IANS Blog RSS Feed

http://www.iansresearch.com

Microsoft, Google at Odds Over Zero-Day Disclosure

- Mon, 12 Jan 2015 00:00:00 GMT

When is the right time to disclose a zero-day vulnerability in a popular piece of software like Windows? Not two days before the patch drops, says Microsoft, which is incensed that Google did just that even though it knew Microsoft?s Patch Tuesday was imminent.

SS7 Flaw Leaves Global Cellphone Network Wide Open to Hacks

- Fri, 19 Dec 2014 00:00:00 GMT

Just about anyone can listen in on anybody?s private cellphone calls and texts. That?s the finding of two German researchers who say security flaws in Signaling System 7 (SS7), a major underpinning of the global cellular network, enable malicious intercepts on a massive scale.

Gingrich: With Sony Hack, US Loses First Cyberwar

- Thu, 18 Dec 2014 00:00:00 GMT

Now that Sony Pictures Entertainment (SPE) has decided to cancel the release of ?The Interview,? the movie that reportedly kicked off the devastating cyber-attack the company is still recovering from, some say the ramifications are far-reaching. In fact, political pundit Newt Gringrich says the decision is proof the U.S. just lost the world?s first cyberwar.

Sony Internal Audit Highlights Critical Infosec Issues Prior to Hack

- Mon, 15 Dec 2014 00:00:00 GMT

Nearly two months before the infamous hack that left Sony dealing with leaked emails and unreleased movies being shared for free, the company?s internal audit outlined a series of infosec issues underscoring just how low a priority security was to the company.

POODLE Bug Returns via TLS

- Fri, 12 Dec 2014 00:00:00 GMT

The POODLE bug that made the rounds a couple of weeks ago is coming back to bite some organizations again. While the original POODLE affected only SSL Version 3, now researchers say certain TLS implementations are vulnerable, too.

Hackers Target Firms to Gain Stock Market Edge

- Tue, 02 Dec 2014 00:00:00 GMT

FireEye reports a new group of hackers is taking insider trading to a new level. The security firm says it uncovered a scheme where hackers infiltrate top-level executives? email to gain a market edge in the health care/pharmaceuticals space.

FBI Warns of Destructive Malware in Wake of Sony Attack

- Tue, 02 Dec 2014 00:00:00 GMT

Could this be the first U.S.-based Shamoon? The FBI is warning U.S. businesses about an especially destructive Shamoon-like malware in the wake of an attack on Sony Pictures Entertainment last week.

Symantec: Regin Malware Has Been Spying on Companies Since 2008

- Mon, 24 Nov 2014 00:00:00 GMT

Symantec has uncovered an advanced piece of malware, perhaps developed by a nation state, that has been spying on a variety of companies across Russia and Saudi Arabia since 2008.

NSA: China, Others Are Able to Take Down the US Power Grid

- Fri, 21 Nov 2014 00:00:00 GMT

Finally, the NSA goes public with what many in the infosec industry already knew. NSA Director Adm. Michael Rogers publicly admitted China and two or three other countries now have the capacity to mount cyber-attacks capable of shutting down the U.S. electrical grid and other critical systems.

Russian Hackers Take Over UK Webcams

- Thu, 20 Nov 2014 00:00:00 GMT

Could this be the first big attempt at compromising the Internet of Things (IoT)? The UK is warning users that a group of Russian hackers has taken control of various webcams and closed circuit TV feeds in the country, including home baby monitors.

Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

Packed.Generic.476

- Fri, 23 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Cridex

- Fri, 23 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Backdoor.Ratenjay.C

- Sat, 24 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus.

Packed.Generic.475

- Wed, 21 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus.

Downloader.Chanitor!gm

- Wed, 21 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

W32.Tempedreve.B!inf

- Tue, 20 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Virus, Worm.

W32.Tempedreve.A!inf

- Sun, 4 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Virus, Worm.

Trojan.Ransomlock!g78

- Wed, 21 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Downloader.Ponik!gen12

- Mon, 19 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Downloader.Upatre!gen7

- Tue, 20 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Infostealer.Kwerti

- Sun, 18 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Infostealer.Kwerti!g1

- Sun, 18 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Linux.Shelldos

- Sun, 18 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Shelldos

- Sun, 18 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Backdoor.Straxbot!g1

-

Risk Level: Very Low. Type: Trojan.

