IANS Blog RSS Feed

http://www.iansresearch.com

Uber Data Breach May Affect Thousands of Drivers

- Mon, 02 Mar 2015 00:00:00 GMT

Add Uber to the growing list of companies impacted by significant breaches in the past few years. The ride-hailing service announced late last week that the personal information of up to 50,000 drivers may have been accessed by an unauthorized third party in a database breach last year. 

Anthem: Breach Could Include Millions of Non-Customers

- Wed, 25 Feb 2015 00:00:00 GMT

The more information that trickles out about the Anthem cyberbreach, the worse it looks. The health insurance provider said this week that between 8.8 million and 18.8 million non-customers may have been affected by the attack.

Report: US, UK Hacked SIM Card Maker to Spy on Mobiles

- Fri, 20 Feb 2015 00:00:00 GMT

Is the NSA spying on your mobile calls? According to a new report, one of the world?s largest manufacturers of mobile SIM cards fell victim to a hack by U.S. and U.K. intelligence agencies that successfully stole encryption codes and enabled them to eavesdrop on mobile voice and data calls made by mobile users in 85 countries.

Anthem Breach Cost Likely to Exceed $100 Million

- Fri, 13 Feb 2015 00:00:00 GMT

So much for its hefty $100 million cyber-insurance policy. Health insurance provider Anthem says its breach, which affected as many as 80 million customers, employees and investors, could cost far more than that when all is said and done.

Health Insurer Hack Exposes Personal Data on 80 Million Users

- Thu, 05 Feb 2015 00:00:00 GMT

Another day, another high-profile breach. Anthem announced it fell victim to what it terms a ?very sophisticated external cyber-attack? that successfully stole personal information from 80 million current and former members, as well as employees.

Germany Considers Scrapping the EU-US Safe Harbor

- Tue, 27 Jan 2015 00:00:00 GMT

Looks like the NSA?s tapping of Angela Merkel?s cellphone continues to have strong repercussions. Case in point: Germany?s privacy leaders are meeting this week to decide whether the Safe Harbor agreement between the EU and US should be scrapped.

Microsoft, Google at Odds Over Zero-Day Disclosure

- Mon, 12 Jan 2015 00:00:00 GMT

When is the right time to disclose a zero-day vulnerability in a popular piece of software like Windows? Not two days before the patch drops, says Microsoft, which is incensed that Google did just that even though it knew Microsoft?s Patch Tuesday was imminent.

SS7 Flaw Leaves Global Cellphone Network Wide Open to Hacks

- Fri, 19 Dec 2014 00:00:00 GMT

Just about anyone can listen in on anybody?s private cellphone calls and texts. That?s the finding of two German researchers who say security flaws in Signaling System 7 (SS7), a major underpinning of the global cellular network, enable malicious intercepts on a massive scale.

Gingrich: With Sony Hack, US Loses First Cyberwar

- Thu, 18 Dec 2014 00:00:00 GMT

Now that Sony Pictures Entertainment (SPE) has decided to cancel the release of ?The Interview,? the movie that reportedly kicked off the devastating cyber-attack the company is still recovering from, some say the ramifications are far-reaching. In fact, political pundit Newt Gringrich says the decision is proof the U.S. just lost the world?s first cyberwar.

Sony Internal Audit Highlights Critical Infosec Issues Prior to Hack

- Mon, 15 Dec 2014 00:00:00 GMT

Nearly two months before the infamous hack that left Sony dealing with leaked emails and unreleased movies being shared for free, the company?s internal audit outlined a series of infosec issues underscoring just how low a priority security was to the company.

Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

Trojan.Cryptdef!gen8

- Mon, 2 Mar 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.N

- Sun, 1 Mar 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Downloader.Busadom!g1

- Fri, 27 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Infostealer.Predapan

- Fri, 27 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Worm.

Backdoor.Korplug.C

- Fri, 27 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Backdoor.Korplug.C!gm

- Fri, 27 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Downloader.Busadom

- Thu, 26 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Ladocosm

- Thu, 26 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Infostealer.Posteal

- Thu, 26 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.SuspHelpRun

- Tue, 24 Feb 2015 00:00:00 -0800

Risk Level: Very Low.

