IANS Blog RSS Feed

http://www.iansresearch.com

Poulin to CSO: We Hacked a Smart Building Using ?Old-School? Techniques

- Thu, 11 Feb 2016 00:00:00 GMT

The ?smarter? buildings get, the easier they are to hack? Maybe. IANS Faculty Chris Poulin, research strategist for IBM?s X-Force ethical hacking team, recently spoke to CSO?s Maria Korolov about a penetration test in which his team was able to gain access to all of the buildings operated by a building management company.

Privacy, Security Concerns Rise as States Mull Encryption Backdoor Requirements

- Wed, 27 Jan 2016 00:00:00 GMT

National Data Privacy Day (January 28th) certainly comes at an interesting time this year, as legislators in two of the most technology-centric U.S. states recently introduced similar bills that would force smartphone manufacturers to include encryption backdoors in their devices.

Fledgling Cyber-Insurance Market Tested by Early Denials, Lawsuits

- Wed, 20 Jan 2016 00:00:00 GMT

Cybersecurity insurance policies may be relatively new, but they have one important thing in common with established, legacy business coverage: They live and die in the fine print.

Hacker-Caused Ukrainian Power Outage Marks First Known Attack With Immediate, Direct Public Impact

- Tue, 05 Jan 2016 00:00:00 GMT

Security researchers have confirmed that a recently updated version of the highly destructive BlackEnergy malware package infected the systems of at least three power authorities in Ukraine, causing a massive outage that left thousands of homes in the Ivano-Frankivsk region of the country without electricity. 

Top 10 IANS Insights from a Tumultuous 2015

- Mon, 28 Dec 2015 00:00:00 GMT

Another year is in the books and what a year it was for infosec pros. From the Ashley Madison hack to the OPM breach, to Jeep commandeering and mysterious backdoors in popular networking gear, every week brought a new security twist that forced us all to keep our heads on swivels.

Herold: Misguided CISA Heightens Security, Privacy Concerns

- Mon, 21 Dec 2015 00:00:00 GMT

The controversial Cybersecurity Information Sharing Act (CISA) is now the law of the land, slipped into an eleventh-hour spending bill designed to keep the federal government running through 2016.

Patch Now: Rogue Code Leaves Gaping Hole in Juniper Gear

- Fri, 18 Dec 2015 00:00:00 GMT

Juniper Networks says unauthorized code could allow attackers to gain administrative access to its NetScreen appliances and decrypt VPN connections without leaving any trace of their actions. Users are urged to apply fixes immediately.

Poulin: Time to Realistically Acknowledge Vehicle Vulnerabilities

- Wed, 16 Dec 2015 00:00:00 GMT

The images and breathless banter were difficult to ignore: celebrity security researchers gaining remote command of an automobile, disrupting on-board systems before forcing the vehicle and its helpless driver into a ditch.

NIST to Infosec Pros: How Is Our Framework Working?

- Mon, 14 Dec 2015 00:00:00 GMT

The National Institute of Standards and Technology is asking infosec practitioners in the public and private sectors to comment on the efficacy of its cybersecurity framework as it prepares to update the popular, two-year-old document.

As Ransomware Attacks Evolve, Security Teams Must Prepare For New ?Drive-By? Tactics

- Thu, 10 Dec 2015 00:00:00 GMT

Another week, another evolution of the popular ransomware attacks. When we last wrote about it, researchers had discovered a new iteration ? ?Linux.Encoder.1? ? that enabled attackers to inject malware into Linux-powered websites and encrypt all files in the home and backup directories. Now, it appears the popular exploit kit Angler is being used to spread the latest version of CryptoWall and other ransomware on websites as part of ?drive-by? campaigns that begin with the deployment of password-stealing malware. 

Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

Trojan.Kotver!gm2

- Mon, 25 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Sorcurat

- Mon, 25 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Sorcurat!gm

- Mon, 25 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.BE

- Sun, 24 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Gen.5

- Sun, 24 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Cryptlocker!g59

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g239

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g57

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g311

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspLaunch!g13

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g252

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g204

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g58

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MSWord!g13

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlk.AN!g1

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Exp.CVE-2016-4173

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AX

- Fri, 22 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4203

- Fri, 22 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4251

- Fri, 22 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4252

- Fri, 22 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4192

- Fri, 22 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Cryptlocker!g74

- Wed, 20 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g75

- Wed, 20 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g247

- Wed, 20 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g281

- Wed, 20 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g264

- Wed, 20 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g265

- Wed, 20 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Ransomcrypt.BD

- Thu, 21 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.BC

- Tue, 19 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ranscrypt.BB!gm

- Sat, 16 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.BB

- Sat, 16 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Spyolog

- Thu, 14 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Pycerine

- Tue, 12 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AW

- Mon, 11 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.Hinired

- Sun, 10 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Worm.

SONAR.Heur.RGC!g255

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g206

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g217

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g221

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g237

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g245

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g253

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g261

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g263

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g266

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g274

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g295

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g298

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g302

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g305

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g315

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g327

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g333

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MSOffice!g1

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Asruex

- Tue, 5 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

OSX.Keydnap

- Thu, 7 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

OSX.Eelaonur

- Wed, 6 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4121

- Tue, 5 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4150

- Wed, 29 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4133

- Tue, 5 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4153

- Wed, 29 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4151

- Wed, 29 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4152

- Wed, 29 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Downloader.Asruex

- Tue, 5 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Sbidith

- Tue, 5 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

JS.Downloader!gen21

- Fri, 1 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen46

- Thu, 30 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspLaunch!gen9

- Thu, 30 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Cryptolocker.AV

- Thu, 30 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Scarcruft!g1

- Thu, 30 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

EXP.CVE-2016-2208

- Wed, 29 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4154

- Tue, 5 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4155

- Tue, 5 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-4156

- Tue, 5 Jul 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3646

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Downloader.Picgoo

- Wed, 29 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AT

- Thu, 30 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AU

- Thu, 30 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Fakeransomdel

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

JS.Retefe

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-2207

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-2209

- Mon, 27 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-2210

- Mon, 27 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3645

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3644

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Cryptlk.AH!g1

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g267

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g273

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g287

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g323

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MSWord!g6

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Exp.CVE-2016-2211

- Mon, 27 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-0200

- Mon, 27 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Kotver!gen3

- Tue, 28 Jun 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

Democratic emails: All about the hack, the leak, the discord

- Mon, 25 Jul 2016 15:51:44 -0400

Demonstrators make their way around downtown, Monday, July 25, 2016, in Philadelphia, during the first day of the Democratic National Convention. On Sunday, Debbie Wasserman Schultz, D-Fla., announced she would step down as DNC chairwoman at the end of the party's convention, after some of the 19,000 emails, presumably stolen from the DNC by hackers, were posted to the website Wikileaks. (AP Photo/John Minchillo)PHILADELPHIA (AP) ? First came the hack, then the leak. Now, the Clinton and Trump campaigns are fighting over Russia's role in the release of thousands of internal Democratic National Committee emails.


FBI investigates DNC hacking; Clinton campaign blames Russia

- Mon, 25 Jul 2016 15:11:14 -0400

Republican presidential candidate Donald Trump, speaks at a reception with friends and family following the Republican National Convention, Friday, July 22, 2016, in Cleveland. Listening are vice presidential running mate Gov. Mike Pence, R-Ind., Karen Pence, and Charlotte Pence. (AP Photo/Evan Vucci)WASHINGTON (AP) ? The FBI said Monday it is investigating how thousands of Democratic National Committee emails were hacked, a breach that Hillary Clinton's campaign maintains was committed by Russia to benefit Donald Trump.


White House will not comment on Democratic email hack probe

- Mon, 25 Jul 2016 13:39:10 -0400

The White House will not speculate on who might be behind the hacking of the Democratic National Committee, a spokesman said on Monday amid concerns hackers working for Russia may be attempting to influence the U.S. presidential election. "We know that there are a variety of actors, both state and criminal, who are looking for vulnerabilities in the cyber security of the United States and that includes Russia," said White House spokesman Josh Earnest.

