IANS Blog RSS Feed


Poulin to CSO: We Hacked a Smart Building Using ?Old-School? Techniques

- Thu, 11 Feb 2016 00:00:00 GMT

The ?smarter? buildings get, the easier they are to hack? Maybe. IANS Faculty Chris Poulin, research strategist for IBM?s X-Force ethical hacking team, recently spoke to CSO?s Maria Korolov about a penetration test in which his team was able to gain access to all of the buildings operated by a building management company.

Privacy, Security Concerns Rise as States Mull Encryption Backdoor Requirements

- Wed, 27 Jan 2016 00:00:00 GMT

National Data Privacy Day (January 28th) certainly comes at an interesting time this year, as legislators in two of the most technology-centric U.S. states recently introduced similar bills that would force smartphone manufacturers to include encryption backdoors in their devices.

Fledgling Cyber-Insurance Market Tested by Early Denials, Lawsuits

- Wed, 20 Jan 2016 00:00:00 GMT

Cybersecurity insurance policies may be relatively new, but they have one important thing in common with established, legacy business coverage: They live and die in the fine print.

Hacker-Caused Ukrainian Power Outage Marks First Known Attack With Immediate, Direct Public Impact

- Tue, 05 Jan 2016 00:00:00 GMT

Security researchers have confirmed that a recently updated version of the highly destructive BlackEnergy malware package infected the systems of at least three power authorities in Ukraine, causing a massive outage that left thousands of homes in the Ivano-Frankivsk region of the country without electricity.†

Top 10 IANS Insights from a Tumultuous 2015

- Mon, 28 Dec 2015 00:00:00 GMT

Another year is in the books and what a year it was for infosec pros. From the Ashley Madison hack to the OPM breach, to Jeep commandeering and mysterious backdoors in popular networking gear, every week brought a new security twist that forced us all to keep our heads on swivels.

Herold: Misguided CISA Heightens Security, Privacy Concerns

- Mon, 21 Dec 2015 00:00:00 GMT

The controversial Cybersecurity Information Sharing Act (CISA) is now the law of the land, slipped into an eleventh-hour†spending bill designed to keep the federal government running through 2016.

Patch Now: Rogue Code Leaves Gaping Hole in Juniper Gear

- Fri, 18 Dec 2015 00:00:00 GMT

Juniper Networks says unauthorized code could allow attackers to gain administrative access to its NetScreen appliances and decrypt VPN connections without leaving any trace of their actions. Users are urged to apply fixes immediately.

Poulin: Time to Realistically Acknowledge Vehicle Vulnerabilities

- Wed, 16 Dec 2015 00:00:00 GMT

The images and breathless banter were difficult to ignore: celebrity security researchers gaining remote command of an automobile, disrupting on-board systems before forcing the vehicle and its helpless driver into a ditch.

NIST to Infosec Pros: How Is Our Framework Working?

- Mon, 14 Dec 2015 00:00:00 GMT

The National Institute of Standards and Technology is asking infosec practitioners in the public and private sectors to comment on the efficacy of its cybersecurity framework as it prepares to update the popular, two-year-old document.

As Ransomware Attacks Evolve, Security Teams Must Prepare For New ?Drive-By? Tactics

- Thu, 10 Dec 2015 00:00:00 GMT

Another week, another evolution of the popular ransomware attacks. When we last wrote about it, researchers had discovered a new iteration ? ?Linux.Encoder.1? ? that enabled attackers to inject malware into Linux-powered websites and encrypt all files in the home and backup directories. Now, it appears the popular exploit kit Angler is being used to spread the latest version of CryptoWall and other ransomware on websites as part of ?drive-by? campaigns that begin with the deployment of password-stealing malware.†

Threats RSS Feed - Symantec Corp.



- Thu, 11 Feb 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Tue, 9 Feb 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Tue, 9 Feb 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Sat, 6 Feb 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Wed, 3 Feb 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Wed, 3 Feb 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Wed, 3 Feb 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Tue, 2 Feb 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Sun, 31 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Sat, 30 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Thu, 28 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Thu, 28 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Tue, 26 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Tue, 26 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Tue, 26 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Tue, 26 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Tue, 26 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Tue, 26 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Sat, 23 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Sat, 23 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Thu, 21 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Thu, 21 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Fri, 22 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Tue, 19 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.