Infostealer.Kronbank

- Sat, 17 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

W32.Ramnit.B!gen3

- Fri, 16 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Virus, Worm.

Exp.CVE-2014-8448

- Thu, 15 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2014-8451

- Thu, 15 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2014-9163

- Thu, 15 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Backdoor.Winnti!gen2

- Tue, 13 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Backdoor.Winnti!gen3

- Tue, 13 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Backdoor.Bipfam!gen1

- Thu, 8 Jan 2015 00:00:00 -0800

Risk Level: Very Low.

Backdoor.Bipfam!gen2

- Tue, 13 Jan 2015 00:00:00 -0800

Risk Level: Very Low.

Trojan.Skelky

- Tue, 13 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Packed.Generic.480

- Wed, 14 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Linux.Wifatch

- Mon, 12 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Linux.Ballpit

- Mon, 12 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Worm.

Android.Coolreaper

- Mon, 12 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Packed.Generic.473

- Sat, 10 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker!g9

- Sat, 10 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Linux.Xorddos

- Thu, 8 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomlk.AK!g2

- Wed, 7 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Android.Poisoncake

- Tue, 6 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

W97M.Downloader.A

- Tue, 6 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

OSX.Malcol

- Mon, 5 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.L

- Mon, 5 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.P

- Mon, 5 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Downloader.Chanitor

- Sat, 3 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

W32.Tempedreve!gm

- Sat, 3 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Worm.

Exp.CVE-2014-6330

- Sat, 3 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2014-6327

- Sat, 3 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2014-6366

- Sat, 3 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2014-6369

- Sat, 3 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2014-6373

- Sat, 3 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2014-6376

- Sat, 3 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2014-8966

- Sat, 3 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2014-8967

- Sat, 3 Jan 2015 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Android.Badaccents

- Wed, 31 Dec 2014 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

W32.Tempedreve

- Wed, 31 Dec 2014 00:00:00 -0800

Risk Level: Very Low. Type: Virus, Worm.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

Tributes to Saudi King spark rights criticism in Britain

- Sat, 24 Jan 2015 12:43:48 -0500

As world leaders flew to Saudi Arabia to mark the death of King Abdullah, several prominent British politicians criticized the deference shown to the leader of a country accused of having a poor human rights record. Human rights campaigners and politicians from different parties questioned why the Union flag had been flown at half mast on public buildings including Westminster Abbey, for the leader of a country which still has the death penalty. Saudi Arabia's King Abdullah bin Abdulaziz, who died early on Friday after a short illness, had pursued a modernizing legacy of cautious social and economic reform.

How to set up a VPN on Android ? and why you should do it right now

- Fri, 23 Jan 2015 11:40:21 -0500

How to set up a VPN on Android ? and why you should do it right nowSurfing the web privately is something many web users are interested in, whether they?re doing it on a desktop, laptop or mobile device, but not many people know how to do it. Recently, a detailed WhoIsHostingThis infographic showed you how to secure your connection using a VPN ? a virtual private network created on top of a public network to anonymize web traffic ? on Windows, Mac and iOS, assuming the user already has access to a VPN service. Phone Arena has put together a similar step-by-step guide of enabling VPN connectivity on Android devices. FROM EARLIER: How to set up a VPN ? and why you should, if you care about privacy In addition to securing data transmission against


'Anonymous' hacking member sentenced in Texas to 5 years in prison

- Thu, 22 Jan 2015 18:57:53 -0500

By Marice Richter DALLAS (Reuters) - A freelance journalist who said he was a top player in the hacking group Anonymous was sentenced to just over five years in prison by a federal judge in Dallas on Thursday for charges including aiding in cyber crime. The judge sentenced Barret Brown to 63 months in prison, including the 31 months he has already served. Brown, 33, pleaded guilty in April to being an accessory after the fact for attempting to assist a hacker, hiding two computers from FBI agents who were executing a search warrant and threatening an FBI agent in a video. The accessory after the fact charge relates to an incident in December 2011 when someone Brown knew as "o" hacked the computer network of Austin, Texas-based private intelligence firm Stratfor and obtained confidential information, including credit card details, according to court papers.

