IANS Blog RSS Feed

http://www.iansresearch.com

Poulin to CSO: We Hacked a Smart Building Using ?Old-School? Techniques

- Thu, 11 Feb 2016 00:00:00 GMT

The ?smarter? buildings get, the easier they are to hack? Maybe. IANS Faculty Chris Poulin, research strategist for IBM?s X-Force ethical hacking team, recently spoke to CSO?s Maria Korolov about a penetration test in which his team was able to gain access to all of the buildings operated by a building management company.

Privacy, Security Concerns Rise as States Mull Encryption Backdoor Requirements

- Wed, 27 Jan 2016 00:00:00 GMT

National Data Privacy Day (January 28th) certainly comes at an interesting time this year, as legislators in two of the most technology-centric U.S. states recently introduced similar bills that would force smartphone manufacturers to include encryption backdoors in their devices.

Fledgling Cyber-Insurance Market Tested by Early Denials, Lawsuits

- Wed, 20 Jan 2016 00:00:00 GMT

Cybersecurity insurance policies may be relatively new, but they have one important thing in common with established, legacy business coverage: They live and die in the fine print.

Hacker-Caused Ukrainian Power Outage Marks First Known Attack With Immediate, Direct Public Impact

- Tue, 05 Jan 2016 00:00:00 GMT

Security researchers have confirmed that a recently updated version of the highly destructive BlackEnergy malware package infected the systems of at least three power authorities in Ukraine, causing a massive outage that left thousands of homes in the Ivano-Frankivsk region of the country without electricity. 

Top 10 IANS Insights from a Tumultuous 2015

- Mon, 28 Dec 2015 00:00:00 GMT

Another year is in the books and what a year it was for infosec pros. From the Ashley Madison hack to the OPM breach, to Jeep commandeering and mysterious backdoors in popular networking gear, every week brought a new security twist that forced us all to keep our heads on swivels.

Herold: Misguided CISA Heightens Security, Privacy Concerns

- Mon, 21 Dec 2015 00:00:00 GMT

The controversial Cybersecurity Information Sharing Act (CISA) is now the law of the land, slipped into an eleventh-hour spending bill designed to keep the federal government running through 2016.

Patch Now: Rogue Code Leaves Gaping Hole in Juniper Gear

- Fri, 18 Dec 2015 00:00:00 GMT

Juniper Networks says unauthorized code could allow attackers to gain administrative access to its NetScreen appliances and decrypt VPN connections without leaving any trace of their actions. Users are urged to apply fixes immediately.

Poulin: Time to Realistically Acknowledge Vehicle Vulnerabilities

- Wed, 16 Dec 2015 00:00:00 GMT

The images and breathless banter were difficult to ignore: celebrity security researchers gaining remote command of an automobile, disrupting on-board systems before forcing the vehicle and its helpless driver into a ditch.

NIST to Infosec Pros: How Is Our Framework Working?

- Mon, 14 Dec 2015 00:00:00 GMT

The National Institute of Standards and Technology is asking infosec practitioners in the public and private sectors to comment on the efficacy of its cybersecurity framework as it prepares to update the popular, two-year-old document.

As Ransomware Attacks Evolve, Security Teams Must Prepare For New ?Drive-By? Tactics

- Thu, 10 Dec 2015 00:00:00 GMT

Another week, another evolution of the popular ransomware attacks. When we last wrote about it, researchers had discovered a new iteration ? ?Linux.Encoder.1? ? that enabled attackers to inject malware into Linux-powered websites and encrypt all files in the home and backup directories. Now, it appears the popular exploit kit Angler is being used to spread the latest version of CryptoWall and other ransomware on websites as part of ?drive-by? campaigns that begin with the deployment of password-stealing malware. 

Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

Trojan.Ransomcrypt.AL

- Thu, 28 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Prociy

- Thu, 28 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Downloader.Exopire

- Thu, 28 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Pekelog

- Wed, 27 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Adupihan

- Wed, 27 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Godmodir

- Wed, 27 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Pekato

- Thu, 28 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Etumbot

- Tue, 26 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Exedapan!gm

- Tue, 26 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Pladrop

- Tue, 26 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-2347

- Wed, 27 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Boyapki.E

- Mon, 25 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AO

- Mon, 25 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Banswift

- Mon, 25 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-0147

- Sun, 24 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-0127

- Sun, 24 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Packed.Generic.503

- Sun, 24 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Contwoo

- Fri, 22 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Exedapan

- Thu, 21 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Phytob

- Thu, 21 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

JS.Ransomcrypt

- Wed, 20 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Multigpos

- Wed, 20 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Multig!gm

- Wed, 20 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

JS.Proxybrowse

- Thu, 21 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Packed.Generic.501

- Wed, 20 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AN

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptlock.AN!gm

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

BBOS.Stealthgenie

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Exploz.C

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus.

W32.Exploz.C

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Virus.

Exp.CVE-2016-0164

- Wed, 20 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-0155

- Wed, 20 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Adwind!gen1

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g112

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Downloader!gen2

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g200

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g100

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g140

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g173

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.OF!g2

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.OF!g3

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Nancrat!gen3

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SillyFDC!gen5

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Worm.

SONAR.Trafic2.RGC!g15

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspExt!gen1

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic1.RGC!g13

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic2.RGC!g4

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Nymaim.B!gm

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AM

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W97M.Downloader.H

- Mon, 18 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Naibe

- Mon, 18 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AK

- Mon, 18 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptlock.W!g2

- Sat, 16 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Packed.Generic.500

- Thu, 14 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-0157

- Fri, 15 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-0158

- Fri, 15 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.Qakbot!gen12

- Fri, 15 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Virus, Worm.