SONAR.SuspDocRun

- Tue, 24 Feb 2015 00:00:00 -0800

Risk Level: Very Low.

SONAR.Breut!gen1

- Tue, 24 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.Infostealer!g3

- Tue, 24 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.Infostealer!g4

- Tue, 24 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.Infostealer!g5

- Tue, 24 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

SONAR.PUA!AlnadInsta

- Tue, 24 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

W32.Tempedreve.D!inf

- Tue, 24 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Virus, Worm.

Trojan.Bayrob!gen5

- Tue, 24 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Linux.Zorroten

- Mon, 23 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Laziok!gm

- Sun, 22 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Badbar

- Fri, 20 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Downloader.Upatre!gen10

- Thu, 19 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

JS.Bondat

- Thu, 19 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Worm.

Trojan.Spadyra!gen1

- Wed, 18 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Didytak.B

- Wed, 18 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Infostealer.Kegotip

- Tue, 17 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

W32.Fanni

- Tue, 17 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Worm.

Packed.Generic.483

- Tue, 17 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Worm.

Trojan.Grokey

- Tue, 17 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Infostealer.Kegotip!gm

- Tue, 17 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Didytak!gen1

- Mon, 16 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Didytak

- Mon, 16 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Spadoluk

- Mon, 16 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Spadyra

- Mon, 16 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Equdrug

- Tue, 17 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Grayphish

- Tue, 17 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Backdoor.Tripfant

- Tue, 17 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

W32.Wervik

- Tue, 17 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Worm.

OSX.Malcol.2

- Thu, 12 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Boot.Ramnit

- Fri, 13 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Linux.Xnote

- Wed, 11 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Laziok

- Wed, 11 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-0312

- Thu, 12 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-0313

- Thu, 12 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Backdoor.Wensal

- Tue, 10 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2015-0310

- Tue, 10 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Wensal

- Tue, 10 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Mangzamel

- Mon, 9 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomlock!g83

- Tue, 10 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Backdoor.Korplug!gen8

- Tue, 10 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Linux.Xorddos!gen1

- Mon, 9 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Infostealer.Steamfishi

- Sun, 8 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptlock.G!gm

- Fri, 6 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Swifi!gen2

- Sat, 7 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Backdoor.Mivast

- Sat, 7 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

IOS.Xagent

- Thu, 5 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.M

- Thu, 5 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Packed.Generic.477

- Fri, 6 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Worm.

Trojan.Pladofu

- Fri, 6 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Packed.Generic.481

- Wed, 4 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Vulp

- Thu, 5 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Backdoor.Breut!gm

- Mon, 2 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Backtar

- Mon, 2 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Tinba!gm

- Mon, 2 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker!g10

- Sat, 31 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Aybord

- Mon, 2 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

PHP.Ransomcrypt.A

- Mon, 2 Feb 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

Hands-on with the best Android smartwatch that has ever been made

- Mon, 02 Mar 2015 15:24:09 -0500

Coming to MWC 2015 I thought the LG Watch Urbane was going to be the sexiest new wearable device in town, but I soon discovered that was not going to be the case. While the most interesting mobile toys introduced on Sunday came from two of the most important Android smartphone makers in the world, HTC and Samsung, other companies made several announcements as well. Among them, you could easily spot a new wearable device coming out of China ? the Huawei Watch, which might just be the only Android smartwatch you should care about right now. FROM EARLIER: A gorgeous Android Wear smartwatch is about to take on the Apple Watch Getting to see the Huawei Watch is no easy task either,

LG Watch Urbane LTE hands-on: Gorgeous, but a bit bulky

- Mon, 02 Mar 2015 10:20:05 -0500

A few days before the MWC 2015 madness started, LG surprised smartwatch fans by announcing a one of the best-looking smartwatches yet, at least until Huawei?s watch was unveiled: the LG Watch Urbane and its SIM-card carrying cohort, the LG Watch Urbane LTE. After taking the later for a brief stroll at MWC, I can say that it looks and feels good on the wrist, but it?s also a little bulky. Not to mention the fact that it runs on LG?s ?Wearable Platform,? which might take some adjusting to. FROM EARLIER: Hands-on: Sony?s new tablet is a powerful, slim and light Android beast The smartwatch packs a lot of power under the hood, which should be enough for it to perform the kind of tasks you