Ericsson ousts CEO as investors lose patience over returns

- Mon, 25 Jul 2016 13:37:16 -0400

Ericsson's President & CEO Hans Vestberg attends a news conference during the Mobile World Congress in BarcelonaBy Sven Nordenstam STOCKHOLM (Reuters) - Swedish mobile telecoms gear maker Ericsson jettisoned its chief executive Hans Vestberg on Monday after pressure from major shareholders unhappy with its results. Investment companies Investor AB and Industrivarden, with a combined 37 percent of voting rights, had voiced dissatisfaction with Ericsson's performance, culminating in unprecedented public criticism in February. Ericsson, which is battling Finland's Nokia and China's Huawei, has responded to weak industry demand by slashing jobs and accelerating cost cuts.


FBI investigates hacking of Democratic Party organization

- Mon, 25 Jul 2016 13:33:11 -0400

The headquarters of the Democratic National Committee is seen in WashingtonThe Federal Bureau of Investigation is investigating the nature and scope of a cyber intrusion at the Democratic National Committee, the agency said on Monday, amid concerns hackers working for Russia are attempting to use the breach to influence the U.S. presidential election. "A compromise of this nature is something we take very seriously, and the FBI will continue to investigate and hold accountable those who pose a threat in cyberspace," the FBI said in a statement. Emails among DNC employees were released by anti-secrecy group WikiLeaks over the weekend appearing to expose favoritism for presumptive Democratic nominee Hillary Clinton over her chief rival in the primary contest, Senator Bernie Sanders.


'Shame!' Dems' division roils party on Day 1 of convention

- Mon, 25 Jul 2016 12:38:03 -0400

Protesters yell as DNC Chairwoman, Debbie Wasserman Schultz, D-Fla., arrives for a Florida delegation breakfast, Monday, July 25, 2016, in Philadelphia, during the first day of the Democratic National Convention. (AP Photo/Matt Slocum)PHILADELPHIA (AP) ? Angry Democrats heckled outgoing party chief Debbie Wasserman Schultz with boos and cries of "shame!" on Monday as the party tried to recover from an embarrassing email hack that ripped open primary wounds just hours before they planned to mount a four-day showcase of unity.


The Muscovite Candidate?

- Mon, 25 Jul 2016 12:24:18 -0400

Sometimes a conspiracy theory can be true. Or, to put it another way, just because you?re paranoid doesn?t mean they aren?t out to get you.

U.S. cyber security startup StackPath raises $150 million, says CEO

- Mon, 25 Jul 2016 07:31:35 -0400

By Heather Somerville and Jim Finkle SAN FRANCISCO (Reuters) - Texas-based StackPath has raised $150 million in fresh funding from private equity firm ABRY Partners, the CEO of the cyber security startup said on Monday, in what is among the largest single financing rounds for a private cyber security firm. Chief Executive Officer Lance Crosby told Reuters StackPath is a security platform that houses a suite of services to tackle a spectrum of cyber threats. The company has spent "tens of millions of dollars" to acquire several companies that provide different types of cloud security services for businesses, Crosby said.

China's Huawei says first-half sales revenue rose 40 percent year-on-year

- Sun, 24 Jul 2016 22:34:51 -0400

Journalists attend the presentation of the Huawei's new smartphone in ParisHuawei Technologies Co Ltd [HWT.UL], one of the world's largest telecoms equipment makers, on Monday posted a 40 percent rise in first-half sales revenue and said it would "maintain current momentum" this year. Sales revenue reached 245.5 billion yuan ($36.8 billion) in the first six months of 2016, the company said in a statement. The Shenzhen-based private company, which competes with Sweden's Ericsson for the top spot in the global market for telecoms equipment, did not elaborate in its brief statement.


Wasserman Schultz goes from favored to on the outs

- Sun, 24 Jul 2016 20:15:38 -0400

FILE - In a Tuesday, July 5, 2016 file photo, Congresswoman Debbie Wasserman Schultz, D-Fla., speaks during a news conference, in Fort Lauderdale, Fla. On Sunday, July 24, 2016, Wasserman Schultz announced she would step down as DNC chairwoman at the end of the party's convention. Her resignation follows the leak of some 19,000 emails, presumably stolen by hackers and posted to the website Wikileaks, that suggest the DNC favored Hillary Clinton over Bernie Sanders. (AP Photo/Lynne Sladky, File)WASHINGTON (AP) ? Five years ago, Debbie Wasserman Schultz was put in charge of the Democratic National Committee to usher in a new era for the party. Now, Wasserman Schultz is on her way out, after the publication of emails that suggest Democratic officials favored Hillary Clinton over Bernie Sanders during the nominating contests.