SONAR.Trafic2.RGC!g13

- Wed, 13 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.SH!g8

- Wed, 13 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.CM!g5

- Wed, 13 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Kotver!gen2

- Wed, 13 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g129

- Wed, 13 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MSWord!g1

- Wed, 13 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Zbot.D

- Wed, 13 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AJ

- Tue, 12 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Orcalata

- Mon, 11 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Downloader.Orcalata

- Mon, 11 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AI

- Sun, 10 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Downloader.Zirchap

- Sat, 9 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Karus

- Sat, 9 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W97M.Downloader.G

- Tue, 5 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Heur.RGC!g186

- Thu, 7 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g151

- Thu, 7 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g152

- Thu, 7 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g153

- Thu, 7 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Exp.CVE-2016-1019

- Fri, 8 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Poslit

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Heur.RGC!g155

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g156

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Backdoor.Perper

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AL

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptlock.AL!gm

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AH

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Cryptlocker!g51

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g103

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g106

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g101

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g102

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g115

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g114

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g117

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g111

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g119

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g118

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g110

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g120

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g116

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g121

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g122

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g124

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g131

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g126

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g125

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g133

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g132

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g135

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic2.RGC!g6

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic2.RGC!g16

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g134

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic2.RGC!g10

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic1.RGC!g10

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g145

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspLaunch!gen11

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspLaunch!gen10

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.SH!g6

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspDrop!gen7

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g143

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g146

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Nancrat!gen4

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g141

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g149

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g148

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.DL!g3

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.CM!g8

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.CM!g21

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.CM!g10

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g98

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g97

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g95

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g94

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g93

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g199

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g197

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g195

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g194

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g193

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g188

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g192

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g177

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g187

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g178

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g184

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g179

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g176

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g175

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g174

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g172

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g170

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g168

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g162

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g163

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g165

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g159

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g167

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g157

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Cryptolocker.AK

- Tue, 5 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.Grenail.O!inf

- Tue, 5 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Virus.

Infostealer.Fakepude

- Mon, 4 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.Ransomlock.AP

- Tue, 5 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Worm.

Trojan.Huntpos

- Fri, 1 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.Woniore

- Fri, 1 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Worm.

PHP.Ransomcrypt.B

- Fri, 1 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ranscrypt.AE!g1

- Fri, 1 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ranscrypt.AE!g2

- Fri, 1 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Annieco

- Wed, 30 Mar 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Linux.Routrem

- Thu, 31 Mar 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

Texas man in Iowa to face lottery jackpot fraud charges

- Thu, 28 Apr 2016 17:24:11 -0400

A Texas man accused of helping a lottery computer manager in Iowa collect jackpots from rigged lottery games gave up a yearlong extradition fight on Thursday and traveled to Iowa to face charges. Robert ...

U.S. high court approves rule change to expand FBI hacking power

- Thu, 28 Apr 2016 17:16:40 -0400

A neon Google sign is seen in the foyer of Google's new Canadian engineering headquarters in Kitchener-WaterlooBy Dustin Volz WASHINGTON (Reuters) - The Supreme Court on Thursday approved a rule change that would let U.S. judges issue search warrants for access to computers located in any jurisdiction despite opposition from civil liberties groups who say it will greatly expand the FBI's hacking authority. U.S. Chief Justice John Roberts transmitted the rules to Congress, which will have until Dec. 1 to reject or modify the changes to the federal rules of criminal procedure.


Canada's Goldcorp says computer network hacked

- Thu, 28 Apr 2016 16:19:08 -0400

A general view shows the open pit gold mine of Goldcorp in PenasquitoBy Susan Taylor TORONTO (Reuters) - Canada's Goldcorp Inc on Thursday said its computer network had been compromised and the gold mining company was working to determine the scope and impact of the data breach. Vancouver-based Goldcorp's internal security team and independent technology security firms are gathering facts and informing affected employees, but Chief Executive David Garofalo said he was not overly worried. "The extent of the data breach is not of significant concern for us because we're a public company and anything of a material nature has to be in the public domain by law anyways.


ISIS is assembling a cyber army

- Thu, 28 Apr 2016 16:02:33 -0400

Following the deadly assaults on Europe in late 2015 and early 2016, reports emerged suggesting that ISIS has an army of organized hackers  who can provide consistent, round the clock  support to foot soldiers. However, new information on the matter seems to suggest that ISIS?s remaining hacking arm is nothing more than a propaganda machine capable of dealing minor hits, if any, to enemies. But ISIS is showing more interest in expanding its hacking capabilities. The news comes at a time when the U.S. government has declared cyber war on the Islamic paramilitary organization. DON?T MISS:  Apple issues statement following apparent suicide at Cupertino headquarters A report from Flashpoint called Hacking for ISIS: The Emergent Cyber Threat Landscape , first seen by Ars Technica , says that ISIS in April merged four independent pro-ISIS cyber teams into a single group called the United Cyber Caliphate. The group is made of the Sons Caliphate Army, the Caliphate Cyber Army, the Ghost Caliphate Section and Kalashnikov E-Security Team. These sound like rather scary organizations, but Flashpoint says they can?t do that much harm as they lack the expertise to conduct sophisticated digital assaults. ?Until recently, our analysis of the group's overall capabilities indicated that they were neither advanced nor did they demonstrate sophisticated targeting,? Flashpoint co-founder and Director of Research & Analysis for the Middle East and North Africa Laith Alkhouri said. ?With the latest unification of multiple pro-ISIS cyber groups under one umbrella, there now appears to be a higher interest and willingness amongst ISIS supporters in coordinating and elevating cyber attacks against governments and companies.? The report reveals that British citizen Junaid Hussain, who was killed in a raid in August 2015 , was the leader of ISIS's former Cyber Caliphate Army. Known as TriCK and part of a well-known black hat hackers group called TeaMp0isoN, Hussain joined ISIS in the summer of 2014. Since then, he has tried to recruit other colleagues into his team, but he hasn't been very successful. ISIS was able to take over social media accounts, defame websites (including CENTCOM and Newsweek), and attack the sites of certain cities, although it hasn't accomplished any major hack. Rather than coming up with its own hacks, the unified UCC group ? not to be confused with the US Cyber Command fighting ISIS hackers ? is likely going to employ ?malware as a service? exploit sites and other tools that can be purchased off hacker forums. The UCC would still be able to conduct propaganda operations and cause damage to ?soft? targets. So their capabilities, while limited, shouldn?t be completely ignored.