Police risk losing tech arms race with criminals: Europol

- Mon, 02 Mar 2015 08:36:30 -0500

Austerity and funding cuts threaten to place police at a technological disadvantage against increasingly innovative and high-tech criminal organizations, Europe's policing agency warned on Monday. Europol said criminal gangs had a new array of technological tools at their disposal, ranging from hard-to-trace virtual currencies like Bitcoin to communications systems that allowed organizations to become looser and more decentralized. Scattered crime groups would increasingly do deals in a "virtual criminal underground," carrying out transactions using virtual currencies and leaving little organizational footprint for police to target, Europol said. Last year, the Netherlands said Islamist radicals in Europe were increasingly organizing themselves online, becoming an elusive and decentralized "swarm".

Q&A on Samsung's new mobile pay: Here's what's we know

- Sun, 01 Mar 2015 13:15:45 -0500

JK Shin, CEO of Samsung's mobile division, shows the new Galaxy S6 and S6 Edge, during a Samsung Galaxy Unpacked 2015 event on the eve of this week?s Mobile World Congress wireless show, in Barcelona, Spain, Sunday, March 1, 2015. Samsung unveiled a stylish new flagship phone that ditches its signature plastic design for metal and glass. The South Korean phone manufacturer also unveiled a premium model with a display that curves around the left and right edges so that information can be quickly glanced at on the side. (AP Photo/Manu Fernandez)NEW YORK (AP) ? Last fall, Apple launched Apple Pay, bringing mobile-payment technology to the iPhone. Samsung now wants to get that on Android phones ? at least the ones it makes.


ASML says computer systems briefly compromised, no key data accessed

- Sun, 01 Mar 2015 10:25:11 -0500

ASML's logo is seen on the day of the presentation of the 2011 fourth quarter and annual results in VeldhovenDutch semiconductor equipment maker ASML said on Sunday that it was investigating an unauthorised intrusion into its IT systems, but it had found no evidence that valuable files were accessed. ASML, the world's largest maker of tools for etching out the powerful microchips at the heart of latest-generation smartphones and computer servers, underpins much of the world's technology infrastructure. The company did not say when the breach had taken place, but said ASML staff discovered the break-in soon after it occurred. ASML's clients include all of the world's largest chipmakers, including Intel and Samsung.


Mobile industry tiptoes towards 5G

- Sun, 01 Mar 2015 10:00:42 -0500

SIM cards are reflected on a monitor showing binary digits in this photo illustration taken in SarajevoBy Eric Auchard BARCELONA (Reuters) - Running short of dramatically new phone designs, leaders of the world's wireless industry agree their next big idea is 5G, shorthand for the fifth generation of networks they expect to have up and running by 2020. "It is unclear what the opportunity or weakness that 5G should address is," researchers at GSMA, the global trade group of mobile network operators, said in a report issued in December that punctured some of the more visionary claims for 5G.


A gorgeous Android Wear smartwatch is about to take on the Apple Watch

- Sun, 01 Mar 2015 08:05:54 -0500

What do you get when you try to combine Moto 360?s appealing regular-watch design the Apple Watch?s good looks and sophistication? If you answered LG Watch Urbane, that might indeed have been a good reply at least until a brand new Android Wear smartwatch was spotted in leaks right ahead of its debut at this year?s Mobile World Congress edition. DON?T MISS: Apple Watch vs. Pebble Time: New renders give a fantastic side-by-side comparison Seen initially in marketing materials at the airport in Barcelona, Spain, and then in official introduction videos that were published ahead of their time, the Huawei Watch might just take the best-looking Android Wear wearable crown now that it?s official. To be fair, even though the Moto 360?s design was praised more

China's Huawei enters smartwatch frenzy with round-face models

- Sun, 01 Mar 2015 07:59:11 -0500

Journalists attend the presentation of the Huawei's new smartphone, the Ascend P7, launched by China's Huawei Technologies in ParisChinese telecom equipment maker Huawei [HWT.UL] on Sunday launched its first smartwatch, a round-faced device that works with Android phones, joining a crowded market weeks before the introduction of the highly anticipated Apple Watch. At an event tied to the Mobile World Congress in Barcelona, the firm unveiled its Huawei watch line in classic, business and sporty versions, while at the same time across town, Korea's LG Electronics launched a similar round-faced model. Both are following the lead of Motorola, which has drawn favorable reviews for its more fashion-conscious alternative to the dozens of bulky, square smartwatches that characterized the first generation of these devices. The Huawei Watch is 42 mm in diameter, slightly larger than Motorola's futuristic rival, the Moto 360.