- Tue, 19 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.


- Tue, 19 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.


- Tue, 19 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.


- Tue, 19 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.


- Tue, 19 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.


- Tue, 19 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.


- Tue, 19 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan, Virus, Worm.


- Mon, 18 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Mon, 18 Jan 2016 00:00:00 -0800

Risk Level: Very Low.


- Mon, 18 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.


- Fri, 15 Jan 2016 00:00:00 -0800

Risk Level: Low. Type: Worm.


- Thu, 14 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Virus, Worm.


- Fri, 15 Jan 2016 00:00:00 -0800

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News


Ukraine sees Russian hand in cyber attacks on power grid

- Fri, 12 Feb 2016 07:51:36 -0500

By Pavel Polityuk KIEV (Reuters) - Hackers used a Russian-based internet provider and made phone calls from inside Russia as part of a coordinated cyber attack on Ukraine's power grid in December, Ukraine's energy ministry said on Friday. The incident was widely seen as the first known power outage caused by a cyber attack, and has prompted fears both within Ukraine and outside that other critical infrastructure could be vulnerable. The ministry, saying it had completed an investigation into the incident, did not accuse the Russian government directly of involvement in the attack, which knocked out electricity supplies to tens of thousands of customers in central and western Ukraine and prompted Kiev to review its cyber defenses.

Boeing shares drop on accounting fears, competitive threats

- Thu, 11 Feb 2016 16:34:58 -0500

A line-up of Boeing 747s and 787 Dreamliners are pictured at the Boeing production facility in EverettThe U.S. Securities and Exchange Commission is investigating whether Boeing properly accounted for the costs and expected sales of two of its biggest jetliners, the 747 and 787, Bloomberg reported on Thursday, citing people with knowledge of the matter. The SEC, under Chair Mary Jo White, has stepped up scrutiny of corporate accounting practices. On Wednesday, Boeing said that competitive pressures from rival Airbus were prompting it to cut middle-management and executive ranks at its commercial airplane unit to reduce costs.

FireEye reports 4Q loss

- Thu, 11 Feb 2016 16:19:22 -0500

The Milpitas, California-based company said it had a loss of 87 cents per share. Losses, adjusted for stock option expense and amortization costs, were 36 cents per share. The results surpassed Wall Street ...

Nokia leaves investors in dark over outlook

- Thu, 11 Feb 2016 04:42:47 -0500

The Nokia headquarters is seen in EspooBy Jussi Rosendahl HELSINKI (Reuters) - Finnish telecom gear maker Nokia warned that demand for new mobile networks would slow this year in China and said it would not give a financial outlook until April following its acquisition of Alcatel-Lucent. The 15.6 billion euro deal helps Nokia to compete with Sweden's Ericsson and China's Huawei previously the world's top two suppliers of network gear, in a market where limited growth and tough competition are pressuring prices. Nokia CEO Rajeev Suri said the company expected market growth this year in North America, India, the Middle East and Africa, while fast growing China will cool down.

Senate committee backs nominee for OPM director after breach

- Wed, 10 Feb 2016 11:19:46 -0500

WASHINGTON (AP) ? A Senate committee is backing President Barack Obama's nominee to head the Office of Personnel Management.

Concerned by cyber threat, Obama seeks big increase in funding

- Wed, 10 Feb 2016 06:45:58 -0500

By Dustin Volz and Mark Hosenball WASHINGTON (Reuters) - President Barack Obama on Tuesday sought a surge in funding to counter cyber security threats, as his top intelligence official warned Congress that computer attacks were among the most imminent security challenges facing the United States. In his fiscal 2017 budget proposal, Obama asked for $19 billion for cyber security across the U.S. government, an increase of $5 billion over this year While the White House's overall fiscal plan faces tough going in the Republican-controlled Congress, increased cyber security funding has won bipartisan support of lawmakers in the past. The request comes as the Obama administration has struggled to address the growing risk posed by criminals and nation states in the digital world.