Google?s 2016 Nexus phones are probably going to be unbeatable

- Thu, 28 Apr 2016 15:12:14 -0400

Multiple reports have said that Google is already working hard on a couple of new Nexus handsets, undoubtedly the successors of the Nexus 5X and Nexus 6P . But rather than have LG and Huawei make them, Google supposedly hired HTC, the same company that made the iconic Nexus One. A pair of new reports bring further evidence that Google may indeed partner with HTC for the 2016 Nexus handsets ? yes, two devices are supposedly in the works. DON?T MISS:  How Snapchat and stupidity almost left five people dead First off, not only is HTC capable of making some impressive Android handsets ? just look at this year?s HTC 10 ? but the rumors come from sources who?re generally in the know about these type of things. https://twitter.com/evleaks/status/725395035022319616 Evan Blass and Android Police independently came out with details about the new Nexus handsets. Blass found out from his sources that HTC is making a pair of Android N handsets for Google, dubbed M1 and S1 internally. Meanwhile, a source told Android Police that Marlin and Sailfish are Google?s internal codenames for the new Nexus phones. The blog also dug through the available code to uncover evidence of one of the two names: Marlin. Sailfish is a weird choice for Google considering that it happens to be the name of a rival mobile operating system, but the company is known for using fish names for its Nexus devices. Furthermore, Blass and Android Police ?s reports certainly align: M1 might be the Marlin while S1 could stand for Sailfish. What about the numbers you ask? Neither source explains the detail. But an earlier report suggested that HTC may have inked a three-year Nexus exclusivity deal . So there?s that. It?s too early for specs, features or pictures. But the possibility of seeing HTC 10 variations turned into Nexus handsets is exciting. The HTC 10 is the most powerful smartphone ever and HTC'c hardware designs are always best-in-class. Add in stock Android and immediate access to software updates and you've got a pair of phones that might be unbeatable.

Hackers leak stolen Kenyan foreign ministry documents

- Thu, 28 Apr 2016 13:17:01 -0400

A magnifying glass is held in front of a computer screen in this picture illustration taken in BerlinBy George Obulutsa NAIROBI (Reuters) - Online activists who claim ties to Anonymous said on Thursday they had begun to leak documents from Kenya's foreign ministry as part of a campaign to expose government and corporate corruption across Africa. HackRead, a cyber security news site, reported that a hacker affiliated with "Operation Africa" had told it: "In (a) few days you will receive full disclosure of the data ? We the Anonymous will stand against corruption, child abuse, and child labor!" A link to a sample of 95 documents was published to a widely known Anonymous Twitter account, part of what it claimed was a one-terabyte stash of date from Kenya's Ministry of Foreign Affairs and International Trade. The documents, viewed by Reuters, appear to consist of mostly routine correspondence between Kenyan foreign ministry officials and other diplomatic missions, trade partners and international companies around the world.


That time a Windows 10 update alert ruined a live TV broadcast

- Thu, 28 Apr 2016 09:35:09 -0400

How annoyed do you get each and every time a little alert pops up on your Windows computer insisting that you install the latest available platform updates? Do you keep your cool and just dismiss it? Do you get a little miffed and take your frustrations out on your mouse? Or maybe you're so tired of seeing these notifications that your blood begins to boil and you have to fight back the urge to break something. Now imagine you're reporting a weather forecast in the middle of a live TV broadcast when an alert pops up asking you to update... DON'T MISS:  Making sense of Apple now that everything has changed Via BetaNews , KCCI 8's meteorologist Metinka Slater was reporting the weather on live television when the Windows-powered computer her station uses to power weather graphics took an unplanned detour. Just as she was discussing heavy amounts of rainfall across southwest Iowa, an alert popped up saying that the channel's Windows computer wanted to install Windows 10. In the process, it covered her handy weather map graphics. To Slater's credit, she handled the curveball quite well. "Microsoft recommends upgrading to Windows 10... what should I do?" she asked sarcastically. "Ahhhh don't you love when that pops up, huh?" Microsoft has been pushing PC users with earlier Windows versions to update to Windows 10 in the hopes that they'll forget the Windows 8 debacle ever happened, and it has been doing so using annoying pop-up alerts like this one. Windows 10 is a huge improvement and we certainly recommend the free update, but don't worry, there's a way to stop those bothersome upgrade alerts if you're not quite ready to pull the trigger.  Here you go , Metinka. A video showing the blooper is embedded below.