Israeli man under house arrest for leaked Madonna songs

- Thu, 22 Jan 2015 18:48:47 -0500

JERUSALEM (AP) ? An aspiring singer who auditioned for Israel's top TV song competition was placed under house arrest Thursday on suspicion of hacking into international pop star Madonna's computer and stealing and selling unreleased songs, his lawyer said.

Writer tied to Anonymous hackers sentenced to prison

- Thu, 22 Jan 2015 16:38:37 -0500

DALLAS (AP) ? An activist and writer linked to the hacking collective Anonymous was sentenced to five years in prison Thursday for threatening an FBI agent and helping share stolen data, marking the end of a criminal case criticized by free-speech advocates.

6 beastly phones you can buy for less than $400

- Thu, 22 Jan 2015 13:15:21 -0500

6 beastly phones you can buy for less than $400The iPhone 6 and the iPhone 6 Plus might be the best-selling phones currently available in stores, but there are also plenty of other†options available for smartphone buyers looking to get a powerful mobile device at†a fraction of the iPhone 6?s cost. Forbes has put together a list of six handsets that can be purchased right now, or that?ll be available in the near future, for far less than either iPhone 6 version. FROM EARLIER: The 5 coolest phones unveiled at CES 2015 At $399, the Huawei Honor 6 Plus is a 5.5-inch Android handset that features a Full HD display, 3GB of RAM, three 8-megapixel cameras (one on the front and two on the back) and a 3,600 mAh


Kenya weighs Chinese request for extradition of 76 held for cyber crime

- Thu, 22 Jan 2015 09:05:28 -0500

A map of China is seen through a magnifying glass on a computer screen showing binary digits in SingaporeKenya is considering a request from Beijing to extradite 76 Chinese nationals charged with cyber crime for trial in their homeland, Kenya's attorney-general said on Thursday. Githu Muigai said he expected a decision soon on the request from a "friendly government" with which Kenya has strong trade and industrial ties. Some 76 Chinese nationals have been detained by Kenyan police investigating allegations of cyber crime, operating private radio services and being in the country illegally, their lawyers said on Dec. 5. Any agreement would have to meet Kenya's justice standards, he said, adding their alleged criminality involved "the security of banking, credit cards and other operations".


Saudi Arabia to delay activist's flogging for second time: Amnesty

- Thu, 22 Jan 2015 08:24:28 -0500

Saudi Arabia plans to delay the public flogging of a rights activist on medical grounds, Amnesty International said on Thursday, raising the possibility that Riyadh may be trying to quietly drop the punishment that has drawn international rebuke. Badawi, a blogger and founder of the "Free Saudi Liberals" website, was sentenced last year to 10 years in jail, a fine of 1 million riyals ($267,000) and 1,000 lashes. He was arrested in June 2012 for offences which included of insulting Islam, cyber crime and disobeying his father - a crime in Saudi Arabia. Badawi was subjected to the first 50 lashes two weeks ago but a second round of flogging, scheduled to be held last Friday after Friday prayers was postponed, ostensibly on medical grounds.

Israel's mobile technologies for disabled find mass market appeal

- Thu, 22 Jan 2015 06:53:28 -0500

By Tova Cohen TEL AVIV (Reuters) - Israeli technology firms catering to the country's disabled war veterans are exploring ways to bring their innovations to the mass market with applications that make mobile phones easier to use. Israel, with its thriving start-up scene and large number of military veterans, is a natural incubator of technology for the disabled, some of which is proving useful to able bodied users as well. "That's the secret sauce to go to scale," said Andrew Johnson, an analyst with market research firm Gartner Inc. A phone for the blind developed by Project Ray also allows drivers to operate a device without taking their eyes off the road, while Sesame Enable's hands-free phone, crucial for paralysed users, offers convenience to all. Alexander Graham Bell's invention of the telephone grew out of work on hearing and speech products for the deaf, while Thomas Edison envisaged the phonograph as a means of recording books for the blind.

