion yuan ($21.88 billion). "Driven by increasing investments in LTE networks worldwide, Huawei has further solidified its leadership position in mobile broadband," Huawei's CFO Cathy Meng said in the statement. "Rapid growth in software and services helped maintain steady growth in our carrier network business." Meng said Huawei achieved "sustainable growth" in its consumer business, which includes smartphone manufacturing, thanks to better brand awareness.


Snowden seeks to develop anti-surveillance technologies

- Sat, 19 Jul 2014 18:23:31 -0400

Accused government whistleblower Snowden is seen on a screen as he speaks via videoconference with members of the Committee on legal Affairs and Human Rights of the Parliamentary Assembly of the Council of Europe in StrasbourgBy Jim Finkle NEW YORK (Reuters) - Edward Snowden, a former U.S. spy agency contractor who leaked details of major U.S. surveillance programs, called on supporters at a hacking conference to spur development of easy-to-use technologies to subvert government surveillance programs around the globe.† Snowden, who addressed conference attendees on Saturday via video link from Moscow, said he intends to devote much of his time to promoting such technologies, including ones that allow people to communicate anonymously and encrypt their messages. He escaped the United States after leaking documents that detailed massive U.S. surveillance programs at home and abroad - revelations that outraged some Americans and sparked protests from countries around the globe. At the HOPE hacking conference, several talks detailed approaches for thwarting government surveillance, including a system known as SecureDrop that is designed to allow people to anonymously leak documents to journalists. The conference featured about 100 presentations on topics ranging from surveillance to hacking elevators and home routers.


Golf-Blood spilt as Els says he put 'jinx' on his group

- Fri, 18 Jul 2014 02:45:00 -0400

Ernie Els of South Africa walks off after finishing his first round of the British Open Championship at the Royal Liverpool Golf Club in HoylakeBy Martyn Herman HOYLAKE England (Reuters) - Ernie Els left a spectator bloodied with a wild opening tee shot, defending champion Phil Mickelson went out of bounds, and Bubba Watson's promising start was blown away at the British Open on Thursday. Double Open champion Els went round in 79 after being visibly shaken by the bloody aftermath of an errant drive at the first and then missing two tiddlers on the green, one with a casual back-handed putt usually reserved for park hackers.


Hackers target Nest as a warning to Google about data-sharing

- Thu, 17 Jul 2014 17:00:19 -0400

If you ask Nest about sharing data with its new owner, the company will say that advertising isn?t part of its business model†and that it plans to protect the privacy of its customers from Google. Nest will have to share some data with Google and others†in order to enable automatic home-related features, but it is†not supposed to lead to Google targeting users with even more ads than it currently does. To make sure Google won?t someday spam Nest owners with ads, a group of hackers plans to take preemptive action against Google and Nest, Forbes reports. Researchers from the University of Central Florida have found a vulnerability they can exploit in order to stop Nest thermostats from sending data to

Hackers target Nest in as a warning to Google about data-sharing

- Thu, 17 Jul 2014 17:00:19 -0400

If you ask Nest about sharing data with its new owner, the company will say that advertising isn?t part of its business model†and that it plans to protect the privacy of its customers from Google. Nest will have to share some data with Google and others†in order to enable automatic home-related features, but it is†not supposed to lead to Google targeting users with even more ads than it currently does. To make sure Google won?t someday spam Nest owners with ads, a group of hackers plans to take preemptive action against Google and Nest, Forbes reports. Researchers from the University of Central Florida have found a vulnerability they can exploit in order to stop Nest thermostats from sending data to

Blood spilt as Els says he put 'jinx' on his group

- Thu, 17 Jul 2014 16:02:59 -0400

By Martyn Herman HOYLAKE England (Reuters) - Ernie Els left a spectator bloodied with a wild opening tee shot, defending champion Phil Mickelson went out of bounds, and Bubba Watson's promising start was blown away at the British Open on Thursday. Double Open champion Els went round in 79 after being visibly shaken by the bloody aftermath of an errant drive at the first and then missing two tiddlers on the green, one with a casual back-handed putt usually reserved for park hackers.