Tennessee law to allow counselors to deny service based on beliefs

- Thu, 28 Apr 2016 09:03:59 -0400

File photo of Tennessee Republican Governor Haslam listening during the National Governors Association Winter Meeting in WashingtonGovernor Bill Haslam signed the bill into law three weeks after it was approved by the legislature. "The substance of this bill doesn't address a group, issue or belief system," Haslam said in a statement.


Philippine anti-money laundering body says remittance firm a 'cleaning house' in heist

- Thu, 28 Apr 2016 08:21:42 -0400

Commuters pass by the front of the Bangladesh central bank building in DhakaA Philippine anti-money laundering body has lodged a complaint against owners of a remittance firm it called a "cleaning house" to hide the trail of $81 million looted from a Bangladesh bank, in one of the biggest cyber heists in history. Philrem Service Corporation muddied the process and washed the stolen funds via a web of transfers and currency conversions around Philippine bank accounts, before moving it into Manila casinos and junket operators, the Anti-Money Laundering Council (AMLC) said in the filing dated Wednesday. Unidentified hackers infiltrated the computers at Bangladesh Bank, the central bank, in early February and tried to transfer some $951 million from its account at the Federal Reserve Bank of New York.


FBI says it won't disclose how it accessed locked iPhone

- Wed, 27 Apr 2016 23:39:15 -0400

FILE - In this Feb. 17, 2016 file photo, an iPhone is seen in Washington. The FBI said Wednesday, April 27, 2016, that it will not publicly disclose the method that allowed it to break into a locked iPhone used by one of the San Bernardino attackers, saying it lacks enough ?technical information? about the software vulnerability that was exploited. (AP Photo/Carolyn Kaster, File)WASHINGTON (AP) ? The FBI said Wednesday that it will not publicly disclose the method that allowed it to access a locked iPhone used by one of the San Bernardino attackers, saying it lacks enough "technical information" about the software vulnerability that was exploited.


Philippine central bank says foiled attempts to hack its website

- Wed, 27 Apr 2016 23:29:50 -0400

A logo of Bangko Sentral ng Pilipinas is seen at their main building in ManilaBy Karen Lema MANILA (Reuters) - The Philippine central bank has foiled attempts to hack its website, its governor said on Thursday amid a warning from global financial network SWIFT about recent multiple cyber fraud incidents targeting its system. SWIFT'S disclosure came as law enforcement authorities in Bangladesh and elsewhere investigated the February cyber theft of $81 million from the Bangladesh central bank account at the New York Federal Reserve Bank. "There were attempts, and I think this is a fact of life, but we have been able to turn them back," Amando Tetangco told reporters.


Wall Street watchdog has unfinished business with bad brokers

- Wed, 27 Apr 2016 19:54:37 -0400

CEO of the Financial Industry Regulatory Authority Richard Ketchum speaks during the Global Wealth Management Summit in New YorkIn an interview with Reuters on Wednesday, Richard Ketchum, chairman and chief executive of the Financial Industry Regulatory Authority (FINRA), mentioned several ways data should be better collected and used by regulators and investors. "There's no doubt in my mind that the future of regulation is going to be about data analytics," said Ketchum. A top priority is getting more and better information onto FINRA's BrokerCheck website, a free database where investors can research professional histories of brokers and firms.


Qatar's largest bank investigating alleged data breach

- Wed, 27 Apr 2016 14:21:58 -0400

FILE- In this Friday, May 14, 2010 file photo, a Qatari woman walks in front of the city skyline in Doha. Qatar National Bank was responding to files circulating on social media that purport to show the personal information of hundreds of people, including staff at the broadcaster Al-Jazeera and members of the ruling family. (AP Photo/Kamran Jebreili)DUBAI, United Arab Emirates (AP) ? Qatar's largest bank is investigating a security breach that appears to have exposed sensitive personal data for what could be hundreds of customers, including employees of international broadcaster Al-Jazeera and potentially senior government officials.


Qatar National Bank investigating alleged data hack

- Wed, 27 Apr 2016 12:16:45 -0400

A general view of Qatar National Bank's head office building in DohaBy Tom Finn DOHA (Reuters) - Qatar National Bank, the largest lender in the Middle East and Africa by assets, is investigating an alleged security breach of data posted online this week that revealed the names and passwords of a large number of customers. QNB said it was investigating "social media speculation in regard to an alleged data breach" and would not comment on reports circulated via social media. One file contained information on what appeared to be 465,437 QNB accounts, although only a fraction of these accounts had anything resembling full account details.


The FBI?s Most-Wanted Cybercriminals

- Wed, 27 Apr 2016 10:00:07 -0400

For more than 60 years, the FBI has kept a list of its top ten most wanted fugitives. The idea took root in the bureau when a reporter asked the FBI in 1949 for a list of the ?toughest guys? it was looking for, and published the list in the Washington Daily News, according to the agency. The article captured so much interest that FBI Director J. Edgar Hoover institutionalized the most-wanted list the very next year.

German nuclear plant infected with computer viruses, operator says

- Wed, 27 Apr 2016 09:02:12 -0400

Nuclear power plant is pictured in GundremmingenBy Christoph Steitz and Eric Auchard FRANKFURT (Reuters) - A nuclear power plant in Germany has been found to be infected with computer viruses, but they appear not to have posed a threat to the facility's operations because it is isolated from the Internet, the station's operator said on Tuesday. The Gundremmingen plant, located about 120 km (75 miles) northwest of Munich, is run by the German utility RWE . The viruses, which include "W32.Ramnit" and "Conficker", were discovered at Gundremmingen's B unit in a computer system retrofitted in 2008 with data visualization software associated with equipment for moving nuclear fuel rods, RWE said.