U.S. lawmakers seek to bar states from mandating encryption weaknesses

- Wed, 10 Feb 2016 05:04:08 -0500

A lock icon, signifying an encrypted Internet connection, is seen on an Internet Explorer browser in ParisBy Dustin Volz WASHINGTON (Reuters) - U.S. House of Representatives lawmakers will introduce bipartisan legislation on Wednesday that would prohibit states from requiring tech companies to build encryption weaknesses into their products. The move marks the latest foray into an ongoing debate over encryption between Silicon Valley and Washington. While tech companies generally oppose weakened security standards, federal authorities have warned about a "going dark" phenomenon in which criminal suspects use powerful encryption in their communications so that investigators cannot access a phone's content, even with a warrant.

Akamai beats revenue estimates; unveils $1 billion share buyback plan

- Tue, 09 Feb 2016 18:22:35 -0500

Online content distributor Akamai Technologies Inc reported better-than-expected quarterly revenue, helped by higher demand for its security services, and announced a $1 billion share buyback program. Akamai's shares rose 16 percent to $45.90 in after-hours trading on Tuesday. The upbeat results soothed investors' nerves after a selloff in the broader tech sector in the past few days, which was triggered by disappointing sales outlook from LinkedIn Corp and Tableau Software.

Obama seeks cybersecurity boost to replace 'ancient' tech

- Tue, 09 Feb 2016 17:42:52 -0500

President Barack Obama meets with members of this national security team and cybersecurity advisers in the Roosevelt Room of the White House in Washington,Tuesday, Feb. 9, 2016. At right is Lisa Monaco, assistant to the president for Homeland Security and Counterterrorism. (AP Photo/Pablo Martinez Monsivais)WASHINGTON (AP) ? President Barack Obama said Tuesday he is asking Congress for $3.1 billion to update the government's archaic computer systems to protect them from cyberattacks as part of a new, centralized effort to boost cybersecurity.

Hackers are offering to pay $23,000 for valid Apple employee login details

- Tue, 09 Feb 2016 13:17:07 -0500

Apple has a high regard for security and secrecy, but that doesn?t mean hackers have simply given up the dream of accessing this particular fortress. In fact, a new report says that in Ireland, hackers are ready to pay up to ?20,000, or approximately $23,000, to Apple employees willing to sell their login details. DON?T MISS:† 5 secret features hiding inside your iPhone "You'd be surprised how many people get on to us, just random Apple employees," a source told Business Insider . "You get emails offering you thousands [of euros] to get a password to get access to Apple.†I could sell my Apple ID login information online

Here?s one iPhone lock screen security exploit you shouldn?t worry about

- Mon, 08 Feb 2016 19:35:24 -0500

A newly discovered iPhone vulnerability can bypass your lockscreen code, but it will probably not affect you anytime soon.†Security researcher Benjamin Kunz Mejri from Vulnerability Laboratory stumbled upon an authentication issue that affects iPhones and iPads running iOS 8 and iOS 9 . DON?T MISS: Fresh iPad Air 3 leak reveals more details about Apple's most exciting tablet in years Using this security hole, hackers could in theory access the data behind your lockscreen password. But in practice, the procedure is a little more complicated than that, as hackers would have to gain physical access to the iPhone or iPad in question. Furthermore, they would have to be able to manage an unlocked

US peacekeeping expert to coordinate sexual abuse response

- Mon, 08 Feb 2016 18:25:11 -0500

UNITED NATIONS (AP) ? Jane Holl Lute, a U.S. security expert who has held top posts in U.N. peacekeeping, was appointed by Secretary-General Ban Ki-moon on Monday to coordinate improvements in the United Nations' response to allegations of sexual exploitation and abuse by peacekeepers.

Justice, Homeland Security probe hack of U.S. agency employee data

- Mon, 08 Feb 2016 16:41:56 -0500

By Mark Hosenball WASHINGTON (Reuters) - The U.S. Department of Homeland Security and the Justice Department are investigating a claim that personal data related to thousands of DHS and FBI employees was hacked and has been posted online, an agency spokesman said on Monday. The tech website Motherboard reported on Sunday that a hacker, who Motherboard said wished to remain anonymous, intended to dump onto the Internet names, job titles, email addresses and official phone numbers of over 9,000 DHS employees and another 20,000 Federal Bureau of Investigation workers.

Awesome list of 17 ?Breaking Bad? references hidden in ?Better Call Saul?

