IANS Blog RSS Feed

http://www.iansresearch.com

Poulin to CSO: We Hacked a Smart Building Using ?Old-School? Techniques

- Thu, 11 Feb 2016 00:00:00 GMT

The ?smarter? buildings get, the easier they are to hack? Maybe. IANS Faculty Chris Poulin, research strategist for IBM?s X-Force ethical hacking team, recently spoke to CSO?s Maria Korolov about a penetration test in which his team was able to gain access to all of the buildings operated by a building management company.

Privacy, Security Concerns Rise as States Mull Encryption Backdoor Requirements

- Wed, 27 Jan 2016 00:00:00 GMT

National Data Privacy Day (January 28th) certainly comes at an interesting time this year, as legislators in two of the most technology-centric U.S. states recently introduced similar bills that would force smartphone manufacturers to include encryption backdoors in their devices.

Fledgling Cyber-Insurance Market Tested by Early Denials, Lawsuits

- Wed, 20 Jan 2016 00:00:00 GMT

Cybersecurity insurance policies may be relatively new, but they have one important thing in common with established, legacy business coverage: They live and die in the fine print.

Hacker-Caused Ukrainian Power Outage Marks First Known Attack With Immediate, Direct Public Impact

- Tue, 05 Jan 2016 00:00:00 GMT

Security researchers have confirmed that a recently updated version of the highly destructive BlackEnergy malware package infected the systems of at least three power authorities in Ukraine, causing a massive outage that left thousands of homes in the Ivano-Frankivsk region of the country without electricity.†

Top 10 IANS Insights from a Tumultuous 2015

- Mon, 28 Dec 2015 00:00:00 GMT

Another year is in the books and what a year it was for infosec pros. From the Ashley Madison hack to the OPM breach, to Jeep commandeering and mysterious backdoors in popular networking gear, every week brought a new security twist that forced us all to keep our heads on swivels.

Herold: Misguided CISA Heightens Security, Privacy Concerns

- Mon, 21 Dec 2015 00:00:00 GMT

The controversial Cybersecurity Information Sharing Act (CISA) is now the law of the land, slipped into an eleventh-hour†spending bill designed to keep the federal government running through 2016.

Patch Now: Rogue Code Leaves Gaping Hole in Juniper Gear

- Fri, 18 Dec 2015 00:00:00 GMT

Juniper Networks says unauthorized code could allow attackers to gain administrative access to its NetScreen appliances and decrypt VPN connections without leaving any trace of their actions. Users are urged to apply fixes immediately.

Poulin: Time to Realistically Acknowledge Vehicle Vulnerabilities

- Wed, 16 Dec 2015 00:00:00 GMT

The images and breathless banter were difficult to ignore: celebrity security researchers gaining remote command of an automobile, disrupting on-board systems before forcing the vehicle and its helpless driver into a ditch.

NIST to Infosec Pros: How Is Our Framework Working?

- Mon, 14 Dec 2015 00:00:00 GMT

The National Institute of Standards and Technology is asking infosec practitioners in the public and private sectors to comment on the efficacy of its cybersecurity framework as it prepares to update the popular, two-year-old document.

As Ransomware Attacks Evolve, Security Teams Must Prepare For New ?Drive-By? Tactics

- Thu, 10 Dec 2015 00:00:00 GMT

Another week, another evolution of the popular ransomware attacks. When we last wrote about it, researchers had discovered a new iteration ? ?Linux.Encoder.1? ? that enabled attackers to inject malware into Linux-powered websites and encrypt all files in the home and backup directories. Now, it appears the popular exploit kit Angler is being used to spread the latest version of CryptoWall and other ransomware on websites as part of ?drive-by? campaigns that begin with the deployment of password-stealing malware.†

Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

Backdoor.Psiload

- Wed, 25 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AV

- Wed, 25 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Furtim

- Wed, 25 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AU

- Tue, 24 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Huntpos!g1

- Wed, 25 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Prikormkak

- Tue, 24 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Huntpos!gm

- Mon, 23 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Turla!gen4

- Tue, 24 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptlock.AN!g2

- Tue, 24 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Banswift!gen1

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Redir

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

JS.Dropper

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AT

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Lostdrat

- Sun, 22 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Bayrob!gen8

- Mon, 16 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Heur.AdvML.D

- Wed, 18 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Heur.AdvML.C

- Wed, 18 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Heur.AdvML.B

- Wed, 18 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

JS.Downloader!gen20

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomlock.AS

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AR

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AS

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptlock.AH!g1

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AP

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AQ

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Wortrik

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Android.Cepsohord

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Packed.Generic.505

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptlock.N!g7

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ranscrypt.AP!gm

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AP

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ranslock.AQ!g1

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W97M.Downloader.I

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AN

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AO

- Tue, 10 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-1015

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-1016

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-1017

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Duuzer.B

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Qakbot!g1

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Backdoor.Tronariv

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Jakubot

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Heur.RGC!g108

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g136

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g147

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g185

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g90

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.CM!g13

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.DL!g5

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MSWord!g3

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic2.RGC!g8

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen57

- Tue, 3 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

PHP.Fioesrat

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AM

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

VBS.Backbat

- Mon, 2 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus.

