IANS Blog RSS Feed


Privacy, Security Concerns Rise as States Mull Encryption Backdoor Requirements

- Wed, 27 Jan 2016 00:00:00 GMT

National Data Privacy Day (January 28th) certainly comes at an interesting time this year, as legislators in two of the most technology-centric U.S. states recently introduced similar bills that would force smartphone manufacturers to include encryption backdoors in their devices.

Fledgling Cyber-Insurance Market Tested by Early Denials, Lawsuits

- Wed, 20 Jan 2016 00:00:00 GMT

Cybersecurity insurance policies may be relatively new, but they have one important thing in common with established, legacy business coverage: They live and die in the fine print.

Hacker-Caused Ukrainian Power Outage Marks First Known Attack With Immediate, Direct Public Impact

- Tue, 05 Jan 2016 00:00:00 GMT

Security researchers have confirmed that a recently updated version of the highly destructive BlackEnergy malware package infected the systems of at least three power authorities in Ukraine, causing a massive outage that left thousands of homes in the Ivano-Frankivsk region of the country without electricity.†

Top 10 IANS Insights from a Tumultuous 2015

- Mon, 28 Dec 2015 00:00:00 GMT

Another year is in the books and what a year it was for infosec pros. From the Ashley Madison hack to the OPM breach, to Jeep commandeering and mysterious backdoors in popular networking gear, every week brought a new security twist that forced us all to keep our heads on swivels.

Herold: Misguided CISA Heightens Security, Privacy Concerns

- Mon, 21 Dec 2015 00:00:00 GMT

The controversial Cybersecurity Information Sharing Act (CISA) is now the law of the land, slipped into an eleventh-hour†spending bill designed to keep the federal government running through 2016.

Patch Now: Rogue Code Leaves Gaping Hole in Juniper Gear

- Fri, 18 Dec 2015 00:00:00 GMT

Juniper Networks says unauthorized code could allow attackers to gain administrative access to its NetScreen appliances and decrypt VPN connections without leaving any trace of their actions. Users are urged to apply fixes immediately.

Poulin: Time to Realistically Acknowledge Vehicle Vulnerabilities

- Wed, 16 Dec 2015 00:00:00 GMT

The images and breathless banter were difficult to ignore: celebrity security researchers gaining remote command of an automobile, disrupting on-board systems before forcing the vehicle and its helpless driver into a ditch.

NIST to Infosec Pros: How Is Our Framework Working?

- Mon, 14 Dec 2015 00:00:00 GMT

The National Institute of Standards and Technology is asking infosec practitioners in the public and private sectors to comment on the efficacy of its cybersecurity framework as it prepares to update the popular, two-year-old document.

As Ransomware Attacks Evolve, Security Teams Must Prepare For New ?Drive-By? Tactics

- Thu, 10 Dec 2015 00:00:00 GMT

Another week, another evolution of the popular ransomware attacks. When we last wrote about it, researchers had discovered a new iteration ? ?Linux.Encoder.1? ? that enabled attackers to inject malware into Linux-powered websites and encrypt all files in the home and backup directories. Now, it appears the popular exploit kit Angler is being used to spread the latest version of CryptoWall and other ransomware on websites as part of ?drive-by? campaigns that begin with the deployment of password-stealing malware.†

Double Check Your Web Defenses in Wake of DDoS Attacks on Greek Banks

- Thu, 03 Dec 2015 00:00:00 GMT

The hacking group known as the Armada Collective expanded its campaign of DDoS extortion attacks on high-value targets last week, briefly interrupting electronic transactions and taking down the websites of three Greek banks.

Threats RSS Feed - Symantec Corp.



- Wed, 3 Feb 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.


- Wed, 3 Feb 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.


- Wed, 3 Feb 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.


- Tue, 2 Feb 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.


- Sun, 31 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.


- Sat, 30 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.


- Thu, 28 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.


- Thu, 28 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.


- Tue, 26 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.


- Tue, 26 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.


- Tue, 26 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.


- Tue, 26 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.


- Tue, 26 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.


- Tue, 26 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.


- Sat, 23 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.


- Sat, 23 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.


- Thu, 21 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.


- Thu, 21 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.


- Fri, 22 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.


- Tue, 19 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.


- Tue, 19 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.


- Tue, 19 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.