Apple upbeat on iPhone SE demand but some Asian retailers, suppliers less cheery

- Wed, 27 Apr 2016 08:33:07 -0400

File photo of hostesses holding the the Huawei's Ascend P7 smartphone during a presentation in ParisBy Yimou Lee HONG KONG (Reuters) - After announcing its first-ever drop in iPhone sales on Tuesday, Apple Inc sought to reassure investors by saying its latest and cheapest model was in strong demand after being launched in late March. In a Reuters survey of 10 retailers in Hong Kong, Beijing, Shanghai and Shenzhen, seven - including four Apple Stores - reported solid early demand, but three third-party retailers said sales were weak. Two suppliers of components for Apple phones, including the new iPhone SE, said they were seeing lower orders.


Apple says FBI gave it first vulnerability tip on April 14

- Tue, 26 Apr 2016 20:14:13 -0400

Logo of U.S. technology company Apple is seen in ZurichThe FBI informed Apple Inc of a vulnerability in its iPhone and Mac software on April 14, the first time it had told the company about a flaw in Apple products under a controversial White House process for sharing such information, the company told Reuters on Tuesday. The FBI told the company that the disclosure resulted from the so-called Vulnerability Equities Process for deciding what to do with information about security holes, Apple said. The vulnerability that was disclosed to Apple involved older versions of the iPhone and the Mac, Apple said.


Estonian sentenced in U.S. to seven years in prison for cyber fraud

- Tue, 26 Apr 2016 19:27:27 -0400

By Nate Raymond NEW YORK (Reuters) - An Estonian man who authorities said ran a cyber criminal enterprise that infected more than four million computers worldwide with malware to carry out a lucrative click fraud scheme was sentenced by a U.S. judge on Tuesday to 7-1/4 years in prison. Vladimir Tsastsin, 35, was sentenced by U.S. District Judge Lewis Kaplan in Manhattan after pleading guilty in July to charges that he engaged in wire fraud and computer intrusion conspiracies in a scheme that caused $14 million in losses. Tsastsin was extradited in October 2014 from Estonia, where he was arrested in 2011 and separately tried and convicted in a court in Estonia on related money-laundering charges.

Microsoft is bringing my favorite iPhone and Mac feature to Windows 10

- Tue, 26 Apr 2016 07:52:50 -0400

It's incredible how quickly the tide can turn on the internet. It seems like just yesterday that hordes of angry Windows users were banding together and vowing in unison that they would never patronize Microsoft again because of its shoddy Windows 8 platform. Now, it's almost as though Windows 8 never existed ? apparently skipping 9 and jumping directly to 10 worked pretty well indeed. But Windows 10 isn't just a marketing trick, it's a well-crafted desktop platform that doesn't overcompensate for Microsoft's shortcomings in mobile, which is why the Windows 8 experience was so terrible. The best part is that Microsoft continues to make important improvements to its Windows 10 platform, and it looks like the next big addition to Windows will be one of my favorite features from iOS and OS X. DON'T MISS:  My iPhone screen is bigger than your HDTV, but it still fits in my pocket Desktop and smartphone user experiences were entirely separate for a period of time, but Apple and Google have made great strides to better link them. Email protocols like Exchange and IMAP allowed changes made on one device to be reflected on the other, so why couldn't this same concept extend to other areas as well? Apple's Handoff feature suite was introduced as a way to make that happen. Using Handoff, users can switch seamlessly from an iPhone to a MacBook to an iPad without skipping a beat. Web pages you were browsing on your iPhone are instantly available on your MacBook. Documents you were editing on your MacBook open in the blink of an eye on your iPad. Now, it looks like Microsoft is getting ready to bake a similar feature set into Windows 10. As noted by a user on Reddit , a new option appeared for some users in the latest Windows 10 update that refers to Microsoft's upcoming handoff feature. It's not yet fully implemented so it cannot be tested, but this falls in line with earlier reports suggesting that Microsoft is working on functionality similar to handoff. It's important to note that this functionality, once launched, will not be limited to users with Windows smartphones. As reiterated by MSpoweruser , the handoff feature in Windows 10 will be cloud based and will work with third-party apps on the iOS and Android platforms.

Exclusive: SWIFT warns customers of multiple cyber fraud cases

- Tue, 26 Apr 2016 06:23:26 -0400

Swift code bank logo is displayed on an iPhone 6s on top of Euro banknotes in this picture illustration made in ZenicaThe disclosure came as law enforcement authorities in Bangladesh and elsewhere investigated the February cyber theft of $81 million from the Bangladesh central bank account at the New York Federal Reserve Bank. SWIFT has acknowledged that the scheme involved altering SWIFT software on Bangladesh Bank's computers to hide evidence of fraudulent transfers. Monday's statement from SWIFT marked the first acknowledgement that the Bangladesh Bank attack was not an isolated incident but one of several recent criminal schemes that aimed to take advantage of the global messaging platform used by some 11,000 financial institutions.