Trojan.Ransomcrypt.AL

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomlock.AQ

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Pekelog

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Adupihan

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Godmodir

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Prociy

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Downloader.Exopire

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Etumbot

- Tue, 26 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Exedapan!gm

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-2347

- Fri, 20 May 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

Exclusive: In Ecuador cyber heist, thieves moved $9 million to 23 Hong Kong firms

- Wed, 25 May 2016 19:48:06 -0400

A branch of the Banco del Austro is seen in QuitoBy Clare Baldwin and Nathan Layne HONG KONG/CHICAGO (Reuters) - Cyber thieves who stole $12 million from an Ecuadorian bank in 2015 routed the funds through 23 companies registered in Hong Kong, some of them with no clear business activity, according to previously unreported court filings and judicial rulings. The court papers offer a first glimpse into where some of the money was moved after it reached accounts in Hong Kong. The filings stem from a lawsuit filed in early 2015 by Ecuador's Banco del Austro (BDA) in Hong Kong against the web of companies that received or handled more than $9 million in stolen funds, bank records submitted to the territory's Court of First Instance show.


Don text and drive in Canada, or cops will bust you with this camera rig

- Wed, 25 May 2016 18:50:55 -0400

Texting and driving is a menace that's up there with chugging vodka while at the wheel, and cops the world over are slowly cracking down on it. But how do you catch errant texters? With a DSLR and†some serious glass, if you're Canada's Mounties. DON'T MISS:† Microsoft?s just turned Windows 10 into malware A† CBC News† report spotted by† PetaPixel † shows RCMP officers in British Columbia using a new set-up to catch drivers who are texting and driving at intersections. The rig consists of a DSLR, a 50mm lens, and a target-shooting spotting scope. It's a reasonably affordable set of kit -- certainly cheaper than a 500mm zoom lens -- but it should be good enough to capture photos of offenders from three-quarters of a mile away. That's bad news for anyone who likes to drive distracted. Even if you think it's reasonable to check your phone at a red light, it's illegal under Canadian law, and the Mounties are coming for your texts. The good news for distracted drivers is that due to the limitations of the rig (and in general, limitations of trying to photograph a car going at 70mph), it's only going to work at intersections for now. To catch highway phone users, cops are going to be relying on the old-fashioned Mk. 1 eyeball for now. Canada's set-up is the lastest in a list of technology to catch distracted drivers. Legislation was recently introduced in New York state to give cops "textalyzers," devices that could be used on driver's phones after a crash to see if they had been using it in the run-up to an accident. A spotting scope is a little more old-school, but nonetheless effective in issuing tickets.

Exclusive: Bangladesh probes 2013 hack for links to central bank heist

- Wed, 25 May 2016 16:27:31 -0400

bangladeshBy Krishna N. Das and Ruma Paul DHAKA (Reuters) - Bangladesh police are reviewing a nearly forgotten 2013 cyber heist at the nation?s largest commercial bank for connections to February's $81 million heist at the country's central bank, a senior law enforcement official said on Wednesday. The unsolved theft of $250,000 at Sonali Bank involved fraudulent transfer requests sent over the SWIFT international payments network. It is not widely known outside of Bangladesh, and in fact was treated as a cold case until Bangladesh police revived the investigation after thieves in February also used the SWIFT network to steal $81 million from Bangladesh Bank.


Key findings from inspector general report on Clinton emails

- Wed, 25 May 2016 14:25:13 -0400

WASHINGTON (AP) ? Key findings from the State Department inspector general's report on former Secretary of State Hillary Clinton's emails and private server and the department's email practices:

Report: Upgraded Xbox One with 4K, Oculus Rift support will launch in 2017

- Wed, 25 May 2016 13:55:56 -0400

With less than a month to go until E3 2016 , the rumor mill has begun to kick into high gear. On Wednesday, Kotaku published a report claiming that Microsoft will release a cheaper, smaller Xbox One before the end of the year while†an†upgraded Xbox One console with upgraded specs will launch in 2017. DON'T MISS:† Microsoft?s just turned Windows 10 into malware According to Kotaku's sources, the upgraded Xbox carries the codename Scorpio, and will have a more powerful GPU than the current model.†Sources also say that the new console will be able to support the Oculus Rift , which is why Microsoft is currently working to partner with Oculus in the months leading up to launch. As for the smaller Xbox One, there's a chance it will come equipped†with a 2TB hard drive, although Kotaku couldn't offer many more details regarding the 2016 console. Providing the smaller Xbox One†is real, we'll probably see it at E3 . Together, these two consoles make up a new strategy that sources are calling "Project Helix." This strategy will see the companies two major platforms, Windows and Xbox, come together as one. Developer sources tell Kotaku that Microsoft is going to require games to be made available for both platforms in the future. Finally, it appears that both of these consoles are part of a new iterative approach to console releases that will continue throughout the hardware generation. Sources say that Microsoft will continue to release new hardware on a more consistent basis than ever before, while keeping its games compatible with as much of the available hardware as it possibly can at once. We'll likely hear more about these plans when Microsoft takes the stage at E3 2016 on†Monday, June 13th at 9:30 a.m. PDT. You can read all about the company's currently announced plans for E3 right here .

Clinton faulted on emails by State Department audit

- Wed, 25 May 2016 13:49:52 -0400

Clinton email use broke federal rules: inspector's reportHillary Clinton and her team ignored clear guidance from the State Department that her email setup broke federal standards and could leave sensitive material vulnerable to hackers, an independent audit has found. The inspector general?s review also revealed that hacking attempts forced then-Secretary of State Clinton off email at one point in 2011, though she insists the personal server she used was never breached. Clinton and several of her senior staff declined to be interviewed for the State Department investigation.