- Sun, 07 Feb 2016 09:00:07 -0500

I'm not typically a fan of TV spinoffs, but Better Call Saul has seemingly broken the spinoff curse that plagues shows looking to capitalize off of the success of previous hits. To be sure, following up Breaking Bad†would be a daunting task for any show, but Better Call Saul works precisely because it's not trying to perfectly mirror all the elements that made Vince Gilligan's meth-fueled drama so addictive and compelling. Rather, Better Call Saul seeks to carve out its own unique and independent nook within the larger Breaking Bad universe, and it does so quite successfully. DON'T MISS:† Intern caught sleeping on his second day of work gets trolled by the entire Internet At the same time,

Exclusive: Top cybercrime ring disrupted as authorities raid Moscow offices - sources

- Sat, 06 Feb 2016 01:31:17 -0500

View of building which houses an office of 25 Floor Film Company in MoscowBy Joseph Menn WASHINGTON (Reuters) - Russian authorities in November raided offices associated with a Moscow film distribution and production company as part of a crackdown on one of the world?s most notorious financial hacking operations, according to three sources with knowledge of the matter. Cybersecurity experts said a password-stealing software program known as Dyre ? believed to be responsible for at least tens of millions of dollars in losses at financial institutions including Bank of America Corp and JPMorgan Chase & Co ? has not been deployed since the time of the raid. Experts familiar with the situation said the case represents Russia?s biggest effort to date to crack down on cyber-crime.

Unhackable brain scans may some day replace passwords

- Fri, 05 Feb 2016 20:55:57 -0500

Security breaches affecting millions of users have come to light in recent years, yet we?re no better at protecting our personal data, or at picking good passwords , than we were before. But some companies are already looking at new ways to secure†customer data that go beyond passwords and PINs. Fingerprint sensors are found on more and more smartphones in recent years, and retina scanners are coming too. But in the future, we may have an even more advanced way of logging into online services and protecting our data: Brain scans. UP NEXT:† 20 paid iPhone and iPad apps on sale for free right

Lawyer: New York-born man was mistreated after terror arrest

- Fri, 05 Feb 2016 19:16:34 -0500

NEW YORK (AP) ? The lawyer for a New York City-born man serving a 15-year prison sentence for supporting al-Qaida urged a judge Friday to find the U.S. government liable for failing to quickly diagnose a medical condition after his 2010 arrest, but a federal prosecutor said he was treated properly.

In Obama's final year, Senate is slow to act on his nominees

- Fri, 05 Feb 2016 17:21:32 -0500

This April 17, 2014, photo, provided by the U.S. Army, shows then-Maj. Gen. John W. Nicholson, Jr. speaking to his senior leaders at Fort Bragg, N.C. If you wear combat fatigues to work, then your nomination is almost sure to sail through the Senate. If not, you?re likely in for a long wait. In just a week, senators confirmed Nicholson to be the next top American commander in Afghanistan. (Sgt. Mikki L. Sprenkle/U.S. Army via AP)WASHINGTON (AP) ? If you wear combat fatigues to work, then your nomination is almost sure to sail through the Senate. If not, you're likely in for a long wait.

How to play the secret chess game hidden in Facebook Messenger

- Fri, 05 Feb 2016 16:50:54 -0500

Hundreds of millions of people spend†hours of their†lives on Facebook every week, but there are some secrets that only a few of them have discovered. For example, last December, a member of the Chess subreddit community found a secret, playable chess game hidden in Facebook Messenger that anyone can play. READ MORE:† Follow these 5 steps to keep yourself safe from hackers In order to start a game, just open a Messenger conversation†with a friend and type "@fbchess play" to begin. A chess board will suddenly appear in the chat box and the player with the white pieces†moves first. But despite the fact that a visual representation of the board appears on screen, you'll have to

Follow these 5 steps to keep yourself safe from hackers

- Fri, 05 Feb 2016 13:22:39 -0500

No matter how secure†you think your devices are, someone could access your data if they put their mind to it. It's just the reality of the Information†Age, but†you should still do everything in your power to make yourself less of a target for hackers . DON'T MISS:† 20 paid iPhone and iPad apps on sale for free right now In an extensive piece for The Wall Street Journal this week , Geoffrey A. Fowler laid out a five-step checklist†that shouldn't take more than an hour to complete, and might be the difference between having your data stolen or not. Here are just a few of the most important steps you should take: First, update everything. Start with the operating