You can finally stream ?The Interview? on Netflix beginning Saturday

- Wed, 21 Jan 2015 20:30:08 -0500

You can finally stream ?The Interview? on Netflix beginning SaturdayNetflix absolutely crushed its earnings on Tuesday evening and shares skyrocketed more than 17% in after-hours trading as a result. The company added†4.33 million new streaming subscribers during the fourth quarter of 2014, and profit climbed to†$83.4 million, up from†$48.4 million in the year-ago quarter.†Netflix had a great quarter indeed, and it was thanks in large part to some great new content that hit the service over the course of the three-month period. Now, the company has confirmed that another high-profile title will finally arrive on its digital shelves in just a few short days. Sorry, North Korea. DON?T MISS:†Every movie and TV show being removed from Netflix in February Netflix announced on Tuesday evening that ?The Interview? will finally


F5 Networks revenue misses estimates as big deals slow down

- Wed, 21 Jan 2015 18:33:12 -0500

Network equipment maker F5 Networks Inc reported revenue that missed Wall Street's estimates for the first time in eight quarters due to "a marked decrease in the number of deals greater than $1 million". The company also forecast current-quarter revenue and profit below market estimates, sending its shares down nearly 16 percent to $106 in extended trading. "(F5's) U.S. business was well below forecast and that's really surprising because the U.S end markets, the enterprise end markets are very robust," Needham & Co analyst Alex Henderson said. Henderson said F5's results were not a reflection of what rivals such as Juniper Networks Inc and Riverbed Technology Inc would report for the last quarter of the year.

4chan founder to retire from site he started at age 15

- Wed, 21 Jan 2015 15:16:20 -0500

NEW YORK (AP) ? The founder of the popular, if at times notorious, online message board 4chan is retiring as the site's administrator.

Kenya gov't considers request to repatriate Chinese hackers

- Wed, 21 Jan 2015 09:19:21 -0500

NAIROBI, Kenya (AP) ? The Kenyan government is considering a request by the Chinese government to repatriate 76 Chinese nationals arrested in Kenya for hacking, an official said Wednesday.

With few friends in Congress, Obama looks to shape next election

- Wed, 21 Jan 2015 08:15:59 -0500

U.S. President Obama is applauded by Vice President Biden during State of the Union address to a joint session of Congress on Capitol Hill in WashingtonBy Andy Sullivan WASHINGTON (Reuters) - President Barack Obama's vision of a stronger and more expensive safety net for middle class and poor Americans stands little chance of becoming law this year, but it could shape the debate for the 2016 election. With his clout fast diminishing in Washington, and Republican and Democratic candidates gearing up for the White House race, Obama did his best in Tuesday's State of the Union address to set the agenda for potential successors wooing voters. Already, potential Republican candidates like Rand Paul and Mitt Romney have signaled that they will devote more attention to helping the less affluent. Hillary Clinton, the likely frontrunner for the Democratic nomination, is already facing heat from Massachusetts Senator Elizabeth Warren and others on the left, who worry Clinton may bow to pressure from Wall Street and chip away at financial reforms enacted during Obama's tenure.


Apple?s latest acquisition could make Beats Music even better

- Wed, 21 Jan 2015 07:30:21 -0500

Apple?s latest acquisition could make Beats Music even betterApple revolutionized the music industry with the iPod and iTunes, but leadership is cyclical and the company fell behind the times as streaming music services like Pandora and Spotify grew more popular. iTunes Radio†was Apple?s first real attempt to bring music streamers back to the Apple camp, but it apparently didn?t have quite the impact Apple was looking for? so it bought Beats for $3 billion. Now, Apple has made a new acquisition ? a much smaller one, this time ? that will reportedly become an important part of the company?s Beats Music streaming service. DON?T MISS:†Edward Snowden says secret Apple spyware is the reason he won?t use an iPhone According to†a report from The Guardian on Wednesday, Apple has


French newspaper Le Monde says Twitter account hacked

- Wed, 21 Jan 2015 06:28:42 -0500

An aerial view shows the facade of the French daily evening newspaper Le Monde offices in Paris(Reuters) - French newspaper Le Monde said its Twitter account and publishing tool were hacked by Syrian Electronic Army, an amorphous hacker collective that supports Syrian President Bashar al-Assad. Le Monde sent out a tweet saying it has taken back control of its computers. "We apologize for any fraudulent posts on our behalf." A Twitter Inc spokesman in France said the company did not comment on individual accounts for privacy and security reasons. Representatives at "Le Monde" declined to comment.