Microsoft just turned Windows 10 into malware

- Wed, 25 May 2016 10:58:59 -0400

For months now, Microsoft has done everything in its power to shove† Windows 10 down your throat. The free update is mandatory at this point, and we?ve heard from many Windows users who discovered their computers updated to the newest version automatically , without their knowledge or explicit permission. Microsoft kept offering excuses for these annoying occurrences, and even said it will stop pushing upgrades to Windows users refuse to hope aboard†the Windows 10 train. Now, the company has come up with its†most†evil†trick yet to get you to update your PC to†Windows 10, and it's based on the same methodology hackers use to trick people into installing malware. DON'T MISS:† New free app and site makes watching online videos like regular TV channels Pop-ups often appear when you visit malicious websites and when you click the "X" to close them, malware is installed on your computer. Well,†Microsoft just tweaked its Windows 10 upgrade alert pop-up so that the update is triggered when clicking the X, PC World explains . The Get Windows X app that pushes the update prompt has recently changed the behavior of the ?X? button. Earlier, users would have been able to dismiss†the pop-up by pressing the button, as you would expect. But you can?t do that anymore. Pressing the X now has a different function. It tells the company you?re happy to have your computer updated at the time shown inside the pop-up. The only way to get rid of it is to change the update time manually. But of course, that?s not intuitive at all†and many†people are about to be tricked into†upgrading. The trick is disingenuous at best, since†Microsoft isn?t technically doing anything wrong. It?s just turning the function†of the X button from ?close and do nothing? to ?close and†upgrade later.? You know, without explaining this tiny change to anyone. Come July 29th, Microsoft will stop prompting users to upgrade, Business Insider reminds us, so make sure you change your Windows 10 upgrade time to August†or†later!

Huawei files lawsuits accusing Samsung of violating patents

- Wed, 25 May 2016 03:22:41 -0400

In this May 13, 2016 photo, Chinese sales representatives wait for customers at a Huawei retails shop in Beijing, China. Chinese tech giant Huawei said Wednesday, May 25 it has filed patent infringement lawsuits against South Korean mobile phone rival Samsung in the United States and China, in a case that highlights the rise of Asian competitors as technology creators. (AP Photo/Ng Han Guan)BEIJING (AP) ? Chinese tech giant Huawei said Wednesday it has filed patent infringement lawsuits against South Korean mobile phone rival Samsung in the United States and China, in a case that highlights the rise of Asian competitors as technology creators.


Top Asian News 3:38 a.m. GMT

- Tue, 24 May 2016 23:38:21 -0400

TOKYO (AP) ? Leaders of the Group of Seven rich nations will undoubtedly voice unity over fighting terrorism, pandemics and tax evasion at their summit in Japan this week. Finding a consensus on how to breathe life into their sluggish economies is proving more elusive. Aging workforces, sagging productivity and lingering damage from the 2008 financial crisis are complicating efforts to spur growth while the effects of the slowdown in China and the other big developing economies ripple across the globe. At a pre-summit meeting in northern Japan's Sendai, finance ministers and central bank governors of the G7 failed to concur on a coordinated approach to fighting what Nobel prize-winning economist Joseph E.

China's Huawei files patent suits against Samsung Elec

- Tue, 24 May 2016 22:11:03 -0400

People walk past a sign board of Huawei at CES Asia 2016 in ShanghaiBy Yimou Lee and Anne Marie Roantree HONG KONG (Reuters) - Huawei Technologies Co Ltd [HWT.UL] on Wednesday said it sued Samsung Electronics Co Ltd claiming infringement of smartphone patents, the Chinese firm's first intellectual property challenge against the world's top mobile maker. Huawei has filed lawsuits in the United States and China seeking compensation for what it said was unlicensed use of fourth-generation (4G) cellular communications technology, operating systems and user interface software in Samsung phones. "We hope Samsung will ... stop infringing our patents and get the necessary license from Huawei, and work together with Huawei to jointly drive the industry forward," Ding Jianxing, president of Huawei's Intellectual Property Rights Department, said in a statement.


Samsung Elec to defend interests against Huawei patent suits

- Tue, 24 May 2016 21:08:20 -0400

A man speaks on his mobile phone near a Samsung store in central KievSEOUL (Reuters) - Tech giant Samsung Electronics Co Ltd said on Wednesday it will defend itself against patent lawsuits filed by smartphone rival Huawei Technologies Co Ltd [HWT.UL]. Huawei, the world's third-largest smartphone maker, has filed lawsuits against Samsung in the United States and China claiming infringement of smartphone patents. "We will thoroughly review the complaint and take appropriate action to defend Samsung's business interests," Samsung, the world's top smartphone maker, said in an email to Reuters. (Reporting by Se Young Lee; Editing by Stephen Coates)


Apple rehires prominent security pro as encryption fight boils

- Tue, 24 May 2016 14:30:18 -0400

People wait in line for the grand opening of the next generation Apple Store in San Francisco, CaliforniaBy Joseph Menn SAN FRANCISCO (Reuters) - Apple Inc , which has resisted pressure from U.S. law enforcement to unlock encrypted iPhones, this month rehired a top expert in practical cryptography to bring more powerful security features to a wide range of consumer products. Jon Callas, who co-founded several well-respected secure communications companies including PGP Corp, Silent Circle and Blackphone, rejoined Apple in May, an Apple spokesman said. Callas had worked at Apple in the 1990s and again between 2009 and 2011, when he designed an encryption system to protect data stored on a Macintosh computer.