- Tue, 19 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.


- Tue, 19 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.


- Tue, 19 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.


- Tue, 19 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.


- Tue, 19 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.


- Mon, 18 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.


- Mon, 18 Jan 2016 00:00:00 +0000

Risk Level: Very Low.


- Mon, 18 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.


- Fri, 15 Jan 2016 00:00:00 +0000

Risk Level: Low. Type: Worm.


- Thu, 14 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Virus, Worm.


- Fri, 15 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.


- Tue, 12 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.


- Wed, 13 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.


- Tue, 12 Jan 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News


Exclusive: Top cybercrime ring disrupted as authorities raid Moscow offices - sources

- Sat, 06 Feb 2016 01:31:17 -0500

View of building which houses an office of 25 Floor Film Company in MoscowBy Joseph Menn WASHINGTON (Reuters) - Russian authorities in November raided offices associated with a Moscow film distribution and production company as part of a crackdown on one of the world?s most notorious financial hacking operations, according to three sources with knowledge of the matter. Cybersecurity experts said a password-stealing software program known as Dyre ? believed to be responsible for at least tens of millions of dollars in losses at financial institutions including Bank of America Corp and JPMorgan Chase & Co ? has not been deployed since the time of the raid. Experts familiar with the situation said the case represents Russia?s biggest effort to date to crack down on cyber-crime.

Unhackable brain scans may some day replace passwords

- Fri, 05 Feb 2016 20:55:57 -0500

Security breaches affecting millions of users have come to light in recent years, yet we?re no better at protecting our personal data, or at picking good passwords , than we were before. But some companies are already looking at new ways to secure†customer data that go beyond passwords and PINs. Fingerprint sensors are found on more and more smartphones in recent years, and retina scanners are coming too. But in the future, we may have an even more advanced way of logging into online services and protecting our data: Brain scans. UP NEXT:† 20 paid iPhone and iPad apps on sale for free right

Lawyer: New York-born man was mistreated after terror arrest

- Fri, 05 Feb 2016 19:16:34 -0500

NEW YORK (AP) ? The lawyer for a New York City-born man serving a 15-year prison sentence for supporting al-Qaida urged a judge Friday to find the U.S. government liable for failing to quickly diagnose a medical condition after his 2010 arrest, but a federal prosecutor said he was treated properly.

In Obama's final year, Senate is slow to act on his nominees

- Fri, 05 Feb 2016 17:21:32 -0500

This April 17, 2014, photo, provided by the U.S. Army, shows then-Maj. Gen. John W. Nicholson, Jr. speaking to his senior leaders at Fort Bragg, N.C. If you wear combat fatigues to work, then your nomination is almost sure to sail through the Senate. If not, you?re likely in for a long wait. In just a week, senators confirmed Nicholson to be the next top American commander in Afghanistan. (Sgt. Mikki L. Sprenkle/U.S. Army via AP)WASHINGTON (AP) ? If you wear combat fatigues to work, then your nomination is almost sure to sail through the Senate. If not, you're likely in for a long wait.

How to play the secret chess game hidden in Facebook Messenger

- Fri, 05 Feb 2016 16:50:54 -0500

Hundreds of millions of people spend†hours of their†lives on Facebook every week, but there are some secrets that only a few of them have discovered. For example, last December, a member of the Chess subreddit community found a secret, playable chess game hidden in Facebook Messenger that anyone can play. READ MORE:† Follow these 5 steps to keep yourself safe from hackers In order to start a game, just open a Messenger conversation†with a friend and type "@fbchess play" to begin. A chess board will suddenly appear in the chat box and the player with the white pieces†moves first. But despite the fact that a visual representation of the board appears on screen, you'll have to

Follow these 5 steps to keep yourself safe from hackers

- Fri, 05 Feb 2016 13:22:39 -0500

No matter how secure†you think your devices are, someone could access your data if they put their mind to it. It's just the reality of the Information†Age, but†you should still do everything in your power to make yourself less of a target for hackers . DON'T MISS:† 20 paid iPhone and iPad apps on sale for free right now In an extensive piece for The Wall Street Journal this week , Geoffrey A. Fowler laid out a five-step checklist†that shouldn't take more than an hour to complete, and might be the difference between having your data stolen or not. Here are just a few of the most important steps you should take: First, update everything. Start with the operating