China's Dalian Wanda buys 20 pct of Spain's Atletico Madrid

- Wed, 21 Jan 2015 05:10:11 -0500

* Property giant agrees to pay 45 mln euros * Deal to help Dalian diversify, expand in entertainment * Indebted Atletico could gain China sponsors through deal (Adds comment from Atletico CEO) By Matthew Miller BEIJING, Jan 21 (Reuters) - China's biggest property conglomerate, Dalian Wanda Group Co, has bought 20 percent of Spanish soccer champions Atletico Madrid for 45 million euros ($52 million), becoming the first Mainland company to invest in a premier European club. ...

Obama says US vulnerable to cyberthreats without new steps

- Tue, 20 Jan 2015 21:57:37 -0500

President Barack Obama is warning that the U.S. and its economy will be left vulnerable unless Congress acts to prevent hacking. Obama is calling for cybersecurity legislation in his State of the Union ...

Government health care website quietly sharing personal data

- Tue, 20 Jan 2015 17:58:53 -0500

In this April 26, 2014, file photo, Sen. Orrin Hatch, R-Utah speaks in Sandy, Utah. Two senior Republican senators are demanding the Obama administration provide Congress with records detailing the payment of Social Security benefits to suspected Nazi war criminals. In letters to be publicly released Tuesday, Sens. Chuck Grassley of Iowa and Orrin Hatch of Utah cited an Associated Press investigation published in October that revealed millions of dollars in benefits have been paid to dozens of former Nazis who were forced out of the United States. (AP Photo/Rick Bowmer, File)WASHINGTON (AP) ? The government's health insurance website is quietly sending consumers' personal data to private companies that specialize in advertising and analyzing Internet data for performance and marketing, The Associated Press has learned.


Sony's 'The Interview' surpasses $40 million in digital sales

- Tue, 20 Jan 2015 14:24:40 -0500

Dennis Lavalle holds a ticket and a poster of the film "The Interview" starring actors Seth Rogen and James Franco as he attends the Christmas Day screening of "The Interview" in the Van Nuys section of Los AngelesLOS ANGELES (Reuters) - "The Interview," the Sony Pictures comedy believed to have triggered a cyber attack on the studio, has racked up over $40 million in sales from 5.8 million digital downloads, the studio said on Tuesday. Michael Lynton, chief executive of Sony Corp's entertainment arm, called the $40 million mark "a significant milestone" for the studio's unprecedented online and pay television release, on platforms such as Google Inc's Google Play, Apple Inc's iTunes and Time Warner Cable. The film's digital release on Dec. 24 was cobbled together a week after Sony Pictures shelved a wide release when major theater chains refused to screen the movie due to unspecified threats of violence from hackers. President Barack Obama called the decision to scrap the theatrical release a "mistake" akin to self-censorship.


American who sent $67K to al-Qaida gets 15 years in prison

- Tue, 20 Jan 2015 14:20:32 -0500

NEW YORK (AP) ? A New Yorker who sent $67,000 to al-Qaida and pledged his support to the terror group was sentenced Tuesday to 15 years in prison by a judge who cited the defendant's remorse and medical problems that make his incarceration more difficult than others'.

10 awesome paid iPhone apps that are all free downloads right now

- Tue, 20 Jan 2015 11:44:42 -0500

10 awesome paid iPhone apps that are all free downloads right nowYesterday?s list of paid iPhone and iPad apps that were on sale for free was a great one, and it was highlighted by the controversial app Neato that Apple had previously thrown out of the app store. Neato is still free along with several other apps on that list, by the way, so you might want to follow this link and snag them before you?re too late. Today, however, we have a fresh new batch of iOS apps that are normally paid but are all on sale for free for a limited time. DON?T MISS:†Edward Snowden says secret Apple spyware is the reason he won?t use an iPhone These are paid iPhone and iPad apps that have been made available


Edward Snowden says secret Apple spyware is the reason he won?t use an iPhone

- Tue, 20 Jan 2015 10:46:01 -0500

Edward Snowden says secret Apple spyware is the reason he won?t use an iPhoneIs†Apple?s wildly popular iPhone series hiding spyware that can collect information about users without their knowledge. As thoroughly as developers have dug through Apple?s iOS code over the past seven and a half years, one would think functionality like that would have been unearthed by now. According to NSA whistleblower Edward Snowden, however, iPhones are capable of activating ?special software? behind the scenes that collects information about users, who are completely oblivious to the fact that their phones are gathering†this sensitive data. DON?T MISS:†This great iPhone app squeezes an entire music player into one iOS widget, and it?s free Edward Snowden?s lawyer Anatoly Kucherena recently spoke with Russian news agency†RIA Novosti, and their conversation spanned several topics. As Russian news