China's Huawei sues Samsung Electronics claiming mobile patent infringement

- Tue, 24 May 2016 12:43:23 -0400

People walk past a sign board of Huawei at CES Asia 2016 in ShanghaiBy Yimou Lee and Anne Marie Roantree HONG KONG (Reuters) - Huawei Technologies Co Ltd [HWT.UL] said on Wednesday it has filed lawsuits against Samsung Electronics Co Ltd claiming infringement of smartphone patents, in the first such case by the Chinese firm against the world's biggest mobile maker. Huawei has filed lawsuits in the United States and China seeking compensation for what it said was unlicensed use of fourth-generation (4G) cellular communications technology, operating systems and user interface software in Samsung phones. "We hope Samsung will ... stop infringing our patents and get the necessary license from Huawei, and work together with Huawei to jointly drive the industry forward," Ding Jianxing, president of Huawei's Intellectual Property Rights Department, said in a statement.


Pebble just re-invented the iPod Shuffle, and it runs Spotify

- Tue, 24 May 2016 12:05:33 -0400

Back in the days before RunKeeper and GPS watches, my jogs were a beautifully simple thing: I strapped on an iPod Shuffle loaded with a strong mix of Britney and Eminem, and vanished into my own little world for an hour. A couple years later, I transitioned to Spotify and never really looked back. But running with an armband and a 5-inch phone never felt quite the same, and clearly other people agree. That's why I'm absurdly happy that Pebble, a small†Canadian company that makes wearables, is making a Shuffle-sized device that clips on to your shorts, plays your Spotify playlists, and tracks runs. DON'T MISS: iPhones will finally get the OLED screens they deserve The Core is a $70 device about the same size as an old Shuffle, complete with a little clip. It allows you to store Spotify playlists on the 4GB of built-in storage, or stream them over a 3G connection. It also has built-in GPS and integration with popular apps like RunKeeper and Strava, so you can track your workouts. Finally, it builds in an emergency SOS button using that cellular radio, so you still have the comfort value of not being completely cut off from the world in an emergency. It feels like someone's sat down, thought about what my ideal device would be to take running or biking, and then built that. It's a stripped-down machine for people who just want to know how far they've run, and listen to music along the way. My only concern is the controls: Core only has two buttons, so you'll really need to pair it to a Pebble smartwatch over Bluetooth to make the most of it. Pebble actually has other plans for the Core beyond just workouts. As Pebble points out, Core is really just a tiny Android 5.0-powered computer, complete with a full suite of sensors like GPS and microphones, and Bluetooth, Wi-Fi and cellular connectivity. Pebble is making the device completely open to hackers, so you can expect a bunch of Core-powered lifehacks coming soon. Alongside the Core, Pebble also revamped its line of smartwatches with a new focus on fitness. The Pebble 2 is a $100 smartwatch that looks a lot like the original Pebble, but with the notable addition of built-in heartrate tracking. The Pebble Time 2 is an update to last summer's Pebble Time Steel, with a color e-ink display and heart-rate monitoring again. Overall, the smartwatch updates stick to Pebble's core philosophy of the simpler, the better. Pebble watches have buttons instead of touchscreens, and week-long battery life rather than 24 hours. They're meant to be smartwatches for people who mostly want a watch, only with this update, they're now also cheap and powerful fitness trackers. All three devices are up for pre-order on Kickstarter right now, Pebble's tried-and-tested method of selling products. The Core is $69 with delivery in January next year, Pebble 2 is $99 in September this year, while the Pebble Time 2 is $169, delivery November 2016.

Saudi Arabia's rulers adapt message for social media age

- Tue, 24 May 2016 11:12:28 -0400

Saudi men explore social media on their mobile devices as they sit at a cafe in RiyadhBy Sylvia Westall and Angus McDowall DUBAI/RIYADH (Reuters) - The participation of tens of thousands of young Saudis in a social media debate over plans to reform the kingdom's oil-reliant economy last month marked a shift in how Riyadh's conservative rulers interact with their subjects. Saudi Arabia's dynastic leaders, who rule by fiat and strictly limit public dissent, have historically courted public opinion only via informal councils with tribal, religious and business leaders or citizens seeking to petition them. "It's a new focus for the government as it reaches out to a young Saudi population that is more likely to use social media," Saudi analyst and commentator Mohammed Alyahya said.


Japan an alluring target for Standard Bank ATM thieves

- Tue, 24 May 2016 08:36:11 -0400

People stand outside 7-Eleven convenience store outside headquarters of Seven & I Holdings in TokyoThe gang used counterfeit Standard Bank credit cards to withdraw 1.4 billion yen ($13 million) in 14,000 transactions from ATMs at 7-Eleven convenience†stores over three hours on a Sunday morning, according to a source familiar with the matter.


SWIFT to unveil new security plan after hackers' heists

- Tue, 24 May 2016 06:47:22 -0400

Photo illustration of the SWIFT logoBy Huw Jones and Tom Bergin LONDON (Reuters) - The SWIFT secure messaging service that underpins international banking said on Tuesday it plans to launch a new security program as it fights to rebuild its reputation in the wake of the Bangladesh Bank heist. The Society for Worldwide Interbank Financial Telecommunication (SWIFT)'s chief executive, Gottfried Leibbrandt, told a financial services conference in Brussels that SWIFT will launch a five-point plan later this week. In February, thieves hacked into the SWIFT system of the Bangladesh central bank, sending messages to the Federal Reserve Bank of New York allowing them to steal $81 million.