Rice aides, Powell got classified info on personal email accounts

- Thu, 04 Feb 2016 18:17:07 -0500

Former U.S. Secretary of State Powell salutes the audience as he takes the stage at the Washington Ideas Forum in WashingtonBy Mark Hosenball WASHINGTON (Reuters) - Former U.S. Secretary of State Colin Powell and aides to his successor, Condoleezza Rice, both received classified information a handful of times via personal email accounts, the top Democrat on a congressional oversight panel said on Thursday. The findings come after nearly a year of controversy over Democratic presidential candidate Hillary Clinton's decision to set up a private email server for her work as secretary of state. Representative Elijah Cummings said the disclosures about Powell's and Rice's aides' emails were made by the State Department's inspector general, who is reviewing the email practices of the last five secretaries of state.

Senators grill personnel office nominee over data hack

- Thu, 04 Feb 2016 14:48:35 -0500

Beth Cobert, President Barack Obama's nominee to head the Office of Personnel Management (OPM), testifies on Capitol Hill in Washington, Thursday, Feb. 4, 2016, before the Senate Homeland Security and Government Affairs Committee hearing on her nomination. Cobert promised to strengthen the agency?s cybersecurity and information technology systems after what?s believed to be the largest data breach in U.S. history. (AP Photo/Manuel Balce Ceneta)WASHINGTON (AP) ? President Barack Obama's nominee to head the Office of Personnel Management on Thursday promised to strengthen the agency's cybersecurity and information technology systems after what's believed to be the largest data breach in U.S. history.

Hackers attack 20 million accounts on Alibaba's Taobao shopping site

- Thu, 04 Feb 2016 05:21:44 -0500

A logo of Alibaba Group is pictured at its headquarters in HangzhouHackers in China attempted to access over 20 million active accounts on Alibaba Group Holding Ltd's Taobao e-commerce website using Alibaba's own cloud computing service, according to a state media report posted on the Internet regulator's website. Analysts said the report from The Paper led to the price of Alibaba's U.S.-listed shares falling as much as 3.7 percent in late Wednesday trade.

Unpatched eBay vulnerability leaves shoppers at risk of downloading malware

- Wed, 03 Feb 2016 21:45:00 -0500

Be extra careful the next time you visit a suspicious-looking eBay store page. According to Help Net Security , researchers from†the Check Point security firm have discovered a vulnerability in the eBay platform that allows criminals to distribute malware by bypassing the site's code validation process and control the code themselves. MUST SEE:† 15 paid iPhone apps on sale for free right now Here's how it works: an attacker sets up a store page with listings for products. On the page, a pop-up message will appear telling customers that they can receive a limited-time discount if they download the eBay mobile app. By clicking the

Apple ordered to pay $625 million in patent dispute with VirnetX

- Wed, 03 Feb 2016 19:32:34 -0500

An Apple logo hangs above the entrance to the Apple store on 5th Avenue in the Manhattan borough of New York CityApple Inc must pay VirnetX Holding Corp more than $625 million for using the patent licensing company's Internet security technology without permission in its FaceTime and iMessage features, a federal jury in Texas said on Wednesday. The jury said Apple's infringement was willful. Apple was down 45 cents to $95.90 in after-hours trading.

Guilty plea in attempted cyber-attack on US govt. computers

- Tue, 02 Feb 2016 18:21:26 -0500

WASHINGTON (AP) ? A former Nuclear Regulatory Commission scientist pleaded guilty Tuesday to a federal computer crime, admitting that he attempted to launch a cyber-attack on government computers by sending employees emails that he thought contained a virus.

BT suffers temporary network problems

- Tue, 02 Feb 2016 12:03:58 -0500

A BT logo is seen on a building in LondonBritain's BT Group said large numbers of its customers had lost connection to the Internet on Tuesday, but most were back online in a matter of hours and there were no indications that the failure was due to a malicious attack. "We've been working hard to fix the issue and are glad to report that nearly every customer affected is now reconnected, approximately two hours after the problem started," it said.