Dangerous Windows 10 flaw lets hackers secretly run any app on your PC

- Mon, 25 Apr 2016 23:17:39 -0400

A newly identified Windows 10 security flaw lets  hackers install malicious apps on any machine, without business owners being made aware anything out of the ordinary is happening. The issue lets anyone familiar with Windows security bypass its defenses without leaving any trace on the machine. Discovered accidentally, the issue is significant, and Microsoft is yet to issue a patch. DON?T MISS:  My iPhone screen is bigger than your HDTV, but it still fits in my pocket Found by Casey Smith , the Windows vulnerability doesn?t affect only Windows 10 machines. Malicious hackers could take advantage of the security flaw on enterprise versions of Windows dating back to Windows 7. The issue concerns a program called Regsvr32 (and Regsvr64 for 64-bit machines), which lets anyone execute code on a Windows computer from remote network locations. The flaw doesn?t trigger the AppLocker security software, which is supposed to only let users run apps from trusted sources, and it doesn?t leave any traces in the registry, as it doesn?t need administrator access. In other words, pretty much anyone could use it to install and run any application on an unsuspecting employee?s Windows machine. Microsoft has not yet provided a fix for the issue, but users can disable the Regsvr program using Windows Firewall. More details on Smith?s findings are available at the source links, including proof of concept scripts to demonstrate the security issue.

2nd security firm raises concerns about Cruz and Kasich apps

- Mon, 25 Apr 2016 22:45:01 -0400

WASHINGTON (AP) ? Another computer-security firm raised concerns Monday about the potential for hackers to glean users' personal data from phone apps released by the campaigns of Republican presidential contenders Ted Cruz and John Kasich.

Exclusive: SWIFT network says aware of multiple cyber fraud incidents

- Mon, 25 Apr 2016 19:20:49 -0400

Swift code bank logo is displayed on an iPhone 6s on top of Euro banknotes in this picture illustration made in ZenicaThe disclosure came as law enforcement authorities in Bangladesh and elsewhere investigated the February cyber theft of $81 million from the Bangladesh central bank account at the New York Federal Reserve Bank. SWIFT has acknowledged that the scheme involved altering SWIFT software on Bangladesh Bank's computers to hide evidence of fraudulent transfers. Monday's statement from SWIFT marked the first acknowledgement that the Bangladesh Bank attack was not an isolated incident but one of several recent criminal schemes that aimed to take advantage of the global messaging platform used by some 11,000 financial institutions.


Bangladesh Bank hackers compromised SWIFT software, warning issued

- Mon, 25 Apr 2016 11:06:10 -0400

Swift code bank logo is displayed on an iPhone 6s on top of Euro banknotes in this picture illustration made in ZenicaSWIFT, a cooperative owned by 3,000 financial institutions, confirmed to Reuters that it was aware of malware targeting its client software. Its spokeswoman Natasha Deteran said SWIFT on Monday released a software update to thwart the malware, along with a special warning for financial institutions to scrutinize their security procedures.


The iPhone 7 is going to be ?boring?

- Mon, 25 Apr 2016 09:46:39 -0400

Will the iPhone 7 be ?boring? in terms of novel new features? A new report from a reputable insider seems to suggest that the new smartphone won?t have alluring features that will convince masses of buyers to purchase it. On the contrary, the iPhone 7 might hurt Apple's bottom line this year and the company might sell fewer iPhones this year than it did in 2014. DON?T MISS: Guess which 'flop' sold twice as well as the iPhone in its first year KGI analyst Ming-Chi Kuo, who has been very accurate with iPhone predictions in the past, says that in a worst case scenario, Apple will sell 190 million iPhones in 2016, 3 million short of the 193 million units it sold in 2014. In a best case scenario, Apple is seen selling 205 million handsets, which is still much lower than the general Wall Street consensus ? analysts think Apple will sell between 210 million and 230 million iPhones in 2016. Kuo says that Apple might be the only smartphone maker from the top five smartphone brands that sees shipments decline year over year. That list includes Samsung, Apple, Huawei, Oppo and Vivo. The insider says the new iPhone SE will have little impact on overall iPhone sales, though he raised his SE sales estimates  from 12 million to 18 million shipments for the year. "While we believe the high-end smartphone market still has room for growth, the development of a newer, more innovative user experience is a prerequisite for growth," Kuo said, according to MacRumors. "We believe only iPhone will see shipments fall YoY in 2016, for three reasons: (1) intensification of market competition; (2) time needed for commercialization of new user experience technologies; and (3) iPhone needs a makeover (e.g. form factor design) to keep attracting consumers." Kuo said that the iPhone 7 doesn?t have ?attractive selling points,? without elaborating on exactly what that means. Presumably, Kuo is suggesting that the new features Apple intends to introduce won't be exciting enough to draw the types of crowds Apple's iPhones have drawn in the past. Earlier rumors suggest the iPhone 7 will be similar to the iPhone 6s when it comes to overall design, though it might be thinner thanks to the removal of the headphone jack. It will supposedly also feature a redesigned antenna assembly on the back, which some versions of the Plus model are expected to pack a dual lens camera. Other reports have suggested that the iPhone 7 will also be waterproof.

Two-thirds of German industry hit by digital crime, survey finds

- Mon, 25 Apr 2016 05:32:21 -0400

More than two-thirds of German industrial companies have been victims of digital crime in the past two years, according to a survey carried out by Bitkom, Germany's IT, telecoms and new media industry association. Such crimes cost German manufacturing industry more than 22 billion euros ($25 billion) a year, Bitkom estimated following its survey of 504 German manufacturing companies with at least 10 employees. "German industry, with its numerous hidden champions, is an attractive target for cybercriminals and foreign intelligence services," he added.

Can Veep Keep Up With the 2016 Election?