The Latest: Cheers greet Tim Kaine on return to Richmond

- Sat, 23 Jul 2016 23:28:02 -0400

Democratic presidential candidate Hillary Clinton and Sen. Tim Kaine, D-Va., arrive at a rally at Florida International University Panther Arena in Miami, Saturday, July 23, 2016. Clinton has chosen Kaine to be her running mate. (AP Photo/Andrew Harnik)WASHINGTON (AP) ? The Latest on the 2016 presidential campaign (all times EDT):


Apple weathers anti-U.S. demo in China, where patriotic protests snowball

- Sat, 23 Jul 2016 20:12:55 -0400

A 3D printed Apple logo is seen in front of a displayed stock graph in this illustration takenApple Inc found itself on the receiving end of a small, short-lived anti-U.S. protest this week in China, the tech firm's biggest overseas market and a country where foreign firms have suffered damaging boycotts following international spats. A handful of unofficial Apple stores were picketed and social media users encouraged each other to destroy their Apple goods, in a rare instance of the tech firm being targeted as a symbol of perceived injustice following an international ruling against Chinese territorial claims. "There's not much Apple or any other foreign firm can do to prevent such patriotic protests," said analyst Nicole Peng at researcher Canalys, who sees no impact to Apple's sales from the recent protest.


The Latest: Sanders delegates assured they won't miss votes

- Sat, 23 Jul 2016 19:34:01 -0400

FILE - In this June 24, 2016, file photo, Sen. Bernie Sanders, I-Vt., speaks in Albany, N.Y. Sanders plans to meet with 1,900 of his delegates right before the start of the Democratic National Convention on Monday, part of a series of meetings aimed at providing direction to his undecided supporters after he endorsed Hillary Clinton. (AP Photo/Mike Groll, File)WASHINGTON (AP) ? The Latest on the 2016 presidential campaign (all times EDT):


The Latest: Progressives push to end use of superdelegates

- Sat, 23 Jul 2016 14:50:49 -0400

Work continues inside the convention hall before the Democratic National Convention, Saturday, July 23, 2016, in Philadelphia. (AP Photo/Alex Brandon)WASHINGTON (AP) ? The Latest on the 2016 presidential campaign (all times EDT):


Hacked emails show Democratic party hostility to Sanders

- Sat, 23 Jul 2016 14:15:17 -0400

FILE - In this June 24, 2016, file photo, Sen. Bernie Sanders, I-Vt., speaks in Albany, N.Y. Sanders plans to meet with 1,900 of his delegates right before the start of the Democratic National Convention on Monday, part of a series of meetings aimed at providing direction to his undecided supporters after he endorsed Hillary Clinton. (AP Photo/Mike Groll, File)WASHINGTON (AP) ? A cache of more than 19,000 emails from Democratic party officials, leaked in advance of Hillary Clinton's nomination at the party's convention next week in Philadelphia, details the acrimonious split between the Democratic National Committee and Clinton's former rival, Sen. Bernie Sanders.