Something new to worry about: Connected toy security

- Tue, 02 Feb 2016 10:58:03 -0500

This photo provided by Mattel shows the Smart Toy Bear. Your smartphone or tablet is most likely pretty secure, and unlikely to be hacked, but the same can?t be said for any Internet connected toys you may have purchased for your kids. (Mattel via AP)NEW YORK (AP) ? Your smartphone or tablet is most likely pretty secure ? not perfect, maybe, but generally unlikely to be hacked or to store, say, your email where other people could read it.

OPPO, Vivo snap at Apple's heels in China mobile market

- Mon, 01 Feb 2016 16:32:57 -0500

File photo of a commuter using his mobile phone passing an advertisement of Chinese smartphone maker Oppo at a train station in SingaporeBy Miyoung Kim and Yimou Lee SINGAPORE/HONG KONG (Reuters) - Beyond China few may have heard of OPPO or Vivo, but these local handset vendors are rising up the rankings in the world's largest smartphone market, using local marketing savvy and strong retail networks in lower-tier cities. Industry experts say these cities - there are more than 600 of them and some are bigger than many European capitals - are the next smartphone battlefield as China's major cities are saturated. International brands such as Apple and Samsung Electronics have mostly not yet reached this part of the market - which accounts for more than 56 percent of China's overall consumption, according to Beijing All China Marketing Research.

Google will reportedly exert ?Apple-like? control over future Nexus phones

- Mon, 01 Feb 2016 15:30:15 -0500

Given how far Microsoft has moved in Apple's direction by designing its own hardware with the Surface Pro and Surface Book , we shouldn't be too surprised to learn that Google is considering similar moves with its Nexus line of smartphones.† The Information is reporting that "Google CEO Sundar Pichai and his lieutenants have signaled to colleagues and outsiders that the company wants to take greater control over its program for making 'Nexus' smartphones" and that "the change would effectively reduce the level of involvement of hardware partners that make the phones with Google, a group which has included Samsung, Motorola, LG and Huawei." MUST READ:† How the Iowa caucus works, as explained with Legos The idea here

The 2,001 things we like most in the world, according to Facebook

- Mon, 01 Feb 2016 12:42:33 -0500

Facebook is the most popular social network in the world. With over 1.4 billion users, Facebook has something for everybody and most users come back for more and more multiple times per day. Sure, the company mishandled user privacy in the past, but it?s getting better all the time. And Facebook has plenty of other interesting services under its umbrella, including the Messenger and WhatsApp chat apps, the Instagram photo-based social network, and even the Oculus Rift VR initiative. To pay for all that, Facebook serves ads from third-parties to all of its users, and that?s why it needs to collect plenty of data about users†like and dislike. This way, the service can target ads more†effectively. So, what do

It takes 2 seconds to give your Android phone a speed boost and improve battery life by 20%

- Mon, 01 Feb 2016 12:15:09 -0500

Given how much time†smartphone users on the whole spend using Facebook , it's not all that†surprising that the app tends†to consume its fair share of battery. The problem, however, is that Facebook's mobile apps have a bad tendency of†tearing through battery life much quicker than what one might reasonably construe as "fair." DON?T MISS:† This site ranks VPN speeds so you know which service will stream Netflix the fastest Speaking to this point, Reddit user†pbrandes_eth last week†decided to test the notion that running and even having Facebook installed on an Android device can have an adverse impact on performance. Using his

Cuba says it will launch broadband home internet project

- Sun, 31 Jan 2016 23:32:03 -0500

HAVANA (AP) ? Cuba announced Sunday night that it is launching broadband Internet service in two Havana neighborhoods as a pilot project aimed at bringing home access to one of the world's least connected nations.

A look at federal cases on handling classified information

- Sat, 30 Jan 2016 18:39:16 -0500

FILE - In this March 5, 2015, file photo, cables are connected to a server capable of handling an email server at the Washington bureau of The Associated Press. News that Hillary Clinton?s home email server contained top-secret messages brings renewed attention to the security of her mail system and to the laws and regulations that control classified information. The new disclosure, and the question of whether it exposes her to more serious legal problems, was certain to escalate political heat on the Democratic presidential candidate just days before the first ballots are cast in Iowa in the 2016 nominating process. (AP Photo/Jon Elswick, File)WASHINGTON (AP) ? News that Hillary Clinton's home email server contained top-secret messages brings renewed attention to the security of her mail system and to the laws and regulations that control classified information.