China drops leading tech brands for certain state purchases

- Fri, 27 Feb 2015 01:33:22 -0500

A Cisco logo is seen at its customer briefing centre in BeijingBy Paul Carsten BEIJING (Reuters) - China has dropped some of the world's leading technology brands from its approved state purchase lists, while approving thousands more locally made products, in what some say is a response to revelations of widespread Western cybersurveillance. Others put the shift down to a protectionist impulse to shield China's domestic technology industry from competition. The lists cover smaller-scale direct purchases of technology equipment, and central government bodies can only buy items not on the list as part of a competitive tender process. Chief casualty was U.S. network equipment maker Cisco Systems Inc, which in 2012 counted 60 products on the Central Government Procurement Center's (CGPC) list, but had none left by late 2014, a Reuters analysis of official data shows.


Massive SIM card hack might have been too sophisticated to be caught in time

- Thu, 26 Feb 2015 22:45:24 -0500

A new Snowden leak a few days ago revealed that the NSA and GCHQ conducted a complex hack operation that focused on obtaining the secure encryption keys that protect mobile communications in devices with SIM cards. A subsequent report revealed that the goal of spy agencies might have been a lot bigger, as they may have been hunting for other security keys that would let them deploy spyware on any mobile device with a SIM card inside, and users would have no idea that anything had happened. FROM EARLIER: Gemalto confirms hack, but denies massive SIM keys theft Gemalto acknowledged the hack, but downplayed it, saying it couldn?t have resulted in a mass-theft of SIM card keys. The company also said that

Apple makes nearly eight times as much money as all Android vendors combined

- Thu, 26 Feb 2015 15:40:51 -0500

A new report from Strategy Analytics sheds further light on the state of the smartphone business in the fourth quarter last year, confirming once again the profound effect the iPhone 6 had on the industry. The analytics company revealed that during Q4 2014, Android only managed to capture 11% of the global smartphone profit share, a record-low for Google?s ecosystem, while Apple took home a record-high 89% of all smartphone profits. FROM EARLIER: Is the Galaxy S6 really an iPhone ripoff? Leaked comparison photo lets you be the judge ?Global smartphone operating profit grew 31% annually from US$16.2 billion in Q4 2013 to US$21.2 billion in Q4 2014,?Strategy Analytics Director Linda Sui said. ?Android hardware vendors combined took a record-low 11% global

Senate panel backs Loretta Lynch as attorney general

- Thu, 26 Feb 2015 12:08:12 -0500

Lynch testifies during her Senate Judiciary Committee confirmation hearing to become U.S. attorney general on Capitol Hill in WashingtonBy Lindsay Dunsmuir WASHINGTON (Reuters) - The U.S. Senate Judiciary Committee on Thursday voted to back Loretta Lynch as President Barack Obama's next attorney general, clearing way for her expected confirmation in the full Senate. If confirmed, Lynch would become the first black woman to serve as the nation's top law enforcement official. She would replace Eric Holder, who has held the post since 2009. At her Jan. 28 confirmation hearing, Lynch sought to smooth interactions with Republicans, who have repeatedly clashed with Holder, by emphasizing her determination for a "new and improved" relationship.


Cyber threats expanding, new US intelligence assessment says

- Thu, 26 Feb 2015 11:10:08 -0500

WASHINGTON (AP) ? The U.S. has elevated its appraisal of the cyber threat from Russia, the U.S. intelligence chief said Thursday, as he delivered the annual assessment by intelligence agencies of the top dangers facing the country.