Kickass Torrents is back but don?t trust any of the clones just yet

- Fri, 22 Jul 2016 18:10:57 -0400

Anyone who used to get their movie fix via torrenting sites are probably still mourning the unexpected departure of Kickass Torrents (KAT). The site became the world?s biggest piracy resource after The Pirate Bay went offline for more than a month following a police raid in December 2014. However, the US government led an operation that ultimately took down Kickass Torrents this week. The site went down almost immediately after its alleged owner was arrested in Poland a few days ago. Since then, Kickass Torrents resumed activity online, but you should be very wary of the unofficial sites that pop up after takedowns like this. Some of them may have ulterior motives in mind apart from simply restoring a renowned piracy site. DON?T MISS:  Two of the best iPhone 7 leaks yet both surfaced last night According to The Verge , at least two KAT clones were spotted online, including KickassTorrents.website (which is believed to originate from IsoHunt) and KAT.am . However, TorrentFreak notes that KickassTorrents.website has no ties to IsoHunt whatsoever. This copycat just lists torrent files from the past one and a half years, but it doesn?t have a working forum or even upload functionality. ?It?s not perfect, but if users need to save and archive something, it?s time. We don?t know how long it can last, but at least it?s something,? the people behind the site told TorrentFreak . The creators of KAT.am claim that the site is ?hosted on multiple cloud servers to prevent blockade, and the hosting information is well hidden behind Cloudflare.? Furthermore, they told The Verge that the site features am a mobile version and that it "will has [sic] the complete torrent database of KAT, including the comments, user information intact." Kickass.la is one other site that has advertised itself to reporters as an ?official? backup of KAT, but that?s not the case, as the person behind it isn?t involved with KAT at all. With all that in mind, you should pay attention which KAT-branded piracy sites you visit in the next few days, if that?s your thing. Some of them might be fronts and you might end up downloading a whole mess of malware instead of the movie you were trying to steal.

Samsung sues Huawei for alleged patent violations

- Fri, 22 Jul 2016 03:48:28 -0400

In this photo taken Oct. 29, 2015, the corporate logo of Samsung Electronics Co. is seen at its shop in Seoul, South Korea. Samsung has sued Chinese smartphone maker Huawei for allegedly violating six of its patents. The South Korean company said on Friday, July 22, 2016, that it chose to take legal action to defend its intellectual property despite trying to resolve the dispute amicably. (AP Photo/Lee Jin-man)SEOUL, South Korea (AP) ? Samsung Electronics Co. sued Chinese smartphone maker Huawei for allegedly violating six of its patents in the latest move in a series of deepening patent disputes between Asian smartphone giants.


Samsung Elec sues Huawei in China for patent infringement

- Fri, 22 Jul 2016 03:35:28 -0400

The logo of Samsung Electronics is seen at its headquarters in SeoulSEOUL/HONG KONG (Reuters) - Tech giant Samsung Electronics Co Ltd said on Friday it sued Huawei Technologies Co Ltd [HWT.UL] for patent infringements through multiple courts in China, escalating a legal conflict between the smartphone rivals. The South Korean firm sued Huawei in a Beijing court about two weeks ago for allegedly infringing six of its patents, a spokeswoman said. "Despite our best efforts to resolve this matter amicably, it has regrettably become necessary to take legal action in order to defend our intellectual property," Samsung told Reuters in a statement.


Thai police arrest Russian, Uzbeki for alleged cybertheft

- Thu, 21 Jul 2016 11:48:41 -0400

BANGKOK (AP) ? A Russian man and an Uzbek woman were arrested at beach resorts in Thailand and accused of stealing more than $28.5 million by planting malware on the victims' computers and depleting bank accounts in the United States and other countries.

Special Report: How the New York Fed fumbled over the Bangladesh Bank heist

- Thu, 21 Jul 2016 11:20:58 -0400

Federal Reserve and New York City Police officers stand guard in front of the New York Federal Reserve BuildingWhen hackers broke into the computers of Bangladesh's central bank in February and sent fake payment orders, the Fed was tricked into paying out $101 million. It was a "total fluke" that the New York Fed did not pay out the $951 million requested by the hackers, said a person familiar with the Fed's handling of the matter. The Reuters examination has also found that the payment orders sent by the hackers were exceptional in several ways.


How millions from the Bangladesh Bank heist disappeared

- Thu, 21 Jul 2016 07:03:25 -0400

By Krishna N. Das and Jonathan Spicer DHAKA/NEW YORK (Reuters) - When the Federal Reserve Bank of New York cleared five transactions made by the Bangladesh Bank hackers, the money went in two directions. The Sri Lankan transaction contained a small but crucial error: The money was being sent to a bank account in the name of a nonprofit foundation, but the electronic message spelled it "fundation." That prompted Deutsche Bank, an intermediary in the transaction, and a Sri Lankan bank to contact Bangladesh Bank, which led to the payment being canceled and the money returned. Each account was in the name of an individual, according to RCBC lawyer Maria Cecilla Estavillo, who testified at a Philippine Senate committee examining the heist.