These are the 25 best passwords you can use? if you want to be hacked

- Tue, 20 Jan 2015 08:50:39 -0500

These are the 25 best passwords you can use? if you want to be hackedMalicious hackers spend much†of their time developing sophisticated attacks and complex new ways to steal people?s credit card numbers, bank account information and other private data. It?s getting more and more difficult to protect ourselves from these hacks, especially when just about anyone can go online and hire a hacker these days. But for many†people, all of the hard work these hackers put into ruining our lives is a waste of time, because they make things remarkably easy for hackers†by using the worst passwords on the planet. DON?T MISS:†These breathtaking aerial photos show New York at night like you?ve never seen it before Each year, SplashData puts together a list of the 25 most commonly used passwords on the Internet.


Amazon doubles down on entertainment with 'indie' movie bet

- Mon, 19 Jan 2015 19:35:26 -0500

The Amazon.com, Inc. logo is seen on the side of a delivery truck in Brooklyn, New YorAmazon.com Inc is making a high-stakes foray into the challenging realm of independent movies, the latest step in its attempt to move beyond simply distributing digital entertainment content to creating it. Amazon said on Monday it was aiming to produce close to 12 movies a year for theatrical release which would then be available on its Prime video service within two months, significantly faster than the roughly one-year wait it normally faces to stream Hollywood releases. Amazon expects to focus on "indie" movies with budgets of between $5 million and $25 million, spokeswoman Sally Fouts said. While modest compared with Hollywood blockbusters, the move will add to already hefty spending at Amazon, potentially unnerving investors concerned about the company's lack of profitability.


7 smartphones with monster batteries so big, you won?t believe it

- Mon, 19 Jan 2015 12:23:57 -0500

7 smartphones with monster batteries so big, you won?t believe itEvery single high-profile study in recent years that asks†consumers what they want to see improved most in future†smartphones is topped by the same thing: battery life. It?s no mystery that the batteries in most modern smartphones simply can?t keep up with all of the technology companies are stuffing into these handsets. Quad- and octa-core processors, ridiculously bright 2K displays and all of the other components in newer phones are huge battery hogs, but battery technology simply can?t move quickly enough to compensate for all of these thin new high-end phones. If you want decent battery life on a smartphone from your carrier, you only have a handful of choices including the Galaxy Note 4 and iPhone 6 Plus. If you


Snowden documents show UK spies stored journalists' emails - report

- Mon, 19 Jan 2015 11:28:24 -0500

Satellite dishes are seen at GCHQ's outpost at Bude, close to where trans-Atlantic fibre-optic cables come ashore in Cornwall, southwest EnglandThe GCHQ eavesdropping agency stored emails from journalists working for several large media organisations, according to documents released by former U.S. spy agency contractor Edward Snowden, the Guardian newspaper reported. The emails from the New York Times, the Washington Post, the Guardian, the Sun, Le Monde, NBC, the BBC and Reuters were among 70,000 harvested as part of a 10-minute bulk surveillance exercise on one day in November 2008, the newspaper said. The communications, which ranged from press releases to discussions between reporters and editors about stories, were accessed by a tap on fibre-optic cables, saved by GCHQ and then shared on its intranet as part of a test exercise. The Guardian said new evidence from British intelligence documents revealed by Snowden also showed that a GCHQ information security assessment had listed investigative journalists as a threat along with terrorists and hackers.


WADA to complete Russia doping probe by end of year

- Mon, 19 Jan 2015 08:49:11 -0500

MONTREAL (AP) ? The World Anti-Doping Agency says its investigation into allegations of systematic doping in Russia should be completed by the end of the year.