Exclusive: China drops leading tech brands for state purchases

- Wed, 25 Feb 2015 23:26:25 -0500

A Cisco logo is seen at its customer briefing centre in BeijingBy Paul Carsten BEIJING (Reuters) - China has dropped some of the world's leading technology brands from its approved state purchase lists, while approving thousands more locally made products, in what some say is a response to revelations of widespread Western cybersurveillance. Others put the shift down to a protectionist impulse to shield China's domestic technology industry from competition. Chief casualty is U.S. network equipment maker Cisco Systems Inc , which in 2012 counted 60 products on the Central Government Procurement Center's (CGPC) list, but by late 2014 had none, a Reuters analysis of official data shows. Smartphone and PC maker Apple Inc has also been dropped over the period, along with Intel Corp's security software firm McAfee and network and server software firm Citrix Systems .


Lenovo website breached, hacker group Lizard Squad claims responsibility

- Wed, 25 Feb 2015 22:47:53 -0500

People stand under a sign showing the Lenovo company at a computer market in ShanghaiChinese computer and smartphone firm Lenovo Group Ltd said its website was hacked on Wednesday, its second security blemish days after the U.S. government advised consumers to remove software called "Superfish" pre-installed on its laptops. Hacking group Lizard Squad claimed credit for the attacks on microblogging service Twitter. Lenovo said attackers breached the domain name system associated with Lenovo and redirected visitors to lenovo.com to another address, while also intercepting internal company emails. Lizard Squad posted an email exchange between Lenovo employees discussing Superfish.


Gemalto confirms hack, but denies massive SIM keys theft

- Wed, 25 Feb 2015 20:20:04 -0500

Following reports that claimed the NSA and GCHQ may have targeted Gemalto, one of the main phone SIM cards makers, the company revealed that such attacks indeed took place in 2010 and 2011, though the hackers were not able to steal SIM keys, as had been reported by the media. FROM EARLIER: Why the NSA SIM hack might be far more serious than you think Gemalto says that in 2010 and 2011 its network was hit by ?particularly sophisticated intrusions? that are now believed to have been conducted by U.S. and U.K. spy agencies, but the company says the NSA and GCHQ were not actually able to penetrate the secure network where such sensitive SIM data is handled. The company also

NY surveying banks on cyber security defenses

- Wed, 25 Feb 2015 16:06:08 -0500

ALBANY, N.Y. (AP) ? New York financial regulators are considering tougher cyber security requirements for banks to mandate more complex computer sign-ins and certifications from the contractors of their cyber defenses, the state's top regulator said Wednesday.

Hackers controlling millions of PCs disrupted in Europol sweep

- Wed, 25 Feb 2015 15:50:08 -0500

By Anthony Deutsch and Jim Finkle AMSTERDAM/BOSTON (Reuters) - A cybercrime operation that stole banking information by hacking more than 3 million computers in Indonesia, India and other countries has been disrupted by European police with assistance from three technology companies, officials said on Wednesday. Europol's European Cybercrime Centre coordinated the operation out of its headquarters in The Hague, targeting the so-called Ramnit botnet, a network of computers infected with malware. Microsoft Corp and Symantec Corp in dismantling the server infrastructure used by the criminals, Europol said. "The criminals have lost control of the infrastructure they were using," Paul Gillen, head of operations at Europol's cybercrime center, told Reuters.

Exclusive: China drops leading technology brands for state purchases

- Wed, 25 Feb 2015 08:31:33 -0500

A Cisco logo is seen at its customer briefing centre in BeijingBy Paul Carsten BEIJING (Reuters) - China has dropped some of the world's leading technology brands from its approved state purchase lists, while approving thousands more locally made products, in what some say is a response to revelations of widespread Western cybersurveillance. Others put the shift down to a protectionist impulse to shield China's domestic technology industry from competition. Chief casualty is U.S. network equipment maker Cisco Systems Inc , which in 2012 counted 60 products on the Central Government Procurement Center's (CGPC) list, but by late 2014 had none, a Reuters analysis of official data shows. Smartphone and PC maker Apple Inc has also been dropped over the period, along with Intel Corp's security software firm McAfee and network and server software firm Citrix Systems .