U.S. to withhold some Clinton emails with top secret information

- Fri, 29 Jan 2016 17:25:03 -0500

U.S. Democratic presidential candidate Hillary Clinton speaks during a campaign stop at Grand View University in Des MoinesBy Arshad Mohammed and Jonathan Allen WASHINGTON (Reuters) - Seven private email chains of former U.S. Secretary of State Hillary Clinton will be withheld from the public in their entirety because they contain top secret information, the U.S. State Department said on Friday. The material, amounting to 37 printed pages, contained information U.S. intelligence agencies said was classified as top secret, State Department spokesman John Kirby said. "These documents were not marked classified at the time that they were sent," Kirby said, adding that the department would investigate whether the information in them was classified at the time.

Judge rejects challenge in FBI child porn website probe

- Fri, 29 Jan 2016 14:03:02 -0500

U.S. District Judge Robert Bryan in Tacoma, Washington, on Thursday rejected arguments by Jay Michaud, one of 137 people facing U.S. charges in the probe, that a search warrant that enabled the FBI to conduct the sting was unconstitutional. The Federal Bureau of Investigation had in February 2015 seized the server hosting Playpen, a child porn website that operated on the Tor network, which is designed to facilitate anonymous online communication and protect user privacy. In order to identify its 214,898 members, authorities sought a search warrant from a Virginia judge allowing them to deploy a "network investigative technique" that would cause a computer to send them data any time a user logged on while the FBI operated the website for two weeks.

Blackshades malware co-creator gets five years of probation

- Fri, 29 Jan 2016 13:20:57 -0500

By Nate Raymond and Brendan Pierson NEW YORK (Reuters) - An Arizona man who co-created software distributed by an organization called Blackshades that was used to hack into a million computers worldwide was sentenced on Friday to five years of probation. Michael Hogue, who online was known by the moniker "xVisceral," was sentenced by U.S. District Judge Kevin Castel in Manhattan after pleading guilty in 2013 to distributing malware and conspiring to commit computer hacking. Hogue, 25, first came to the attention of the U.S. Federal Bureau of Investigation in 2010, when, in an effort to advertise the malware, he contacted an undercover agent running a website established as part of a sting operation targeting the illegal trade in credit card numbers, court papers said.

HSBC says internet banking services down after cyber attack

- Fri, 29 Jan 2016 12:02:09 -0500

HSBC logo is seen above a branch of the bank in the Sao Paulo financial centre, BrazilBy Sinead Cruise LONDON (Reuters) - HSBC is working with law enforcement to catch those behind a cyber attack that forced its personal banking websites in the UK to shutdown, its second major service outage this month, the bank said on Friday. Europe's largest lender said it had "successfully defended" its systems against a distributed denial of service (DDoS) attack but it was experiencing fresh threats, impeding full restoration of its services. "HSBC's internet and mobile services have partially recovered, and we continue to work to restore a full service," John Hackett, UK Chief Operating Officer, said in a statement.

6 ways Android outshines my iPhone 6s

- Fri, 29 Jan 2016 10:29:35 -0500

On Thursday, I published a piece titled 8 reasons I still can?t leave the iPhone and switch to Android , in which I discussed what I believe to be the main benefits Apple's iPhone and iOS platform have over Android. I've been shocked at the feedback I've received since then. The Android vs. iOS argument typically draws all sorts of irrational and illogical "fanboys" out of the woodwork, but the overwhelming majority of emails I received after running that article were well composed and astute. I responded to as many as I could and I ended up having a few worthwhile conversations as a

Chinese military force to take lead on cyber, space defense

- Fri, 29 Jan 2016 05:48:27 -0500

A map of China is seen through a magnifying glass on a computer screen showing binary digits in SingaporeBy Megha Rajagopalan BEIJING (Reuters) - A new Chinese military outfit will lead the country's push to enhance its cyber warfare, space security and online espionage capabilities, Chinese military observers and analysts said. Senior People's Liberation Army (PLA) officials and other observers have begun to give details of the country's new Strategic Support Force (SSF), whose establishment was announced at the end of last year as part of a major overhaul of the armed forces. "It's going to make them far more effective," said John Costello, a Washington-based analyst who focuses on China's cyber capabilities.