Clinton email probe in late stage, FBI may question her

- Tue, 24 May 2016 03:19:14 -0400

In this photo taken Dec. 19, 2015, Huma Abedin, center, aide to Hillary Clinton, stands on stage after a Democratic presidential primary debate in Manchester, N.H. FBI agents probing whether Hillary Clinton?s use of a private email server imperiled government secrets appear close to completing their work, a process experts say will likely culminate in a sit-down with the former secretary of state. (AP Photo/Jim Cole)WASHINGTON (AP) ? FBI agents probing whether Hillary Clinton's use of a private email server imperiled government secrets appear close to completing their work, a process experts say will probably culminate in a sit-down with the former secretary of state.


Soccer-Lewandowski has score to settle on biggest stage

- Mon, 23 May 2016 22:01:51 -0400

By Adrian Krajewski WARSAW, May 24 (Reuters) - Poland's Robert Lewandowski has chalked up so many big-game landmarks during his club career that the 27-year-old seems overdue a major tournament performance with his country. Few strikers in Europe can match his astonishing scoring record which will leave Germany particularly wary of facing the Bundesliga's leading scorer when the two countries meet at Euro 2016. For the last six years, since joining Borussia Dortmund and then Bayern Munich, goals have come readily.

Ocean?s 100: Thieves steal $12.7 million from ATMs in just three hours

- Mon, 23 May 2016 21:00:29 -0400

The Ocean's 11 movies are spectacular stories about†crazy†heists that take†lots of effort, careful planning and just a touch of skillful improvisation to pull off. But it turns out that†jobs like this exist in real life, too. And they?re equally impressive. A few days ago, 100 coordinated thieves stole no less than $12.7 million (1.4bn yen) from ATMs. The entire thing took just three hours, and no suspect was apprehended since then. DON?T MISS: Watch the Britney Spears BMA performance that the internet is going crazy over According to The Guardian , the operation was orchestrated by an organized crime ring. 100 people targeted 1,400 ATMs and used fake†credit cards that contained details stolen from an unidentified South African bank. Thieves stole precisely 100,000 yen per withdrawal. That means each card was used only for a single transaction worth around $914, but the grand total was†just under $13 million. The thieves started withdrawing cash on Sunday, May 15th, at†5:00AM, completing the entire process just before 8:00AM. They targeted cash machines in Tokyo and 16 other districts. Because it was a day when banks were closed and the cards used belonged to a bank in a different country, it took a while before the caper†was discovered. That was probably enough time for the members of the gang to have left in Japan without being in any danger of getting caught†by police. It?s unclear at this time who was behind the heist, what bank?s security was cracked, or who stole the credit card data to manufacture the fake credit cards.

Bangladesh Bank heist trail goes cold in Manila as probes falter

- Mon, 23 May 2016 19:07:07 -0400

A slot machine is pictured at Solaire Casino in Pasay City, Metro ManilaBy Raju Gopalakrishnan MANILA (Reuters) - More than three months have passed since $81 million was stolen in a brazen cyber-heist from Bangladesh's central bank and sent to Manila ? yet authorities in the Philippines appear no closer to nabbing those who laundered most of the money through a bank and casinos here. Nobody has been arrested, the National Bureau of Investigation (NBI) - the nation?s equivalent of the FBI - has not been allowed to get fully involved in the probe, and a Philippines Senate investigation petered out last week. Several official and private investigators said they had hoped to make headway by following the money trail in the Philippines, but they told Reuters it has gone cold.


NY lawmaker warns on U.S. financial security after SWIFT attacks

- Mon, 23 May 2016 19:01:29 -0400

Photo illustration of the SWIFT logoRecent hacks of international banks through the SWIFT messaging system raise serious questions about cyber-related risks to U.S. firms, Representative Carolyn Maloney wrote on Monday in a letter to the country's top banking regulators that asked about measures to strengthen systems' security. Maloney, a Democrat who represents part of Manhattan - home to many people employed in finance and banking - wrote to Federal Reserve Chair Janet Yellen, U.S. Comptroller Thomas Curry and Federal Deposit Insurance Corporation Chairman Martin Gruenberg that she remains "deeply concerned about U.S. banks' exposure to these new, sophisticated cyber attacks." The SWIFT network that allows banks to process billions of dollars in transfers each day is considered the backbone of international banking.


Whatever you do, don?t buy these smartphones

- Mon, 23 May 2016 18:00:18 -0400

There is nothing in consumer tech right now that's as hot as the smartphone market, even as it nears saturation in many regions, and the real beauty of it is that there are so many options. Every company out there wants a piece of the action and they're all looking for ways to differentiate their products, so there really is something for everyone. It's not easy to make a choice that can truly be considered wrong since different people have different needs and wants, but there is one line of smartphones that people probably shouldn't bother with unless they having a burning desire to dump hundreds of dollars into a dead platform. As noted by market research firm Gartner, Windows Phone's share of the global smartphone market actually fell below 1% this past quarter for the first time ever, market yet another stop on Microsoft's one-way trip†to smartphone irrelevance. As such, the worst mistake you can make when buying a new phone is to buy†a Windows Phone, unless you're fine with burning cash on a platform that's on its way out. Actually, there is one smartphone platform that somehow has an even lower share of the global market†?†BlackBerry OS ? but it's so low that it's not even worth discussing anymore. HUGE LEAK:† This is our first look at a real iPhone 7 According to Gartner's estimates , smartphone shipments grew 3.9% in the first quarter of 2016 compared the same quarter one year earlier. That seems like a small figure, but it's pretty impressive when you consider how far iPhone sales fell between January and March . Gartner says total "smartphone sales," which is a figure that actually includes end-user iPhone sales and estimated channel sales for other brands, reached†349 million units in the quarter. Samsung led the way with estimated shipments totaling 81 million units, which is indeed a massive number that was bolstered by the launch of the Galaxy S7 and Galaxy S7 edge. Chinese Android brands grew too fast in the quarter though, so Samsung's global market share actually fell to 23.2% in the first quarter from 24.1% in the same quarter last year. Meanwhile, Apple's global smartphone market share saw a much bigger drop, from 17.9% in Q1 2015 to 14.8% in Q1 2016. "In a slowing smartphone market where large vendors are experiencing growth saturation, emerging brands are disrupting existing brands' long-standing business models to increase their share," Gartner research director†Anshul Gupta. "With such changing smartphone market dynamics, Chinese brands are emerging as the new top global brands. Two Chinese brands ranked within the top five worldwide smartphone vendors in the first quarter of 2015, and represented 11 percent of the market. In the first quarter of 2016, there were three Chinese brands ? Huawei, Oppo and Xiaomi ? and they achieved 17 percent of the market."