These are the absurd names British intelligence spies have to remember to spy on you

- Tue, 15 Jul 2014 21:45:21 -0400

These are the absurd names British intelligence spies have to remember to spy on youIn case you didn?t know it by now, spy agencies are really good ? and hopefully effective ? at†spying on people, including both actual valid targets as well as†unsuspecting citizens who†aren?t plotting anything bigger than a trip to†an exotic country.†To further demonstrate the power of one such agency ? NSA?s close buddy, the British GCHQ, in this case ? The Intercept has published a new Snowden leak, which reveals such ambitious mass spying plans, as well as their silly names. ?The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, ?amplif[y]? sanctioned messages on YouTube, and


'Smart' technology could make utilities more vulnerable to hackers

- Tue, 15 Jul 2014 21:31:53 -0400

By Christoph Steitz and Harro Ten Wolde FRANKFURT (Reuters) - Last November, Felix Lindner came very close to shutting down the power supply of Ettlingen, a town of almost 40,000 people in the south of Germany. "We could have switched off everything: power, water, gas," Lindner, head of Berlin-based Recurity Labs, an IT security company, said. Fortunately for residents, Lindner's cyber attack on its energy utility, Stadtwerke Ettlingen, was simulated. "The experiment has shown that sensitive, critical infrastructure is not sufficiently protected," said Eberhard Oehler, managing director of the utility, Stadtwerke Ettlingen.

Apple, IBM team up in mobile devices, applications

- Tue, 15 Jul 2014 18:13:10 -0400

CUPERTINO, Calif. (AP) ? Apple is teaming up with former nemesis IBM in an attempt to sell more iPhones and iPads to corporate customers and government agencies.

Insurers struggle to get grip on burgeoning cyber risk market

- Mon, 14 Jul 2014 13:20:05 -0400

A lock icon, signifying an encrypted Internet connection, is seen on an Internet Explorer browser in ParisHigh profile cases of hackers seizing sensitive customer data from companies, such as U.S. retailer Target Corp or e-commerce company eBay Inc, have executives checking their insurance policies. Increasingly, corporate risk managers are seeing insurance against cyber crime as necessary budget spending rather than just nice to have. The insurance broking arm of Marsh & McLennan Companies estimates the U.S cyber insurance market was worth $1 billion last year in gross written premiums and could reach as much as $2 billion this year. The European market is currently a fraction of that, at around $150 million, but is growing by 50 to 100 percent annually, according to Marsh.


 

Twitter / SecureMac

http://twitter.com/SecureMac

SecureMac: MacScan 2.9.3 with Google Chrome & SeaMonkey Support Released for Macs #privacy #security #mac - http://t.co/wCy0sddR

- Fri, 18 May 2012 14:52:24 +0000

SecureMac: MacScan 2.9.3 with Google Chrome & SeaMonkey Support Released for Macs #privacy #security #mac - http://t.co/wCy0sddR

SecureMac: Proud @MacworldUK and @MacworldAU reviewed @PrivacyScan and gave it 5/5 stars & an Editor's Choice award! http://t.co/ew6Wjj67

- Thu, 05 Apr 2012 01:30:08 +0000

SecureMac: Proud @MacworldUK and @MacworldAU reviewed @PrivacyScan and gave it 5/5 stars & an Editor's Choice award! http://t.co/ew6Wjj67

SecureMac: Researching new piece of Mac #malware that is currently in the wild infecting computers running OS X. http://t.co/38RsQVAQ

- Tue, 20 Mar 2012 06:00:04 +0000

SecureMac: Researching new piece of Mac #malware that is currently in the wild infecting computers running OS X. http://t.co/38RsQVAQ

SecureMac: SecureMac is honored ~ @MacworldUK has awarded @PrivacyScan as Best of Show for Macworld | iWorld this year. http://t.co/bBqaCH7F

- Fri, 16 Mar 2012 20:18:06 +0000

SecureMac: SecureMac is honored ~ @MacworldUK has awarded @PrivacyScan as Best of Show for Macworld | iWorld this year. http://t.co/bBqaCH7F

SecureMac: Attention Developers, @SecureMac is hiring Cocoa Developers. http://t.co/F4Give2s #jobs #dev #hiring

- Tue, 13 Mar 2012 18:52:23 +0000

SecureMac: Attention Developers, @SecureMac is hiring Cocoa Developers. http://t.co/F4Give2s #jobs #dev #hiring

SecureMac: SecureMac is hiring more Mac Cocoa Developers. See requirements & submit resume! #jobs #macjobs http://t.co/LOfi5e5T

- Mon, 05 Mar 2012 21:06:20 +0000

SecureMac: SecureMac is hiring more Mac Cocoa Developers. See requirements & submit resume! #jobs #macjobs http://t.co/LOfi5e5T

SecureMac: Read how Google's accused of Bypassing Safari's Privacy Controls http://t.co/1KyOlzbH Another Reason for @MacScan @PrivacyScan