- Sat, 23 Apr 2016 09:00:00 -0400

In the new season of Veep, President Selina Meyer (Julia Louis-Dreyfus) battles for reelection after an electoral college tie. She gets a new boyfriend, a rich Wall Street lobbyist, and weathers public scrutiny over his influence in the Oval Office; she has a Twitter mishap where she sends the whole world a message intended to be private; there?s some business with a poor makeup job for a stress pimple. It?s the same brand of political farce the HBO show has excelled at for five years, but the jokes feel a little off, the verbal barbs tamer than before. Which prompts the quest: Is Veep losing its edge? Or has the world of politics just gotten too crazy for the spoof version to keep up?

U.S. drops New York fight with Apple after gaining access to iPhone

- Fri, 22 Apr 2016 23:23:49 -0400

Details are pictured on the backside of an Apple I phone 6 on a table in a restaurant in HanauThe U.S. Justice Department on Friday dropped its effort to force Apple Inc to help unlock an iPhone in a drug case in New York after someone provided authorities the passcode to access the device. The letter marked a sudden end to a closely watched case, in which the Justice Department had been appealing a ruling by a federal magistrate judge holding that he could not force Apple to assist authorities.


Thrifty bank?s $10 routers lead to $81 million heist

- Fri, 22 Apr 2016 10:50:35 -0400

This past February, some clever hackers pulled off a daring bank heist that was aided by a Bangladeshi bank's decision to buy cheap second-hand $10 routers. In fact, the cheap routers let hackers get away with $81 million by giving them access to the secure computers that handle SWIFT monetary transactions and helping them hide their tracks. DON?T MISS: How do planes fly? This animation explains everything you need to know Some 20 individuals who received payments from hackers have been identified so far but the masterminds of the attack have yet to be discovered. Even worse is the fact that most of the funds, which were routed to accounts in the Philippines and diverted to a local casino, are still missing. According to Reuters , the head of the Forensic Training Institute of the Bangladesh police?s criminal investigation department revealed that security oversights from the bank helped hackers steal the money. Hackers took advantage of the $10 routers that had no firewalls to get into the bank?s system and were aided by the fact that the bank's switches weren't sophisticated enough to trace the hackers' steps. "You are talking about an organization that has access to billions of dollars and they are not taking even the most basic security precautions," cyber firm Optiv consultant Jeff Wichman told Reuters . Furthermore, the SWIFT servers inside the bank were on the same network with the rest of the banks? 5,000 computers, rather than being on a walled, secondary one. Furthermore, the room that houses the SWIFT computers isn?t monitored by a bank employee at all times in spite of the sensitive nature of the activity that goes on in it. Instead, all transactions are automatically printed on a printer in the room. Police believe that both the bank and SWIFT should take blame for the heist. The Belgian banking authority said that the heist only breached the Bangladesh Bank and not its secure messaging services. The bank stated that SWIFT officials only advised that a router upgrade is in order after the heist.

Philippine voter data hacked but polls to go ahead

- Fri, 22 Apr 2016 09:24:27 -0400

FILE - In this Wednesday, May 26, 2010, file photo security personnel and staff members of the Lower House keep a close eye on ballot boxes containing certificates of canvass, during the second day of deliberations of the National Board of Canvassers at the House of Representatives in Quezon City north of Manila, Philippines. Philippine election officials said Friday, April 22, 2016, that the May 9 national elections will go ahead despite a massive personal data leak of almost all 55 million registered voters in one of the biggest hacking scandals. (AP Photo/Pat Roque, File)MANILA, Philippines (AP) ? The hacking of a Philippine election database may have exposed the personal information of all 55 million registered voters, but will not undermine May 9 national elections, officials said Friday, in the latest hacking scandal to hit the Southeast Asian nation.


Lithuania govt websites hit by cyberattacks for 3rd time

- Fri, 22 Apr 2016 08:32:05 -0400

VILNIUS, Lithuania (AP) ? Lithuanian officials say government websites have been hit by cyberattacks for the third time this month.

Apple hopes to get its books, movies back online in China

- Fri, 22 Apr 2016 05:08:22 -0400

BEIJING (AP) ? Apple Inc. said Friday it hopes to resume its online iTunes and iBooks services in China, where they were recently shut down less than seven months after being launched.

Australian Rules-AFL teams seek deals in China foray

- Fri, 22 Apr 2016 02:16:06 -0400

The Gold Coast Suns are set to take on Port Adelaide in an Australian Football League championship match in China next year as the high-contact indigenous sport seeks a toe-hold in the world's second-largest economy. Top-flight Australian Rules football is embraced with religious fervour in Australia's southern states but in overseas markets remains a fringe sport confined to obscure time-slots on cable TV channels.

Bangladesh Bank exposed to hackers by cheap switches, no firewall: police

- Thu, 21 Apr 2016 19:31:31 -0400

Commuters pass by the front of the Bangladesh central bank building in DhakaBy Serajul Quadir DHAKA (Reuters) - Bangladesh's central bank was vulnerable to hackers because it did not have a firewall and used second-hand, $10 switches to network computers connected to the SWIFT global payment network, an investigator into one of the world's biggest cyber heists said. The shortcomings made it easier for hackers to break into the Bangladesh Bank system earlier this year and attempt to siphon off nearly $1 billion using the bank's SWIFT credentials, said Mohammad Shah Alam, head of the Forensic Training Institute of the Bangladesh police's criminal investigation department. The lack of sophisticated switches, which can cost several hundred dollars or more, also means it is difficult for investigators to figure out what the hackers did and where they might have been based, he added.


Is Apple?s new iPhone SE making the impossible possible?