Auto industry sharing info on cyber attacks

- Thu, 21 Jul 2016 04:30:00 -0400

Automakers are sharing information on cyber security threats and working together on ways to respond when hackers strike, under guidelines being developed by the industry. Nearly all companies that sell ...

General Electric to make $500 million productivity savings from industrial internet

- Wed, 20 Jul 2016 03:37:18 -0400

SHANGHAI (Reuters) - General Electric Co will make $500 million of productivity savings in 2016 from using industrial internet applications, a company executive said on Wednesday. GE Chief Digital Officer Bill Ruh made the comments at a press conference in Shanghai, where the company also announced a partnership with China's Huawei Technologies [HWT.UL]. (Reporting by Brenda Goh; Editing by Stephen Coates)

GE remains upbeat on slower-growing China, says Rice

- Wed, 20 Jul 2016 03:37:18 -0400

General Electric still sees plenty of opportunities in a slower-growing China, even as the government's anti-corruption campaign causes some deals to take longer to get approved, a senior executive said on Wednesday. GE vice chairman John Rice, speaking on the sidelines of a company event in Shanghai, told Reuters there was some "level of caution" in reaction to President Xi Jinping's crackdown on corruption even though he broadly welcomed the campaign. "There?s some level of caution, people in some cases reacting to the anti-corruption campaign ... The effort to clean this up and deal with some of these issues will be really helpful to China and very helpful to companies like GE." Rice also said the fall in the value of the British pound after the vote to leave the European Union would help GE's exports and the company had no long-term plans to make substantive changes to its business in the United Kingdom.

GE takes digital strategy to China with Huawei tie-up

- Wed, 20 Jul 2016 03:36:52 -0400

The logo of Down Jones Industrial Average stock market index listed company General ElectricBy Brenda Goh SHANGHAI (Reuters) - General Electric Co on Wednesday said it would partner with Huawei Technologies Co Ltd [HWT.UL] to develop smart machines designed to boost productivity, part of a drive to promote its "industrial internet" business in China. The U.S. industrial giant announced the partnership as it launched an $11 million digital space in Shanghai, where it plans to incubate start-ups and have developers work on new software applications to make machines more intelligent. Chief Digital Officer Bill Ruh said the world's biggest maker of jet engines and diesel locomotives had already made $500 million in productivity savings for itself this year by using smarter machines, and he expected this to grow to $1 billion in total by 2020.


Scary Android malware blocks calls to your bank so it can keep stealing money from you

- Mon, 18 Jul 2016 21:00:04 -0400

Most Android users will never have to deal with malware apps on their devices, or at least not as long as they don?t download potentially malicious apps from third-party app stores. But there are people who can?t get apps from Google Play or choose to ignore the official app store, and they are more exposed to malicious apps. One malware app was just updated with a feature that can block calls to customer support numbers belonging to certain banks so that affected users can?t stop fraudulent transactions. DON?T MISS: Everything Nintendo?s mini NES can and can?t do Android.Fakebank is a malware app Symantec first discovered in October 2013. What the app does is to replace any banking apps on a device with fraudulent versions that let the attacker access the victim?s bank account and transfer funds. A new version that was released in March includes the call blocking feature mentioned above. When a victim tries to call the customer service of a bank to stop a fraudulent transaction, the malware blocks that call. Sure, the target can contact the bank in person, using a different handset, or by email. But until that happens, the hackers still have access to that bank account. Currently, Android.Fakebank.B affects users in South Korea and Russia, blocking only phone numbers that belong to banks in these regions. Again, the best way to avoid malware on Android is to stick to downloading only apps from the Google Play store. Monitoring your bank accounts for fraudulent activity on a constant basis might also be a good idea.

Baseball-Major League Baseball roundup

- Mon, 18 Jul 2016 20:42:39 -0400

Former St. Louis Cardinals scouting director Chris Correa was sentenced to 46 months in federal prison for unlawful intrusions into the Houston Astros' database. Correa, who pled guilty to five charges on Jan. 8, must also pay restitution of $279,038.65 to the Astros. - - The last-place Minnesota Twins fired executive vice president/general manager Terry Ryan.