EU police operation takes down malicious computer network

- Wed, 25 Feb 2015 07:09:26 -0500

FILE - In this Friday, Jan. 16, 2015 file photo, a man walks past the European police agency Europol in The Hague, Netherlands. The head of European Union police organization Europol said at a meeting on Monday, Feb. 23, 2015 that intelligence and law enforcement agencies across the continent have to co-operate better to fight against the threat of terrorism. (AP Photo/Peter Dejong, File)THE HAGUE, Netherlands (AP) ? European police have taken down a computer network that used malicious software to infect more than 3 million computers worldwide and steal personal data, banking details and passwords.


Why the NSA SIM hack might be far more serious than you think

- Wed, 25 Feb 2015 06:50:42 -0500

A few days ago, a report revealed that spy agencies including the NSA and GCHQ, managed to bypass the security of SIM card manufacturer Gemalto and gain access to valuable encryption keys that protect cellphone signals. Even though Gemalto denied the reports, but The Verge points out that the hack might be more serious than initially believed, as it could give agencies the ability of infecting any phone using these specific SIM cards with additional spyware programs. FROM EARLIER: Bombshell report reveals the NSA has stolen encryption keys for millions of SIM cards Access to these encryption keys do not give governmental agencies only the power to monitor cellular communications, including calls and data, but they also come with additional

US announces reward for accused prolific cyber hacker

- Tue, 24 Feb 2015 20:51:47 -0500

WASHINGTON (AP) ? The U.S. government has announced a $3 million reward for information leading to the arrest of a man American authorities call one of the world's most prolific cyber hackers.

US announces reward for accused prolific computer hacker

- Tue, 24 Feb 2015 20:36:17 -0500

The U.S. government has announced a $3 million reward for information leading to the arrest of a man American authorities call one of the world's most prolific computer hackers. Evgeniy Bogachev, who is ...

Reddit, Google crack down on posting nude pics

- Tue, 24 Feb 2015 20:03:51 -0500

SAN FRANCISCO (AP) ? Reddit and Google are taking a tougher stance against nudity to prevent their services from turning into online peep shows.

How Google Chrome is keeping you safe from malware

- Tue, 24 Feb 2015 19:30:34 -0500

No matter how hard you work to ensure your private data stays safe, it?s impossible to account for every potential security threat, as most recently illustrated by Lenovo?s bizarre adware catastrophe. Thankfully, there are other technology companies that consider security a priority, which is why Google?s latest Safe Browsing expansion is worth highlighting. DON?T MISS: Not even turning off your Android phone can stop this malware from spying on you In order to protect users from downloading malicious software, Google has added an additional warning in Chrome when users visit any webpage where attackers ?might attempt to trick you into installing programs that harm your browsing experience.? This bold, red warning coupled with the dialog box that appears before downloading a program could save

Trial begins in high-profile Silicon Valley sex bias case

- Tue, 24 Feb 2015 19:23:08 -0500

FILE - In this April 4, 2006 file photo, Kleiner Perkins Caulfield and Byers senior partner John Doerr poses for a portrait with partner Ellen Pao outside of their office in Menlo Park, Calif. A jury is set to hear opening arguments this week in a multimillion-dollar sexual harassment lawsuit filed by Pao, currently interim chief of the news and social media site Reddit, against the prominent Silicon Valley venture capital firm. (AP Photo/Marcio Jose Sanchez, File)SAN FRANCISCO (AP) ? A lawyer for a former junior partner suing a venture capital firm in a Silicon Valley sex bias suit contended Tuesday that his client was passed over for promotions because she was a woman and then fired after she complained.


U.S. offers highest-ever reward for Russian hacker

- Tue, 24 Feb 2015 16:02:48 -0500

Handout of Russian national Evengiy Bogachev is shown in this FBI Wanted PosterBy Mark Hosenball WASHINGTON (Reuters) - The U.S. State Department and FBI on Tuesday announced a $3 million reward for information leading to the arrest or conviction of Russian national Evgeniy Bogachev, the highest bounty U.S. authorities have ever offered in a cyber case. The Federal Bureau of Investigation also issued a "Wanted" poster for Bogachev, who is charged in the United States with running a computer attack network called GameOver Zeus that allegedly stole more than $100 million from online bank accounts. Bogachev has been charged by federal authorities in Pittsburgh, Pennsylvania, with conspiracy, computer hacking, wire fraud, bank fraud and money laundering in connection with his alleged role as administrator of GameOver Zeus.