Correction: Campaign 2016-Foreign Hacking story

- Mon, 23 May 2016 11:30:08 -0400

FILE - In this Feb. 9, 2016 file photo, Director of the National Intelligence James Clapper speaks on Capitol Hill in Washington. Clapper said Wednesday,May 18, 2016, that the U.S. has already seen evidence that cyber hackers, possibly working for foreign governments, are snooping on the presidential candidates, and government officials are working with them to tighten security as they expect the problem to grow as the campaigns intensify. (AP Photo/Alex Brandon, File)WASHINGTON (AP) ? In a story May 18 about possible foreign hacking into presidential campaigns, The Associated Press used the wrong configuration for the name of the chief executive officer of PKWARE. His name is V. Miller Newton, not V. Newton Miller.


Hackers probe defenses of Middle East banks : FireEye

- Mon, 23 May 2016 06:27:21 -0400

A magnifying glass is held in front of a computer screen in this picture illustration taken in BerlinHackers are probing the defenses of banks in the Middle East, targeting employees with infected emails which gather information about the banks' network and user accounts, FireEye researchers said.† FireEye, a U.S. cyber security company investigating the February attack on Bangladesh's central bank in which hackers stole $81 million, said there was no apparent connection with the heist or related attacks on banks in Ecuador and Vietnam. A FireEye spokesman said Qatar National Bank was not one of the "several banks" in the Middle East where researchers had found the malware.


To halt smartphone slide, Samsung rewrites playbook

- Sun, 22 May 2016 22:45:21 -0400

File photo of a model posing for photographs with Samsung Electronics' new smartphone Galaxy S7 during its launching ceremony in SeoulBy Se Young Lee SEOUL (Reuters) - From the way it chooses smartphone components to the models it brings to market, Samsung Electronics has undergone a painful process of breaking from its past to reverse a slide in its handset business. For example, the world's largest smartphone maker agonized over camera specs for its flagship Galaxy S7 until the last moment - ultimately defying industry convention by opting for fewer pixels in exchange for improved autofocus features and low-light performance, a move that contributed to early success. "We've now gotten to a point where we can secure a baseline profit even if the market stagnates, so long as we don't make a bad mistake," said Kim Gae-youn, vice president in charge of Samsung's smartphone product planning.


Apple CEO Cook, Indian Prime Minister Modi meet in New Delhi

- Sat, 21 May 2016 08:52:12 -0400

FILE - In this April 30, 2015 file photo, Apple CEO Tim Cook responds to a question during a news conference at IBM Watson headquarters, in New York. Apple CEO Tim Cook laid out his company?s plans for the vast Indian market in a meeting Saturday, May 21, 2016, with Prime Minister Narendra Modi, who in turn sought Apple's support for his "Digital India" initiative focusing on e-education, health and increasing farmers' incomes. (AP Photo/Richard Drew, File)NEW DELHI (AP) ? Apple CEO Tim Cook laid out his company's plans for the vast Indian market in a meeting Saturday with Prime Minister Narendra Modi, who in turn sought Apple's support for his "Digital India" initiative focusing on e-education, health and increasing farmers' incomes.


SWIFT tells banks to share information on hacks

- Fri, 20 May 2016 19:26:31 -0400

Photo illustration of the SWIFT logoBy Tom Bergin LONDON (Reuters) - International financial messaging service SWIFT told clients on Friday to share information on attacks on the system to help prevent hacking, after criminals used SWIFT messages to steal $81 million from the Bangladesh central bank. Earlier on Friday, Reuters reported that Wells Fargo, Ecuador's Banco del Austro (BDA) and Citibank, whose managing director, Franchise Risk & Strategy, Yawar Shah, is SWIFT's chairman, did not inform SWIFT of an attack last year in which more than $12 million was stolen from BDA. The network is considered the backbone of international finance but faith in its security has been rocked by the theft from Bank Bangladesh's account at the Federal Reserve Bank of New York.


Macedonian extradited to face U.S. charges on selling card data

- Fri, 20 May 2016 18:23:22 -0400

By Nate Raymond NEW YORK (Reuters) - A Macedonian citizen was extradited to the United States on Friday to face charges related to his operation of a website called Codeshop that authorities say was responsible for selling the data of thousands of credit cards from around the world. Djevair Ametovski, 29, was arrested in Slovenia in 2014 and was extradited from there to face charges including aggravated identity theft and wire fraud conspiracy contained in a criminal complaint filed in federal court in Brooklyn, New York. Ametovski, who authorities say was known online as "codeshop," "sindrom" and "sindromx," is expected to appear in court on Saturday, prosecutors said.