Former Cardinals exec sentenced to prison for hacking Astros

- Mon, 18 Jul 2016 18:46:05 -0400

FILE - In this Jan. 8, 2016, file photo, Chris Correa, the former director of scouting for the St. Louis Cardinals, leaves the Bob Casey Federal Courthouse in Houston. Correa has been sentenced to nearly four years in jail for hacking the Houston Astros' player personnel database. Correa?s sentencing in Houston federal court Monday, July 18, 2016, came after he pleaded guilty in January to five counts of unauthorized access of a protected computer. (AP Photo/Bob Levey, FIle)HOUSTON (AP) ? A federal judge sentenced the former scouting director of the St. Louis Cardinals to nearly four years in prison Monday for hacking the Houston Astros' player personnel database and email system in an unusual case of high-tech cheating involving two Major League Baseball clubs.


Taiwan says foreign suspects arrested over $2 million ATM cyber robbery

- Sun, 17 Jul 2016 11:11:17 -0400

Police in Taiwan said on Sunday they had arrested three out of 16 foreign suspects they believe hacked into the cash machines of a major local bank, withdrawing more than $2 million. A policeman recognized one of the suspects, a Latvian, while he was eating in a restaurant in the northeastern city of Yilan. Police arrested him later, an official of the Taipei City Police Department told a news briefing.

Governors descend on Iowa to focus on policy, not politics

- Thu, 14 Jul 2016 17:53:43 -0400

A women walks through the hall before the start of the National Governors Association meeting, Thursday, July 14, 2016, in Des Moines, Iowa. Half of the nation's governors are expected in Des Moines for the summer meeting, which begins Thursday and runs through Sunday. (AP Photo/Charlie Neibergall)DES MOINES, Iowa (AP) ? For a change, governors will get to see Iowa without campaigning for the White House.


Emirati gets 3-month prison sentence over Instagram insult

- Thu, 14 Jul 2016 08:54:37 -0400

DUBAI, United Arab Emirates (AP) ? A state-owned newspaper in the United Arab Emirates is reporting that an Emirati man has received a three-month prison sentence and a fine after being convicted of insulting his brother on Instagram.

Chinese man to serve U.S. prison term for military hacking

- Thu, 14 Jul 2016 07:07:56 -0400

By Dan Whitcomb LOS ANGELES (Reuters) - A Chinese businessman who pleaded guilty in March to conspiring to hack into the computer networks of Boeing and other major U.S. defense contractors was sentenced on Wednesday to nearly four years in prison, prosecutors said. Su Bin, 51, was charged with taking part in a years-long scheme by Chinese military officers to obtain sensitive military information. In addition to the 46-month prison term, a judge in U.S. District Court in Los Angeles ordered Su to pay a $10,000 fine.

Likely hack of U.S. banking regulator by China covered up: probe

- Thu, 14 Jul 2016 04:33:15 -0400

Photo illustration of a computer mouse illuminated by a projection of a Chinese flagThe report cited an internal FDIC investigation as identifying Beijing as the likely perpetrator of the attacks, which the probe said were covered up to protect the job of FDIC Chairman Martin Gruenberg, who was nominated for his post in 2011. "The committee's interim report sheds light on the FDIC's lax cyber security efforts," said Lamar Smith, a Republican representative from Texas who chairs the House of Representatives Committee on Science, Space and Technology. "The FDIC's intent to evade congressional oversight is a serious offense." The report was released amid growing concern about the vulnerability of the international banking system to hackers and the latest example of how deeply Washington believes Beijing has penetrated U.S. government computers.


Chinese businessman gets nearly 4 years in US hacking case

- Wed, 13 Jul 2016 18:45:21 -0400

LOS ANGELES (AP) ? A Chinese businessman was sentenced to nearly four years in prison Wednesday for conspiring to export sensitive military information to China after accessing the computer systems of U.S. defense contractors, including Boeing.

Chinese government suspected of hacking into FDIC computers

- Wed, 13 Jul 2016 18:25:54 -0400

The Chinese government is believed to have hacked into computers at the Federal Deposit Insurance Corp. in 2010, 2011 and 2013, including the workstation of then-FDIC Chair Sheila Bair, a congressional ...