Soccer-China's Wang to take stake in Atletico-reports

- Mon, 19 Jan 2015 08:17:42 -0500

* Billionaire set to acquire 20 percent stake, reports say * Investment estimated at 40 million euros * La Liga champions latest to attract cash (Adds Atletico spokesman) By Iain Rogers MADRID, Jan 19 (Reuters) - Chinese billionaire Wang Jianlin has agreed to buy a 20 percent stake in La Liga champions Atletico Madrid, Spanish media reported on Monday. The deal with Wang, who controls the Dalian Wanda Group conglomerate and is a keen soccer fan, will be announced in Beijing on Wednesday, according to the reports in sports dailies Marca and As. Wang has a net worth of $13.2 billion, Forbes said in October, putting him fourth on the magazine's China rich list after he topped the ranking the previous year. Atletico would be the latest La Liga team to attract significant investment from outside Spain following the likes of Malaga and Valencia.

China calls Snowden's stealth jet hack accusations 'groundless'

- Mon, 19 Jan 2015 05:10:41 -0500

Former US National Security Agency contractor Edward Snowden, who is in Moscow, is seen on a giant screen during a live video conference for an interview as part of Amnesty International's annual Write for Rights campaign at the Gaite Lyrique in ParisChina dismissed accusations it stole F-35 stealth fighter plans as groundless on Monday, after documents leaked by former U.S. intelligence contractor Edward Snowden on a cyber attack were published by a German magazine. The Pentagon has previously acknowledged that hackers had targeted sensitive data for defense programs such as the F-35 Joint Strike Fighter, but stopped short of publicly blaming China for the F-35 breach. Defense experts say that China's home-grown stealth jets had design elements resembling the F-35. The Pentagon and the jet's builder, Lockheed Martin Corp, had said no classified information was taken during the cyber intrusion.


U.S. penetrated North Korean networks years ago - New York Times

- Sun, 18 Jan 2015 21:56:00 -0500

A South Korean army soldier watches a TV news program showing North Korean leader Kim Jong Un at the Seoul Railway Station in Seoul, South Korea, Monday, Dec. 22, 2014. North Korea hates the Hollywood film that revolves around the assassination of its beloved leader, but the country has had a long love affair with cinema - of its own particular styling.(AP Photo/Ahn Young-joon)The U.S. National Security Agency began tapping into North Korean computer networks in 2010, an effort that ultimately helped provide evidence to persuade the Obama administration that Pyongyang was behind the cyber attack on Sony Pictures, the New York Times reported on Sunday. Citing former U.S. and foreign officials and a National Security Agency document, the Times said the spy agency was able to penetrate North Korean systems with the help of South Korea and other U.S. allies after first tapping into Chinese networks that connect North Korea to the rest of the world. The newspaper quoted officials as saying the program grew into an effort to place malware that could track many networks and computers used by hackers in North Korea.


China's Xiaomi to buy stake in software firm Kingsoft from Tencent

- Sun, 18 Jan 2015 20:19:59 -0500

People stand near a logo of Xiaomi ahead of the launching ceremony of Xiaomi Phone 4, in BeijingChina's Xiaomi Inc [XTC.UL] has agreed to buy about 3 percent of software firm Kingsoft Corp Ltd from Tencent Holdings Ltd for HK$527 million ($67.99 million), according to a Kingsoft filing on Monday. The deal with Xiaomi, the world's third-biggest smartphone maker, is expected to close on Jan. 30, the filing to the Hong Kong exchange said. Chinese social networking and video game giant Tencent will still hold 9.6 percent of Kingsoft. Xiaomi CEO and Chairman Lei Jun is also a founder and now chairman of Kingsoft, which makes entertainment, Internet security and office software.


Twitter accounts of New York Post and news agency UPI hacked

- Fri, 16 Jan 2015 15:55:28 -0500

This screen shot made on Friday, Jan. 16, 2015, shows a United Press International Twitter account that was hacked Friday, displaying suspicious tweets on false economic and military news. A Twitter feed of the New York Post was also hacked. (AP Photo/United Press International via Twitter)NEW YORK (AP) ? Some Twitter accounts of the New York Post and UPI, as well as the news agency's website, were briefly hacked Friday.


Exclusive: China Telecom plans bid to build Mexico broadband network - sources

- Fri, 16 Jan 2015 10:49:02 -0500

By Christine Murray MEXICO CITY (Reuters) - China's third-largest carrier China Telecom is preparing a possible bid for a contract to build and run a new mobile broadband network in Mexico and is seeking local partners to join it in a consortium, three people with knowledge of the matter said. It has already secured up to several billion dollars of financing from Chinese state-controlled banks, including the China Development Bank, for the project, which Mexico estimates will cost $10 billion over 10 years, one of the people said. The proposed network is part of a sweeping reform designed to break billionaire Carlos Slim's hold on the Mexican telecoms business, but the Chinese involvement could prove controversial and trigger concerns from the U.S., some Mexican officials say. Mexico's government is trying to ease its economic dependence on the United States and ramp up Chinese investment.

