IANS Blog RSS Feed

http://www.iansresearch.com

Poulin to CSO: We Hacked a Smart Building Using ?Old-School? Techniques

- Thu, 11 Feb 2016 00:00:00 GMT

The ?smarter? buildings get, the easier they are to hack? Maybe. IANS Faculty Chris Poulin, research strategist for IBM?s X-Force ethical hacking team, recently spoke to CSO?s Maria Korolov about a penetration test in which his team was able to gain access to all of the buildings operated by a building management company.

Privacy, Security Concerns Rise as States Mull Encryption Backdoor Requirements

- Wed, 27 Jan 2016 00:00:00 GMT

National Data Privacy Day (January 28th) certainly comes at an interesting time this year, as legislators in two of the most technology-centric U.S. states recently introduced similar bills that would force smartphone manufacturers to include encryption backdoors in their devices.

Fledgling Cyber-Insurance Market Tested by Early Denials, Lawsuits

- Wed, 20 Jan 2016 00:00:00 GMT

Cybersecurity insurance policies may be relatively new, but they have one important thing in common with established, legacy business coverage: They live and die in the fine print.

Hacker-Caused Ukrainian Power Outage Marks First Known Attack With Immediate, Direct Public Impact

- Tue, 05 Jan 2016 00:00:00 GMT

Security researchers have confirmed that a recently updated version of the highly destructive BlackEnergy malware package infected the systems of at least three power authorities in Ukraine, causing a massive outage that left thousands of homes in the Ivano-Frankivsk region of the country without electricity.†

Top 10 IANS Insights from a Tumultuous 2015

- Mon, 28 Dec 2015 00:00:00 GMT

Another year is in the books and what a year it was for infosec pros. From the Ashley Madison hack to the OPM breach, to Jeep commandeering and mysterious backdoors in popular networking gear, every week brought a new security twist that forced us all to keep our heads on swivels.

Herold: Misguided CISA Heightens Security, Privacy Concerns

- Mon, 21 Dec 2015 00:00:00 GMT

The controversial Cybersecurity Information Sharing Act (CISA) is now the law of the land, slipped into an eleventh-hour†spending bill designed to keep the federal government running through 2016.

Patch Now: Rogue Code Leaves Gaping Hole in Juniper Gear

- Fri, 18 Dec 2015 00:00:00 GMT

Juniper Networks says unauthorized code could allow attackers to gain administrative access to its NetScreen appliances and decrypt VPN connections without leaving any trace of their actions. Users are urged to apply fixes immediately.

Poulin: Time to Realistically Acknowledge Vehicle Vulnerabilities

- Wed, 16 Dec 2015 00:00:00 GMT

The images and breathless banter were difficult to ignore: celebrity security researchers gaining remote command of an automobile, disrupting on-board systems before forcing the vehicle and its helpless driver into a ditch.

NIST to Infosec Pros: How Is Our Framework Working?

- Mon, 14 Dec 2015 00:00:00 GMT

The National Institute of Standards and Technology is asking infosec practitioners in the public and private sectors to comment on the efficacy of its cybersecurity framework as it prepares to update the popular, two-year-old document.

As Ransomware Attacks Evolve, Security Teams Must Prepare For New ?Drive-By? Tactics

- Thu, 10 Dec 2015 00:00:00 GMT

Another week, another evolution of the popular ransomware attacks. When we last wrote about it, researchers had discovered a new iteration ? ?Linux.Encoder.1? ? that enabled attackers to inject malware into Linux-powered websites and encrypt all files in the home and backup directories. Now, it appears the popular exploit kit Angler is being used to spread the latest version of CryptoWall and other ransomware on websites as part of ?drive-by? campaigns that begin with the deployment of password-stealing malware.†

Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

Trojan.Ismdoor!gen1

- Fri, 9 Dec 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

X97M.Goldendrop

- Sat, 10 Dec 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.Goldeneye

- Tue, 6 Dec 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

JS.Downloader!gen25

- Thu, 8 Dec 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W97M.Downloader.N

- Wed, 7 Dec 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W97M.Downloader.O

- Wed, 7 Dec 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen80

- Tue, 6 Dec 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlck!g118

- Tue, 6 Dec 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlck!g119

- Tue, 6 Dec 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g384

- Tue, 6 Dec 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g500

- Tue, 6 Dec 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g479

- Tue, 6 Dec 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlk.AF!g6

- Tue, 6 Dec 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Linux.Horsepill

- Fri, 2 Dec 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Cryptlck!g113

- Thu, 1 Dec 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heuristic.157

- Wed, 30 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

W97M.Downloader.M

- Thu, 1 Dec 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Sponkirob

- Tue, 29 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Linux.Gafgyt.B

- Tue, 29 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.YeeScrLocker

- Fri, 25 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Cryptlck!g107

- Tue, 22 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Ransom.OzozaLocker

- Thu, 24 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ismdoor

- Thu, 24 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.Disttrack.B

- Wed, 23 Nov 2016 00:00:00 +0000

Risk Level: Low. Type: Worm.