- Thu, 21 Apr 2016 17:03:15 -0400

At the high end of the smartphone market, Apple and Samsung continue to dominate as other global brands fight for scraps. This has been the case in the industry for quite some time now, and at this rate it's not likely to change anytime soon. At the low end of the market though, something curious has happened over the past few years. A wave of China-based companies has stormed the market with surprisingly capable smartphones being sold at incredibly low prices, and they have stolen a massive chunk of business from established players like Samsung, LG and HTC. Of all the companies analysts thought might be able to fight back against these budget brands, Apple certainly wasn't at the top of any lists ? but it looks like that's exactly what's happening. MUST SEE: 5 hidden Galaxy S7 features I wish my iPhone had In the grand scheme of things, Apple's new iPhone SE isn't terribly affordable. The $399 to $499 price range is a bargain compared to other iPhones, but perfectly capable handsets can be purchased from Chinese Android phone vendors for half the price. One such company called Xiaomi has built a massive business worth billions by copying Apple's playbook but selling low-cost smartphones instead of high-end handsets. Samsung in particular has had a great deal of trouble with these budget brands in recent years. The company's profits slid for seven consecutive quarters at one point thanks largely to pressure from these Chinese companies. Apple, on the other hand, has never fought at the low end of the market, so the impact felt from these brands hasn't been anywhere near as powerful. Interestingly, a new report claims it's now Apple that is stealing market share away from more aggressive Chinese brands thanks to the lower-cost iPhone SE. "The launch of relatively low-priced iPhone SE in China has squeezed market share from local brands, including Huawei, Xiaomi Technology, Vivo and Oppo, affecting the earning performance of these brands," Digitimes said in a new report. Of note, the site's supply chain sources have been hit or miss in the past. But other reports have also suggested the iPhone SE has been a strong performer in the region, with preorders at third-party retailers alone said to have reached 3.4 million units ahead of launch.

U.S. says child porn case shows need for new data search rules

- Thu, 21 Apr 2016 14:41:22 -0400

The U.S. Justice Department said it was "disappointed" on Thursday that evidence against a Massachusetts man charged in a sweeping FBI child pornography sting had been thrown out, saying the ruling highlighted the need to clarify how search warrants for electronic data could be issued in some cases. U.S. District Judge William Young in Boston ruled on Wednesday that a federal magistrate in Virginia had no jurisdiction to issue a search warrant used to gather evidence in the case against Alex Levin, of Norwood, Massachusetts. Levin was arrested for possession of child pornography as part of an investigation in which the Federal Bureau of Investigation secretly ran one of the largest child pornography websites on the Internet in order to catch users.

Ashley Madison plaintiffs cannot sue anonymously over hack, judge says

- Thu, 21 Apr 2016 13:35:18 -0400

A photo illustration shows the Ashley Madison website displayed on a smartphone in TorontoPlaintiffs leading a lawsuit against online dating website Ashley Madison over a security breach that exposed the personal data of customers must publicly identify themselves to proceed with the case, a U.S. judge has ruled. Forty-two plaintiffs, seeking to represent users of the website who had their information compromised, had proceeded anonymously against Ashley Madison's Toronto-based parent company Avid Life Media, the ruling released on April 6 showed. The plaintiffs are suing Ashley Madison, a website that facilitates extramarital affairs, for failing to adequately secure their information, marketing a ?Full Delete Removal? service that did not work, and using fake female accounts to lure male customers, according to the ruling.


How to add unlimited free VPN to Google?s Chrome browser

- Thu, 21 Apr 2016 09:25:05 -0400

Opera made a big announcement on Thursday morning that was widely covered by tech blogs. In the latest developer preview build of its web browser for Windows and OS X, Opera has baked in unlimited free VPN service. VPN, or Virtual Private Networking, allows users to route their internet traffic through third-party servers in order to mask their actual IP addresses and increase privacy. VPN services also let users access region-blocked content, and they're very popular among Netflix subscribers outside the United States. This is a great feature for current Opera users and once it's released in a public Opera build, it might even attract some new users. But you can already get unlimited free VPN service in the Chrome browser, and we'll show you how in this post. DON'T MISS:  You?ll believe in magic after watching this street magician?s latest video In an age where your private browsing data is being hunted down by everyone from advertisers to hackers, VPN service is becoming more and more of a necessity. And no, the private browsing mode baked into your web browser isn't the same thing at all. VPN services can completely hide your identity from companies that try to track you and prevent them from building the online profile they so desperately want. Of course, some people don't mind companies tracking them  and for those people, VPN services aren't quite as essential most of the time. Whether or not you want to guard your browsing with a VPN service all the time or only when the need arises, there's an easy way to add unlimited free VPN capabilities to Chrome. And the best part is that it's not complicated or convoluted at all. There are a few services that offer free VPN using a couple of different models, and our favorite among them is Betternet. So how does it work? Simply visit this link from your Chrome browser and install Betternet's Chrome extension. That's it. You're done. You don't even have to register an account. How is it possible that Betternet offers free VPN service while other companies charge for it? Check out this page on the company's site, which explains how it makes money. In a nutshell, Betternet offers an optional premium version and monetizes its mobile apps for iOS and Android , and that covers the company's operational costs. It's not trying to turn a profit with this service, so it hopes to maintain the same model indefinitely. If you're not happy with Chrome and unlimited free VPN appeals to you, definitely give Opera a try. But if you'd rather stick with Chrome, Betternet is the way to go.

Forum to focus on cybersecurity needs in US and Canada

- Thu, 21 Apr 2016 01:37:05 -0400

Cybersecurity experts are planning to hold a forum on ways the United States and Canada can toughen their online defenses. The discussion will focus on the growing number of lone wolf and foreign government-sponsored ...