Banks are helping hackers pull off the perfect heist

- Fri, 20 May 2016 15:30:12 -0400

News broke in February that hackers were able to steal no less than $81 million from the Bank of Bangladesh in what MANY†described as a perfect heist. Well, maybe it wasn?t perfect, as a silly spelling mistake prevented the culprits†from walking away with nearly $1 billion . But the sophisticated attack worked almost flawlessly as the hackers were†able to take advantage of the backbone of financial transactions , after infiltrating the bank?s systems. It turns out that the Bangladesh attack wasn?t an isolated event . Hackers have attacked other banks as well in the past using the same methods. New reports show that some of these attacks could†have been prevented, but only if only banks were willing to share more details about these attacks†with the SWIFT organization.†Apparently, the financial institutions aren?t just worried that they?re going to lose the trust of customers, but also that they might generate additional inquiries into their security systems from local regulators. And nobody wants that. DON'T MISS:† Your iPhone could look so much better than it does right now The Bangladesh heist wasn?t even the first one, and it likely won?t be the last. Two others have been discovered in recent months; an unsuccessful attack in Vietnam using the same technique was thwarted in December last year, months before the Bangladesh bank was hit.†But in mid-January 2015, more than a year before hackers stole the $81 million from Bangladesh, the Banco del Austro (BDA) in Ecuador was the victim of a similar attack. Over a period of 10 days, criminals used SWIFT credentials swiped from a bank employee to modify†transaction details, including sums and recipients, for 12 transfers amounting to over $12 million. The security of SWIFT itself†was not breached, but hackers used advanced malware to steal credentials and cover their tracks. The crime remained a secret for a long time, Reuters and The Wall Street Journal report, but BDA decided to sue Wells Fargo, the bank that approved the transfers.†It turns out that SWIFT had no idea about the security breach, as neither BDA nor Wells Fargo shared details about it with the Belgian body that oversees wire transfers. SWIFT is urging partner banks to disclose similar†attacks so that better defenses can be set up. But what?s clear so far is that hackers have found ways to take advantage of this secure money transfer system that banks take for granted. And financial institutions are helping them by not disclosing hacks to SWIFT or to†other banks. If a wire comes through via the SWIFT messaging system, banks act according to the information received and honor the transfer. That?s what Wells Fargo is arguing in its defense, which seeks†to have the case dismissed. BDA, meanwhile, says that Wells Fargo should have seen the flags and stopped the transactions.

Cyber thieves exploit banks' faith in SWIFT transfer network

- Fri, 20 May 2016 15:11:38 -0400

Photo illustration of the SWIFT logoBy Tom Bergin and Nathan Layne LONDON/CHICAGO (Reuters) - Shortly after 7 p.m. on January 12, 2015, a message from a secure computer terminal at Banco del Austro (BDA) in Ecuador instructed San Francisco-based Wells Fargo to transfer money to bank accounts in Hong Kong. Over 10 days, Wells approved a total of at least 12 transfers of BDA funds requested over the secure SWIFT system. The SWIFT network - which allows banks to process billions of dollars in transfers each day - is considered the backbone of international banking.


Factbox: How do bank payments work in the euro zone?

- Fri, 20 May 2016 13:53:52 -0400

Cyber attacks on banks from Bangladesh to Ecuador are raising questions about the security of the global payment system and one of its key components, the SWIFT messaging network. Following is a basic explanation of how bank payments work in the euro zone: WHAT HAPPENS WHEN I MAKE A PAYMENT? Most bank payments in the euro zone are settled via the Target 2 payment system, owned and managed by the European Central bank and the national central banks (NCBs) of euro zone countries.

Hackers in Ukraine and Frog Juice in the Andes: The Week in Global-Affairs Writing

- Fri, 20 May 2016 12:31:11 -0400

The Ukrainian Hacker Who Became the FBI?s Best Weapon?and Worst Nightmare Kevin Poulsen | WIRED ?One Thursday in January 2001, Maksym Igor Popov, a 20-year-old Ukrainian man, walked nervously through the doors of the United States embassy in London. While Popov could have been mistaken for an exchange student applying for a visa, in truth he was a hacker, part of an Eastern European gang that had been raiding U.S. companies and carrying out extortion and fraud. A wave of such attacks was portending a new kind of cold war, between the U.S. and organized criminals in the former Soviet bloc, and Popov, baby-faced and pudgy, with glasses and a crew cut, was about to become the conflict?s first defector.?

Change your LinkedIn password right now

- Fri, 20 May 2016 11:04:44 -0400

Remember when LinkedIn was hacked a few years ago and the company confirmed that login credentials and other data belonging to 6.5 million accounts were stolen? Well, it turns out that figure might have been a little low. OK it was very, very low ? it looks like hackers managed to steal data from not 6.5 million, and not even 65 million, but just over 165 million accounts. In other words, it's time to change your LinkedIn password immediately. DON'T MISS:† How I added microSD support to my iPhone 6s LeakedSoure updated an earlier report on Thursday night with the news that username and password data from a grand total of†167,370,910 accounts that have now been obtained by the site. Those credentials are actively being sold on the black market, which means that impacted users are†at risk. Wondering how to figure out if you're one of the LinkedIn users impacted by this massive breach? Well, stop trying to figure it out and just change your password immediately. Seriously, change it right now. It's always a good idea to change your passwords regularly and to never, ever use the same password for two different accounts. And no, you shouldn't paste all those different usernames and passwords into a plain text file so you can remember them. Instead, use a secure password manager that can sync your passwords across all devices and keep them safe but easily accessible. We highly recommend 1password . Speaking of bad†password practices, LeakedSource has published a table showing the most commonly used passwords on LinkedIn and it's just as bad as you think it might be. The most commonly used password is "123456" ? cringe ? and it was found on†753,305 accounts. The second most common password was "linkedin" ? cringe again ? which was used on†172,523 different accounts, and then "password" ? seriously, we give up ? on†144,458 accounts. Here's a top-10 list for you: Hopefully your password doesn't appear on that list but either way,†you would be wise to change your LinkedIn password immediately.