Sony taps Tom Rothman of 'Titanic' fame to head movie studio

- Tue, 24 Feb 2015 15:38:10 -0500

A logo is pictured outside Sony Pictures Studios in Culver CityBy Mary Milliken and Eric Kelsey LOS ANGELES (Reuters) - Sony Pictures Entertainment on Tuesday named veteran film executive Tom Rothman, a force behind all-time top-grossing blockbusters "Titanic" and "Avatar," to head its movie studio in a shuffle prompted by the fallout from a cyberattack. Rothman, 60, takes over for Amy Pascal, who suffered public embarrassment after hackers leaked emails she had written to other Hollywood executives. Rothman, who brings expertise in both blockbusters and art-house films, will probably push for more franchise development as he did at Fox, where he launched the "X-Men," "Planet of the Apes" and "Ice Age" movies. Rothman was known for financial discipline when he co-led Fox Filmed Entertainment from 2000-2012.


Hackers snap up Burning Man passes, leaving many ticketless

- Tue, 24 Feb 2015 13:29:50 -0500

SAN FRANCISCO (AP) ? Someone hacked into Burning Man's website and snapped up the first batch of tickets to the summer festival.

Home Depot sales beat estimates; warns on currency

- Tue, 24 Feb 2015 10:40:25 -0500

A shopping cart is seen in a Home Depot location in NilesChairman and Chief Executive Craig Menear said if the U.S. dollar stays at current levels the company expects a negative impact of $1 billion to 2015 sales growth and a hit to earnings of 6 cents a share for the year. Home Depot shares were up 3 percent at $115.67 in midmorning after rising as much as 5 percent. Earlier on Tuesday, luxury home builder Toll Brothers Inc reported a higher-than-expected quarterly profit and raised the low end of its full-year home delivery forecast as housing demand strengthened. U.S. homebuilders remain upbeat about market conditions, according to a survey by the National Association of Home Builders published last week.


NSA chief declines comment on spyware reports, says programs lawful

- Mon, 23 Feb 2015 18:14:33 -0500

National Security Agency (NSA) Director Michael Rogers testifies before a House (Select) Intelligence Committee hearingBy Warren Strobel WASHINGTON (Reuters) - The head of the National Security Agency refused to comment on Monday on reports that the U.S. government implants spyware on computer hard drives for surveillance purposes, saying "we fully comply with the law." U.S. Navy Admiral Michael Rogers was responding to reports that the NSA had embedded spyware in computers on a vast scale and that along with its British counterpart, had hacked into the world's biggest manufacturer of cellphone SIM cards. Former NSA operatives told Reuters the agency was behind the campaign. Another report, based on documents provided by former NSA contractor Edward Snowden and published by the Intercept site, said the U.S. agency and its British counterpart hacked into Gemalto, which produces SIM cards. I don't have time." Even as he declined comment on the reports of aggressive NSA operations, Rogers argued that U.S. intelligence, along with law enforcement agencies, needs the legal means to break strong encryption increasingly built into operating systems such as those of Apple or Google.


Target slices free-shipping minimum in half to $25

- Mon, 23 Feb 2015 15:30:59 -0500

Target has sliced its minimum online purchase to qualify for free shipping in half to $25 as the Internet becomes a bigger and bigger sales hub for retailers. The minimum takes aim at competitors Wal-Mart ...

Lenovo?s adware disaster is even worse than we thought

- Mon, 23 Feb 2015 14:45:21 -0500

News broke late last week that Lenovo had been shipping laptops with man-in-the-middle adware preinstalled which could hijack HTTPS traffic and insert its own ads onto websites that users were visiting. This major security threat was initially found lurking in just two pieces of software on Lenovo?s computers, but the number rose dramatically over the weekend as Ars Technica reports security researchers discovered more applications riddled with adware. As of Sunday, at least 14 applications have been found to use the technology which puts users at risk. READ MORE: Microsoft just nuked Lenovo?s adware so you hopefully don?t have to ?What all these applications have in common is that they make people less secure through their use of an easily obtained root CA , they provide little information

Connecticut taxpayer refunds delayed by fraud verification

- Mon, 23 Feb 2015 12:31:41 -0500

Some Connecticut taxpayers might receive income tax refunds a few weeks later than expected as state revenue officials verify that fraudulent returns are not being submitted. Kevin Sullivan, commissioner ...