China charges Canadian with spying, stealing state secrets: Xinhua

- Fri, 29 Jan 2016 05:02:02 -0500

A boy looks up as he walks past the closed coffee shop owned by Canadian couple Kevin Garratt and Julia Dawn Garratt in Dandong, Liaoning provinceCanada said on Thursday it was monitoring developments closely after China indicted a Canadian citizen detained since 2014 on charges of spying and stealing state secrets. Kevin Garratt was detained in August 2014 near China's sensitive border with North Korea along with his wife, who was also detained for months before being released last year. Xinhua state news agency said Garratt was indicted in Dandong, a city in China's northeast where the Garratts had operated a cafe since 2008.

Congress to probe Juniper 'back door' exposure, possible U.S. involvement

- Thu, 28 Jan 2016 22:25:24 -0500

By Joseph Menn SAN FRANCISCO (Reuters) - A U.S. congressional probe into the impact of a hack of Juniper Networks Inc software will examine the possibility that it was initially altered at the behest of the National Security Agency, a lawmaker said in an interview on Thursday. The House Committee on Oversight and Government Reform this month sent letters asking some two dozen agencies to provide documents showing whether they used Juniper devices running ScreenOS software. Rep. Will Hurd, a Texas Republican who heads the committee's technology subcommittee and formerly worked for the Central Intelligence Agency, said his initial goal in pursuing the probe was to determine whether government agencies, many of which use Juniper gear, had been compromised by the hackers.

Computer expert gets no jail time in extensive spamming case

- Thu, 28 Jan 2016 18:24:31 -0500

A computer expert was sentenced Thursday to two years' probation for helping send millions of spam messages that allowed computer marketers to illegally harvest email addresses and phone numbers. Naveed ...

U.S. utilities worry about cyber cover after Ukraine grid attack

- Thu, 28 Jan 2016 11:36:19 -0500

An illustration picture shows projection of binary code on man holding aptop computer in WarsawU.S. utilities are looking hard at their cyber vulnerabilities and whether they can get insurance to cover what could be a multi-billion dollar loss after hackers cut electric power to more than 80,000 Ukrainians last month. The Dec. 23 incident in Ukraine was the first cyber attack to cause a power outage, and is one of just a handful of incidents in which computer hacking has caused physical effects on infrastructure rather than the loss or theft of electronic data. A similar attack in the United States could cripple utilities and leave millions of people in the dark, costing the economy more than $200 billion, an insurance study estimated last year.

8 reasons I still can?t leave the iPhone and switch to Android

- Thu, 28 Jan 2016 09:41:10 -0500

While Apple's iPhones have been my main handsets since shortly after the first model was introduced in 2007, I used to carry an Android phone with me at all times until recently. Carrying two phones seems odd to most people, but there were so many important Android features that weren't mirrored in iOS for a period of time, and I also enjoyed the variety. Then last year, I ran out of reasons to keep using Android . DON'T MISS:† Apple and the Terrible, Horrible, No Good, Very Bad, Record-Breaking Quarter Yes, of course there are still plenty of Android features that are nowhere to

Exclusive: Hackers may have wider access to Ukrainian industrial facilities

- Wed, 27 Jan 2016 08:53:57 -0500

File photo of general view showing facilities of mobile gas turbine generator which was turned on due to recent power outages after pylons carrying electricity were blown up in Crimean settlement of StroganovkaBy Pavel Polityuk KIEV (Reuters) - Hackers were able to attack four sections of Ukraine's power grid with malware late last year because of basic security lapses and they could take down other industrial facilities at any time, a consultant to government investigators said. Three power cuts reported in separate areas of western and central Ukraine in late December were the first known electrical outages caused by cyber attacks, causing consternation among businesses and officials around the world. The consultant, Oleh Sych, told Reuters a fourth Ukrainian energy company had been affected by a lesser attack in October, but declined to name it.

China smartphone glory days are over as Apple, Xiaomi face tough times

- Wed, 27 Jan 2016 06:34:48 -0500

Xiaomi's smartphone Mi 4i are displayed in TaipeiBy Yimou Lee and Paul Carsten HONG KONG/BEIJING (Reuters) - China's smartphone boom may be over, as even Apple Inc grapples with a slowing economy and investor darling Xiaomi Inc [XTC.UL] struggles to stand out amid intense competition in low-margin handsets. On Tuesday, Apple reported the slowest-ever increase in iPhone shipments as the Chinese market weakened. Xiaomi, China's most valuable start-up with a $45 billion pricetag, is under threat, after it missed targets for $1 billion in Internet service revenue and also handsets sales in 2015.