Rice aides, Powell got classified info on personal email accounts

- Thu, 04 Feb 2016 18:17:07 -0500

Former U.S. Secretary of State Powell salutes the audience as he takes the stage at the Washington Ideas Forum in WashingtonBy Mark Hosenball WASHINGTON (Reuters) - Former U.S. Secretary of State Colin Powell and aides to his successor, Condoleezza Rice, both received classified information a handful of times via personal email accounts, the top Democrat on a congressional oversight panel said on Thursday. The findings come after nearly a year of controversy over Democratic presidential candidate Hillary Clinton's decision to set up a private email server for her work as secretary of state. Representative Elijah Cummings said the disclosures about Powell's and Rice's aides' emails were made by the State Department's inspector general, who is reviewing the email practices of the last five secretaries of state.

Senators grill personnel office nominee over data hack

- Thu, 04 Feb 2016 14:48:35 -0500

Beth Cobert, President Barack Obama's nominee to head the Office of Personnel Management (OPM), testifies on Capitol Hill in Washington, Thursday, Feb. 4, 2016, before the Senate Homeland Security and Government Affairs Committee hearing on her nomination. Cobert promised to strengthen the agency?s cybersecurity and information technology systems after what?s believed to be the largest data breach in U.S. history. (AP Photo/Manuel Balce Ceneta)WASHINGTON (AP) ? President Barack Obama's nominee to head the Office of Personnel Management on Thursday promised to strengthen the agency's cybersecurity and information technology systems after what's believed to be the largest data breach in U.S. history.

Hackers attack 20 million accounts on Alibaba's Taobao shopping site

- Thu, 04 Feb 2016 05:21:44 -0500

A logo of Alibaba Group is pictured at its headquarters in HangzhouHackers in China attempted to access over 20 million active accounts on Alibaba Group Holding Ltd's Taobao e-commerce website using Alibaba's own cloud computing service, according to a state media report posted on the Internet regulator's website. Analysts said the report from The Paper led to the price of Alibaba's U.S.-listed shares falling as much as 3.7 percent in late Wednesday trade.

Unpatched eBay vulnerability leaves shoppers at risk of downloading malware

- Wed, 03 Feb 2016 21:45:00 -0500

Be extra careful the next time you visit a suspicious-looking eBay store page. According to Help Net Security , researchers from†the Check Point security firm have discovered a vulnerability in the eBay platform that allows criminals to distribute malware by bypassing the site's code validation process and control the code themselves. MUST SEE:† 15 paid iPhone apps on sale for free right now Here's how it works: an attacker sets up a store page with listings for products. On the page, a pop-up message will appear telling customers that they can receive a limited-time discount if they download the eBay mobile app. By clicking the

Apple ordered to pay $625 million in patent dispute with VirnetX

- Wed, 03 Feb 2016 19:32:34 -0500

An Apple logo hangs above the entrance to the Apple store on 5th Avenue in the Manhattan borough of New York CityApple Inc must pay VirnetX Holding Corp more than $625 million for using the patent licensing company's Internet security technology without permission in its FaceTime and iMessage features, a federal jury in Texas said on Wednesday. The jury said Apple's infringement was willful. Apple was down 45 cents to $95.90 in after-hours trading.

Guilty plea in attempted cyber-attack on US govt. computers

- Tue, 02 Feb 2016 18:21:26 -0500

WASHINGTON (AP) ? A former Nuclear Regulatory Commission scientist pleaded guilty Tuesday to a federal computer crime, admitting that he attempted to launch a cyber-attack on government computers by sending employees emails that he thought contained a virus.

BT suffers temporary network problems

- Tue, 02 Feb 2016 12:03:58 -0500

A BT logo is seen on a building in LondonBritain's BT Group said large numbers of its customers had lost connection to the Internet on Tuesday, but most were back online in a matter of hours and there were no indications that the failure was due to a malicious attack. "We've been working hard to fix the issue and are glad to report that nearly every customer affected is now reconnected, approximately two hours after the problem started," it said.