How to hire a hacker

- Fri, 16 Jan 2015 10:29:46 -0500

These are the 25 best passwords you can use? if you want to be hackedMost Internet users are scared of hackers, and rightfully so. While the terms is sometimes used to describe any computer programmer, it typically has a negative connotation and is used to describe nefarious coders who make digital chaos their mission on the web. Sometimes, hackers target large companies and steal customers? credit card data. That data is then sold on the black market, potentially causing huge headaches for victims. And sometimes, hackers target companies or individuals just for fun†? they cause as much chaos as possible just because they can. There is no end in sight for the battle between security researchers and hackers, and now things have gotten even scarier thanks to a new service that makes it shockingly


British police arrest man over Christmas Xbox, Playstation hacks

- Fri, 16 Jan 2015 09:25:55 -0500

People walk past the Playstation and Xbox booths at the 2014 Electronic Entertainment Expo, known as E3, in Los AngelesBritish police said on Friday they had arrested a man in northwest England following the 2014 cyber attacks on Sony PlayStation and Microsoft Xbox systems. Both systems suffered long outages over Christmas after a major distributed denial of service (DDOS) attack. A hacking group calling itself Lizard Squad, which had attacked the two networks earlier last year, claimed responsibility. "Officers ... have arrested a man in Southport, Merseyside this morning as part of an investigation into ?swatting? and computer hacking offences," Merseyside police said in a statement.


UK arrests man in Sony Playstation and Xbox attack

- Fri, 16 Jan 2015 08:48:22 -0500

LONDON (AP) ? Authorities in Britain have arrested an 18-year-old man accused of computer hacking offenses related to days of disruption on Sony's PlayStation Network and Microsoft's Xbox Live services last year.

Saudi Arabia postpones activist's flogging: source

- Fri, 16 Jan 2015 07:51:41 -0500

Saudi Arabia has postponed Friday's public flogging of activist and blogger Raif Badawi on medical grounds, a source familiar with the matter told Reuters. Badawi was subjected to the first 50 lashes a week ago and was due to be flogged again after Friday prayers, although Saudi authorities had come under Western pressure to call off the punishment. Political stakes over Badawi's case, which included a charge of insulting Islam, have been heightened by the Paris attack on Charlie Hebdo newspaper and its subsequent publication of more cartoons lampooning Islam's Prophet Mohammad. Rights watchdog Amnesty International said in a statement that a medical examination found that Badawi's earlier "wounds had not yet healed properly and that he would not be able to withstand another round of lashes at this time." The doctor who carried out the medical check-up recommended that the flogging be postponed until next week, Amnesty said, adding "it is unclear whether the authorities will fully comply with this demand." Badawi, who set up the "Free Saudi Liberals" website, was arrested in June 2012 for offences which also included cyber crime and disobeying his father - a crime in Saudi Arabia.

US, Britain to stage cyber 'war games' later this year

- Thu, 15 Jan 2015 21:05:40 -0500

President Barack Obama, right, walks with British Prime Minister David Cameron on the West Wing Colonnade of the White House, on Thursday, Jan. 15, 2015, in Washington. (AP Photo/Evan Vucci)WASHINGTON (AP) ? The United States and the U.K. will stage cyber "war games" together, starting this year, to boost both countries' resistance to cyberattacks, Britain's government said Thursday.


China's Xiaomi takes aim at Apple with new phone

- Thu, 15 Jan 2015 17:48:17 -0500

Lei Jun, chairman of Chinese smartphone maker Xiaomi, takes a selfie on the latest Xiaomi Note smartphone at a press event in Beijing, Thursday, Jan. 15, 2015. The Chinese manufacturer on Thursday unveiled a new model that Lei said has processor size and performance comparable to Apple?s iPhone 6 but is thinner and lighter. (AP Photo/Ng Han Guan)BEIJING (AP) ? Rising smartphone star Xiaomi is moving upmarket and taking aim at Apple's iPhone.