The quick and easy way to see whether your Netflix account has been hacked

- Tue, 26 Jan 2016 19:45:22 -0500

You?re probably sharing your Netflix account with your loved ones, exes, and their best friends' dads. There?s really nothing wrong with that and Netflix doesn?t care. But what Netflix does care about is where its content is seen . That?s why you absolutely must check who?s using your account and where they?re located.†You should also remember that Netflix credentials are one of the cheapest commodities on the dark web, with accounts selling for less than $1 a pop. DON?T MISS: Apple Maps might be getting one of the best Google Maps features We have already told you how to fix your account in case you suspect hackers have sold it online and that process remains unchanged. Simply log

China's fickle fake stores cool on Apple: for now

- Tue, 26 Jan 2016 14:01:21 -0500

File photo of a man taking pictures as the Apple iPhone 6s and 6s Plus went on sale at an Apple Store in BeijingAt 22, Cheung is already a veteran of China's imitation game. A month ago, she was peddling the latest iPhones and accessories in one of several copycat Apple Inc stores along a street of gadget outlets in the southern city of Shenzhen. The number of fake Apple stores along the busy street has dwindled by about a third from more than 30 as recently as September when Reuters reporters last visited the area, (http://reut.rs/1S8zCkP) some replaced by unauthorized stores selling locally-branded phones from Huawei, Xiaomi [XTC.UL], Meizu and Oppo.

France to ratchet up legal capacity to access overseas data

- Tue, 26 Jan 2016 09:02:37 -0500

PARIS (AP) ? France's government wants to increase the legal tools available to demand data from overseas tech companies during cybercrime investigations.

Big Pharma's bet on Big Data creates opportunities and risks

- Tue, 26 Jan 2016 08:12:43 -0500

The logo of Swiss pharmaceutical company Novartis is seen on its headquarters building in BaselBy John Miller ZURICH (Reuters) - Novartis wants every puff of its emphysema drug Onbrez to go into the cloud. The Swiss drugmaker has teamed up with U.S. technology firm Qualcomm to develop an internet-connected inhaler that can send information about how often it is used to remote computer servers known as the cloud. This kind of new medical technology is designed to allow patients to keep track of their drug usage on their smartphones or tablets and for their doctors to instantly access the data over the web to monitor their condition.

LG Elec quarterly profit jumps on robust sales for TVs, appliances

- Tue, 26 Jan 2016 02:12:47 -0500

LG Electronics' company logo is seen at a shop in central SeoulBy Se Young Lee SEOUL (Reuters) - South Korea's LG Electronics Inc booked a 27 percent jump in fourth-quarter operating profit, as its high margin TVs and premium washing machines found favour with consumers. Weaker demand for consumer electronics globally has been clouding the outlook for technology firms such as LG, the world's No.2 television maker behind Samsung Electronics Co Ltd . LG said October-December profit was 349 billion won ($290 million), above a Thomson Reuters StarMine SmartEstimate of 340 billion won derived from a survey of 25 analysts.

11 Tips To Protect You From Identity Theft & Related Tax Fraud

- Sun, 24 Jan 2016 06:13:00 -0500

Identity theft tops the list of taxpayer concerns for 2016. And it's not all in your head: a 2015 Identity Fraud Study, released by Javelin Strategy & Research, found that identity thieves stole $16 billion ...

The NSA has a brilliant stance on encryption

- Fri, 22 Jan 2016 20:24:09 -0500

Discussions†about the U.S. government?s need for breaking encryption have intensified following the mid-November attacks in Paris. Law enforcement agencies including the FBI and politicians have challenged tech leaders from Silicon Valley to find ways to include backdoors in encrypted products. That way, surveillance operations targeting†potential terror suspects†might†have a better chance of successfully†intercepting relevant†communication. Tech leaders, meanwhile,† have stood firm against crippling encryption with backdoors, with Apple and Tim Cook at the forefront of this argument. That doesn?t mean tech companies unwilling to help intelligence agencies address†terrorist threats ? but they?ll just do it differently for the time being . With all that in mind, one can?t help but applaud the† NSA?s brilliant stance on encryption