Samsung to partner with Alibaba affiliate on mobile payments in China

- Fri, 20 May 2016 03:05:52 -0400

Sales assistant sits behind and under Alipay logos at a train station in ShanghaiSamsung Electronics said it had struck a deal with an Alibaba Group Holding affiliate for owners of its phones to be able to more easily make payments with Alipay accounts - a move it hopes will boost sales in the world's biggest smartphone market. Users of Samsung Pay will also have the option of paying with their Alipay accounts without having separately access the Alipay application. Alipay, which is operated by Alibaba affiliate Ant Financial Services Group [ANTFIN.UL], has 450 million active registered users.


Old ATM malware is back and infecting machines everywhere

- Thu, 19 May 2016 21:00:33 -0400

An old piece of ATM malware is back, and reportedly more dangerous and harder to detect than ever. According to security researchers from Kaspersky Labs , an updated piece of malware dubbed Skimer has infected numerous Windows-based ATMs across all corners of the globe. DON'T MISS:† Apple supplier mistakenly leaks details of next year?s major iPhone redesign When installed, the updated version of Skimer checks to see if the file system is FAT32 or NFTS. If it's the former, it "drops the file netmgr.dll in the folder C:\Windows\System32" and if it's the latter, "the same file will be placed in the NTFS data stream corresponding to the XFS serviceīs executable file." The end result is that the malware is harder for security officials to detect and make sense of. The Stack adds : Unlike other skimming malware programs, like Tyupkin, which becomes active in a specific time frame and is awakened by a ?magic code?, Skimer may lie dormant for months until it is activated with the physical use of a ?magic card.? The magic card gives access control to the malware, which then offers a list of options that are accessed by inputting a choice on the pin pad. Once an ATM is compromised and the Skimer malware resuscitated from its dormant state, cyber criminals can gather pertinent financial data from inserted cards and can even direct the machine to dispense money. And in an additional step to evade detection, the malware can even be instructed to self destruct. A view of the Skimer malware in action, courtesy of Kaspersky, can be viewed below. https://www.youtube.com/watch?v=hOcFy02c7x0

Google Daydream VR vision: With opportunity comes challenges

- Thu, 19 May 2016 15:30:01 -0400

Clay Bavor, Google vice president of virtual reality, talks about Daydream and virtual reality during the keynote address of the Google I/O conference, Wednesday, May 18, 2016, in Mountain View, Calif. Google unveiled its vision for phones, cars, virtual reality and more during its annual conference for software developers. (AP Photo/Eric Risberg)NEW YORK (AP) ? Upcoming virtual-reality headsets based on Google's new Daydream VR system could give more people a taste of VR and make better games and applications affordable.


Top Democratic senator probes SWIFT, NY Fed about Bangladesh heist

- Thu, 19 May 2016 13:59:45 -0400

The corner stone of The New York Federal Reserve Bank is seen in New York's financial districtThe Senate Homeland Security Committee's top Democrat sought information Thursday from global financial network SWIFT and the Federal Reserve Bank of New York on steps being taken to bolster cyber security in the wake of the theft of $81 million from the central bank of Bangladesh. Senator Tom Carper of Delaware requested that both answer questions and brief his staff by June 17 on how they were handling issues following the February heist, during which hackers wired money out of an account at the New York Fed held by Bank Bangladesh, as well as how they were safeguarding against other potential cyber threats. "These cyber attacks raise important questions about the security of the SWIFT system and the ability of its members to prevent future attacks," Carper wrote in his letters.


China's high-tech future emerges in factory town Shenzhen

- Thu, 19 May 2016 11:09:41 -0400

In this April 20, 2016 photo, Jasen Wang, founder of Shenzhen educational robot company Makeblock, poses with some of his company's products in Shenzhen, China. Once a collection of fishing enclaves next door to Hong Kong, Shenzhen has become the epicenter of China?s manufacturing-driven miracle is staking its future growth on finance, technology and culture. (AP Photo/Kelvin Chan)SHENZHEN, China (AP) ? Forget Beijing and Shanghai. China's economic future is emerging in Shenzhen.


Singapore banks' group invites SWIFT to discuss cyber attacks

- Thu, 19 May 2016 06:48:07 -0400

File photo of the logo of the Monetary Authority of Singapore at its building in SingaporeThe Association of Banks in Singapore (ABS) has invited SWIFT for a meeting in June to discuss the latest cyber attacks on banks in Bangladesh and Vietnam which involved SWIFT's financial messaging service. The move comes as members of ABS, which include Singaporean and foreign banks, have individually engaged the Society for Worldwide Interbank Financial Telecommunication (SWIFT) since news of the attacks emerged, it said. "ABS, for its part, has invited SWIFT to a meeting in early June to share its experience in managing the incidents in Bangladesh and Vietnam," it said an email to Reuters.