Something new to worry about: Connected toy security

- Tue, 02 Feb 2016 10:58:03 -0500

This photo provided by Mattel shows the Smart Toy Bear. Your smartphone or tablet is most likely pretty secure, and unlikely to be hacked, but the same can?t be said for any Internet connected toys you may have purchased for your kids. (Mattel via AP)NEW YORK (AP) ? Your smartphone or tablet is most likely pretty secure ? not perfect, maybe, but generally unlikely to be hacked or to store, say, your email where other people could read it.

OPPO, Vivo snap at Apple's heels in China mobile market

- Mon, 01 Feb 2016 16:32:57 -0500

File photo of a commuter using his mobile phone passing an advertisement of Chinese smartphone maker Oppo at a train station in SingaporeBy Miyoung Kim and Yimou Lee SINGAPORE/HONG KONG (Reuters) - Beyond China few may have heard of OPPO or Vivo, but these local handset vendors are rising up the rankings in the world's largest smartphone market, using local marketing savvy and strong retail networks in lower-tier cities. Industry experts say these cities - there are more than 600 of them and some are bigger than many European capitals - are the next smartphone battlefield as China's major cities are saturated. International brands such as Apple and Samsung Electronics have mostly not yet reached this part of the market - which accounts for more than 56 percent of China's overall consumption, according to Beijing All China Marketing Research.

Google will reportedly exert ?Apple-like? control over future Nexus phones

- Mon, 01 Feb 2016 15:30:15 -0500

Given how far Microsoft has moved in Apple's direction by designing its own hardware with the Surface Pro and Surface Book , we shouldn't be too surprised to learn that Google is considering similar moves with its Nexus line of smartphones.† The Information is reporting that "Google CEO Sundar Pichai and his lieutenants have signaled to colleagues and outsiders that the company wants to take greater control over its program for making 'Nexus' smartphones" and that "the change would effectively reduce the level of involvement of hardware partners that make the phones with Google, a group which has included Samsung, Motorola, LG and Huawei." MUST READ:† How the Iowa caucus works, as explained with Legos The idea here

The 2,001 things we like most in the world, according to Facebook

- Mon, 01 Feb 2016 12:42:33 -0500

Facebook is the most popular social network in the world. With over 1.4 billion users, Facebook has something for everybody and most users come back for more and more multiple times per day. Sure, the company mishandled user privacy in the past, but it?s getting better all the time. And Facebook has plenty of other interesting services under its umbrella, including the Messenger and WhatsApp chat apps, the Instagram photo-based social network, and even the Oculus Rift VR initiative. To pay for all that, Facebook serves ads from third-parties to all of its users, and that?s why it needs to collect plenty of data about users†like and dislike. This way, the service can target ads more†effectively. So, what do

It takes 2 seconds to give your Android phone a speed boost and improve battery life by 20%

- Mon, 01 Feb 2016 12:15:09 -0500

Given how much time†smartphone users on the whole spend using Facebook , it's not all that†surprising that the app tends†to consume its fair share of battery. The problem, however, is that Facebook's mobile apps have a bad tendency of†tearing through battery life much quicker than what one might reasonably construe as "fair." DON?T MISS:† This site ranks VPN speeds so you know which service will stream Netflix the fastest Speaking to this point, Reddit user†pbrandes_eth last week†decided to test the notion that running and even having Facebook installed on an Android device can have an adverse impact on performance. Using his

Cuba says it will launch broadband home internet project

- Sun, 31 Jan 2016 23:32:03 -0500

HAVANA (AP) ? Cuba announced Sunday night that it is launching broadband Internet service in two Havana neighborhoods as a pilot project aimed at bringing home access to one of the world's least connected nations.

A look at federal cases on handling classified information

- Sat, 30 Jan 2016 18:39:16 -0500

FILE - In this March 5, 2015, file photo, cables are connected to a server capable of handling an email server at the Washington bureau of The Associated Press. News that Hillary Clinton?s home email server contained top-secret messages brings renewed attention to the security of her mail system and to the laws and regulations that control classified information. The new disclosure, and the question of whether it exposes her to more serious legal problems, was certain to escalate political heat on the Democratic presidential candidate just days before the first ballots are cast in Iowa in the 2016 nominating process. (AP Photo/Jon Elswick, File)WASHINGTON (AP) ? News that Hillary Clinton's home email server contained top-secret messages brings renewed attention to the security of her mail system and to the laws and regulations that control classified information.