The stupidest ransomware for Windows is also the most dangerous

- Wed, 13 Jul 2016 18:00:02 -0400

Ransomware is a real problem for many institutions and consumers who do not know how to protect their PCs while surfing the web. Ransomware apps lock certain files on a computer with encryption, making them inaccessible until the target pays a ransom, usually in virtually untraceable Bitcoin. The scam is very lucrative for some hackers, who usually restore access to temporarily encrypted files as soon as a computer owner pays the fee, and these ransomware apps aren?t exactly easy to code. Ranscam is one such example of a badly executed ransomware app. But because it?s a bad type of malware, it?s also the worst Windows infection you can currently get. MUST SEE:  Look at this new leaked photo and tell me which phone is hotter than the iPhone 7 "You must pay 0.2 Bitcoins to unlock your computer,? a warning message says after a computer is infected with Ranscam. ?Your files have been moved to a hidden partition and crypted. Essential programs in your computer have been locked and your computer will not function properly. Once your Bitcoin payment is received your computer and files will be returned to normal instantly." That sounds like your average ransomware message, but security researchers from Cisco Talos told Ars Technica this isn?t your typical malware threat. The malware app deletes everything on your computer. It doesn't encrypt anything either. You can?t pay to get the decryption key and restore access to your files. Even if you try to pay, you?ll simply get an error message. But what?s clear is that your files are going to be deleted no matter what. The messages these hackers present on screen come from web addresses traced to a server hosted in California and are retrieved ?through an unprotected, unencrypted, unobfuscated" HTTP request. The malware was discovered on a small number of computers, and it?s not clear how these computers were infected. Usually, ransomware is delivered via phishing attacks, but Ranscam isn?t widespread enough to determine how it?s being delivered. Researchers tried to reach the amateur creators of the program, but the hackers just sent back an email explaining how an affected customer can buy and transfer Bitcoin. If you?ve been affected by this silly, yet very dangerous Windows malware, you can still try to recover the deleted files using specialized software, or by enlisting the help of a company that can do it for you. If you perform regular backups of your hard drive, you should be fine.

Los Angeles woman sentenced in global cybercrime scam

- Wed, 13 Jul 2016 08:03:07 -0400

GULFPORT, Miss. (AP) ? A woman from Los Angeles has been sentenced for her role in global cybercrime schemes uncovered after a Mississippi woman reported she'd been scammed.

Taiwan seeks two Russian suspects in $2 million ATM malware heist

- Wed, 13 Jul 2016 05:30:56 -0400

Taiwanese First Bank automated teller machines are seen suspended after T$70 million was reported stolen from its automated teller machines (ATM) in TaipeiBy Faith Hung TAIPEI (Reuters) - Taiwan investigators suspect two Russian nationals hacked into a major domestic bank's ATMs last weekend, using malware to withdraw more than $2 million from dozens of machines in the country's first recorded case of its kind. Combining cybercrime with daylight robbery after a typhoon battered greater Taipei, the suspects may have used a cellphone to trigger 41 First Bank ATMs to dispense fat wads of bills, investigators said on Wednesday. In each case, the still-at-large suspects took the money and left quickly, filmed on close-circuit TV cameras.


FCA to offer rewards to hackers who help it find security flaws

- Wed, 13 Jul 2016 00:10:16 -0400

Sergio Marchionne, CEO of Fiat Chrysler, speaks at the North American International Auto Show in DetroitFiat Chrysler Automobiles NV will offer rewards of as much as $1,500 to ethical hackers who tell the auto maker about data security weaknesses in its vehicles, the company said. FCA's move comes a year after independent cybersecurity researchers used a wireless connection to turn off a Jeep Cherokee's engine. The hack, reported in Wired Magazine, alarmed auto makers and regulators, and it led FCA to recall 1.4 million vehicles to prevent the use of a wireless connection to gain control of the vehicle.


Fiat Chrysler offers hackers bounty to report cyber threats

- Wed, 13 Jul 2016 00:03:29 -0400

DETROIT (AP) ? Fiat Chrysler is turning to weekend car tinkerers and good-guy hackers to expose software vulnerability in its cars and trucks.