- Fri, 17 Feb 2012 16:55:34 +0000

SecureMac: Read how Google's accused of Bypassing Safari's Privacy Controls http://t.co/1KyOlzbH Another Reason for @MacScan @PrivacyScan

SecureMac: PrivacyScan 1.0.1 has been released and is available on the Mac App Store adding bug fixes still 4.99! http://t.co/8fV15Tm7

- Wed, 08 Feb 2012 05:58:53 +0000

SecureMac: PrivacyScan 1.0.1 has been released and is available on the Mac App Store adding bug fixes still 4.99! http://t.co/8fV15Tm7

SecureMac: With the launch of @PrivacyScan in the Mac App Store we're #1 in utilities and ranking in top 10 paid overall. Day 1 http://t.co/Chc4IZDE

- Fri, 27 Jan 2012 02:19:15 +0000

SecureMac: With the launch of @PrivacyScan in the Mac App Store we're #1 in utilities and ranking in top 10 paid overall. Day 1 http://t.co/Chc4IZDE

SecureMac: @fakemacfusion Are you on the macworld press list? Let me know your email to get you off the PR list.

- Thu, 26 Jan 2012 16:06:39 +0000

SecureMac: @fakemacfusion Are you on the macworld press list? Let me know your email to get you off the PR list.

SecureMac: SecureMac staff will be on the Macworld show floor today at booth #442 talking security and demonstrating @PrivacyScan & @MacScan

- Thu, 26 Jan 2012 16:04:23 +0000

SecureMac: SecureMac staff will be on the Macworld show floor today at booth #442 talking security and demonstrating @PrivacyScan & @MacScan

SecureMac: PrivacyScan is now live on the Mac App Store! Check it out and give us your feedback! http://t.co/4W4y8ztO

- Wed, 25 Jan 2012 16:54:46 +0000

SecureMac: PrivacyScan is now live on the Mac App Store! Check it out and give us your feedback! http://t.co/4W4y8ztO

SecureMac: Need an Free/Discounted Expo Hall Pass to @Macworldexpo ? Get em while they last! http://t.co/gHP8PaZe #macworld

- Thu, 19 Jan 2012 20:39:49 +0000

SecureMac: Need an Free/Discounted Expo Hall Pass to @Macworldexpo ? Get em while they last! http://t.co/gHP8PaZe #macworld

SecureMac: We're going to be at @macworldexpo booth #442! Be sure to stop by and learn about the latest products!

- Wed, 18 Jan 2012 22:30:24 +0000

SecureMac: We're going to be at @macworldexpo booth #442! Be sure to stop by and learn about the latest products!

SecureMac: Getting ready for #macworld ~ booth 442. Be sure to follow us if you're still looking for a free expo hall pass, and watch for link.

- Fri, 06 Jan 2012 19:20:40 +0000

SecureMac: Getting ready for #macworld ~ booth 442. Be sure to follow us if you're still looking for a free expo hall pass, and watch for link.

SecureMac: Start off your New Year by changing your passwords. How long has it been? #macsecurity

- Wed, 04 Jan 2012 17:03:38 +0000

SecureMac: Start off your New Year by changing your passwords. How long has it been? #macsecurity

SecureMac: @ken_gok email macsec@securemac.com with as much info as you have on what you downloaded including links and we can check it out!

- Fri, 23 Dec 2011 15:50:24 +0000

SecureMac: @ken_gok email macsec@securemac.com with as much info as you have on what you downloaded including links and we can check it out!

SecureMac: MacScan 2.9.2 Released! Celebrate with us and download a free 30-day trial or upgrade your app! http://t.co/xr3NJoQk

- Tue, 20 Dec 2011 17:09:59 +0000

SecureMac: MacScan 2.9.2 Released! Celebrate with us and download a free 30-day trial or upgrade your app! http://t.co/xr3NJoQk

SecureMac: Love Cyber Monday? Get the http://t.co/G8EB7cwc software bundle for 49.99! First 10k people get MacScan!

- Mon, 28 Nov 2011 17:23:17 +0000

SecureMac: Love Cyber Monday? Get the http://t.co/G8EB7cwc software bundle for 49.99! First 10k people get MacScan!

SecureMac: RT @macscan: 1 Day Only - Black Friday Sale ~ MacScan 80% OFF Use Coupon Code CYBERSALE11 - http://t.co/AtD091ty

- Fri, 25 Nov 2011 05:08:17 +0000

SecureMac: RT @macscan: 1 Day Only - Black Friday Sale ~ MacScan 80% OFF Use Coupon Code CYBERSALE11 - http://t.co/AtD091ty