Europol chief says more cooperation needed to counter terror

- Mon, 23 Feb 2015 12:10:54 -0500

FILE - In this Monday, Feb. 4, 2013 file photo, Europol's director Rob Wainwright answers questions during an interview in The Hague, Netherlands. Wainwright said at a meeting on Monday, Feb. 23, 2015 that intelligence and law enforcement agencies across the continent have to co-operate better to fight against the threat of terrorism. (AP Photo/Peter Dejong, File)THE HAGUE, Netherlands (AP) ? Intelligence and law enforcement agencies across the European Union have to cooperate better to fight against the threat of terrorism, the head of EU police organization Europol said Monday.


5 old-school smartphones that are still awesome to use, according to Android fans

- Mon, 23 Feb 2015 11:35:30 -0500

The life of a smartphone is typically very short and it seems like even the hottest Android phone will seem obsolete after only a year. With this in mind, members of Reddit?s Android community have put together a list of Android phones that have stood the test of time and are still great to use. We?ve listed the top results below by the number of up votes they received. DON?T MISS: HTC One M9: New leak includes images, specs and everything else you need to know Samsung Galaxy S III The Galaxy S III is the top choice here and with good reason. This was Samsung?s breakthrough hit phone that propelled the company to the top of the Android smartphone world.

Kirk Cameron, Cameron Diaz rake in 'worst achievement' Razzies

- Sat, 21 Feb 2015 23:08:22 -0500

Cast members Diaz poses on the red carpet to promote the movie "Sex Tape" in BerlinBy Mary Milliken LOS ANGELES (Reuters) - Former child star Kirk Cameron tried "Saving Christmas," but he more likely killed a career comeback with the movie that ruled at this year's Razzies, the awards for the worst achievement in film. Cameron, 44, was declared the big winner at Saturday night's 35th Golden Raspberry Awards ceremony, taking four of the six categories in which he and his Christian family comedy "Saving Christmas" were nominated: worst picture, worst actor, worst screenplay and worst screen combo - for him and his ego.


Superfish points fingers over ad software security flaws

- Sat, 21 Feb 2015 16:55:19 -0500

FILE - In this Aug. 15, 2013 file photo, people walk past a Lenovo flagship experience store in Beijing, China. Security researchers revealed Thursday, Feb. 19, 2015, that some computers sold by China?s Lenovo, the world?s biggest PC maker, had a major security hole that would let any garden-variety hacker impersonate shopping, banking and other websites and steal users' credit card numbers and other personal data. (AP Photo/Andy Wong, File)SAN FRANCISCO (AP) ? A little-known Silicon Valley startup was caught in a firestorm of criticism this week for making software that exposed Lenovo laptop users to hackers bent on stealing personal information. But Superfish Inc. has also won praise for producing visual search technology that many see as the next big thing in online shopping.


Illinois police department paid $500 ransom to hacker

- Sat, 21 Feb 2015 15:36:25 -0500

A suburban Chicago police department paid a hacker a $500 ransom to restore access to data on a police computer that the hacker had disabled through the use of an increasingly popular type of virus. The ...

Snowden leak: NSA helped British steal cell phone codes

- Fri, 20 Feb 2015 07:31:05 -0500

In this June 6, 2013, file photo, a sign stands outside the National Security Administration (NSA) campus in Fort Meade, Md. Britain's electronic spying agency, in cooperation with the NSA, hacked into the networks of a Dutch company to steal codes that allow both governments to seamlessly eavesdrop on mobile phones worldwide, according to the documents given to journalists by Edward Snowden. (AP Photo/Patrick Semansky, File)WASHINGTON (AP) ? Britain's electronic spying agency, in cooperation with the U.S. National Security Agency, hacked into the networks of a Dutch company to steal codes that allow both governments to seamlessly eavesdrop on mobile phones worldwide, according to the documents given to journalists by Edward Snowden.