U.S. to withhold some Clinton emails with top secret information

- Fri, 29 Jan 2016 17:25:03 -0500

U.S. Democratic presidential candidate Hillary Clinton speaks during a campaign stop at Grand View University in Des MoinesBy Arshad Mohammed and Jonathan Allen WASHINGTON (Reuters) - Seven private email chains of former U.S. Secretary of State Hillary Clinton will be withheld from the public in their entirety because they contain top secret information, the U.S. State Department said on Friday. The material, amounting to 37 printed pages, contained information U.S. intelligence agencies said was classified as top secret, State Department spokesman John Kirby said. "These documents were not marked classified at the time that they were sent," Kirby said, adding that the department would investigate whether the information in them was classified at the time.

Judge rejects challenge in FBI child porn website probe

- Fri, 29 Jan 2016 14:03:02 -0500

U.S. District Judge Robert Bryan in Tacoma, Washington, on Thursday rejected arguments by Jay Michaud, one of 137 people facing U.S. charges in the probe, that a search warrant that enabled the FBI to conduct the sting was unconstitutional. The Federal Bureau of Investigation had in February 2015 seized the server hosting Playpen, a child porn website that operated on the Tor network, which is designed to facilitate anonymous online communication and protect user privacy. In order to identify its 214,898 members, authorities sought a search warrant from a Virginia judge allowing them to deploy a "network investigative technique" that would cause a computer to send them data any time a user logged on while the FBI operated the website for two weeks.

Blackshades malware co-creator gets five years of probation

- Fri, 29 Jan 2016 13:20:57 -0500

By Nate Raymond and Brendan Pierson NEW YORK (Reuters) - An Arizona man who co-created software distributed by an organization called Blackshades that was used to hack into a million computers worldwide was sentenced on Friday to five years of probation. Michael Hogue, who online was known by the moniker "xVisceral," was sentenced by U.S. District Judge Kevin Castel in Manhattan after pleading guilty in 2013 to distributing malware and conspiring to commit computer hacking. Hogue, 25, first came to the attention of the U.S. Federal Bureau of Investigation in 2010, when, in an effort to advertise the malware, he contacted an undercover agent running a website established as part of a sting operation targeting the illegal trade in credit card numbers, court papers said.

HSBC says internet banking services down after cyber attack

- Fri, 29 Jan 2016 12:02:09 -0500

HSBC logo is seen above a branch of the bank in the Sao Paulo financial centre, BrazilBy Sinead Cruise LONDON (Reuters) - HSBC is working with law enforcement to catch those behind a cyber attack that forced its personal banking websites in the UK to shutdown, its second major service outage this month, the bank said on Friday. Europe's largest lender said it had "successfully defended" its systems against a distributed denial of service (DDoS) attack but it was experiencing fresh threats, impeding full restoration of its services. "HSBC's internet and mobile services have partially recovered, and we continue to work to restore a full service," John Hackett, UK Chief Operating Officer, said in a statement.

6 ways Android outshines my iPhone 6s

- Fri, 29 Jan 2016 10:29:35 -0500

On Thursday, I published a piece titled 8 reasons I still can?t leave the iPhone and switch to Android , in which I discussed what I believe to be the main benefits Apple's iPhone and iOS platform have over Android. I've been shocked at the feedback I've received since then. The Android vs. iOS argument typically draws all sorts of irrational and illogical "fanboys" out of the woodwork, but the overwhelming majority of emails I received after running that article were well composed and astute. I responded to as many as I could and I ended up having a few worthwhile conversations as a

Chinese military force to take lead on cyber, space defense

- Fri, 29 Jan 2016 05:48:27 -0500

A map of China is seen through a magnifying glass on a computer screen showing binary digits in SingaporeBy Megha Rajagopalan BEIJING (Reuters) - A new Chinese military outfit will lead the country's push to enhance its cyber warfare, space security and online espionage capabilities, Chinese military observers and analysts said. Senior People's Liberation Army (PLA) officials and other observers have begun to give details of the country's new Strategic Support Force (SSF), whose establishment was announced at the end of last year as part of a major overhaul of the armed forces. "It's going to make them far more effective," said John Costello, a Washington-based analyst who focuses on China's cyber capabilities.