SONAR.Cryptlck!g112

- Tue, 22 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Trupota

- Wed, 23 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Heur.RGC!g407

- Tue, 22 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Kotver!gen3

- Tue, 22 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Kotver!gen4

- Tue, 22 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Kotver!gen5

- Tue, 22 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.JSDownloader!g6

- Tue, 22 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlk.XXX!g1

- Tue, 22 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlk.AN!g2

- Tue, 22 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Ransom.PrincessLocker

- Tue, 22 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W97M.Downloader.L

- Sun, 20 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Freeload

- Sun, 20 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.Crypton

- Sun, 20 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-7857

- Fri, 18 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-7858

- Fri, 18 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-7859

- Fri, 18 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-7860

- Fri, 18 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-7861

- Fri, 18 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-7862

- Fri, 18 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-7863

- Fri, 18 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-7864

- Fri, 18 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-7865

- Fri, 18 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Cryptlck!g104

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g91

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g90

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g398

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g444

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g424

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g519

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Ransom!gen6

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen79

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E.J!g7

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E!g12

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E!g3

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E!g4

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E!g5

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E.J!g1

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E.J!g11

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E.J!g6

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E.P!g7

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.Crypt.E!g1

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E.P!g8

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E!g13

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E!g16

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E!g23

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E.J!g13

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E.J!g14

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.SB.E!g2

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g82

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g392

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlk.hdd!g1

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen74

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E!g1

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E!g11

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E!g6

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E.J!g12

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E.J!g5

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E.P!g12

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E.P!g6

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E.P!g9

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E!g14

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E!g15

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E!g18

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E!g19

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E!g20

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E!g21

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E.J!g15

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.SB.E!g3

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlk.AH!g3

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Ransomlock.G!g2

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E!g10

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E!g2

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E!g7

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E!g8

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E!g9

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E.J!g8

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E.J!g9

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E.P!g11

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.Crypt.E!g2

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.Crypt.E!g3

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E!g17

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.AM.E!g22

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Malscript!gen2

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Flokibot!gen1

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Gatak!gen9

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-7246

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.Ransoc

- Tue, 15 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Gatak!gen8

- Tue, 15 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Scanpos

- Tue, 15 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-7196

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-7198

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-7200

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-7201

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-7203

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-7242

- Wed, 16 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.PCsurveyLocker

- Tue, 15 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Powerduke

- Mon, 14 Nov 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

Trump team challenges intel on Russian election influence

- Sat, 10 Dec 2016 15:19:56 -0500

FILE - In this Dec. 9, 2016 file photo, President-elect Donald Trump speaks in Grand Rapids, Mich. Trump's presidential transition team on Saturday, Dec. 10, 2016, challenged the veracity of U.S. intelligence assessments that Russia was trying to tip the November election to the Republican. A top Senate Democrat demanded a full congressional investigation. (AP Photo/Andrew Harnik, File)WASHINGTON (AP) ? Donald Trump's presidential transition team on Saturday challenged the veracity of U.S. intelligence assessments that Russia was trying to tip the November election to the Republican. A top Senate Democrat demanded a full congressional investigation.


Russia intervened to help Trump win election: intelligence officials

- Sat, 10 Dec 2016 15:00:42 -0500

U.S. President-elect Donald Trump speaks at a "Thank You USA" tour rally in Grand RapidsBy John Walcott WASHINGTON (Reuters) - U.S. intelligence analysts have concluded that Russia intervened in the 2016 election to help President-elect Donald Trump win the White House, and not just to undermine confidence in the U.S. electoral system, a senior U.S. official said on Friday. U.S. intelligence agencies have assessed that as the 2016 presidential campaign progressed, Russian government officials devoted increasing attention to assisting Trump's effort to win the election, the U.S. official familiar with the finding told Reuters on Friday night, speaking on condition of anonymity. The president-elect's transition office released a statement that exaggerated his margin of victory and attacked the U.S. intelligence community that Trump will soon command, but did not address the analysts' conclusion.


Obama orders review of election-season hacking

- Fri, 09 Dec 2016 22:26:10 -0500

Trump team challenges intel on Russian election influencePresident Barack Obama has ordered intelligence officials to conduct a broad review of election-season cyberattacks, including the email hacks that rattled the presidential campaign and raised fresh concerns ...


Your passwords still suck, according to people who are smarter than you

- Fri, 09 Dec 2016 20:00:15 -0500

You probably think your clever little "P455W()rD" password is the highest degree of online security in the land, but a new study by the bright minds at Germany's Hasso-Plattner Institute says otherwise. In fact, your passwords are pretty much useless, because you keep reusing them. What is the matter with you? After studying 1 billion user accounts ? yes, that's billion with a "b" ? from over 30 different leaks and breaches, researchers discovered that 27%†of user passwords were nearly identical to those used by the same email address for a different account or service. In fact, 20% were exactly the same from one account to the next. The obvious issue here is that by reusing an account password, anyone with that information can simply use your email address and bad password habit to take a peek inside all of your other accounts, too. Hackers who target smaller services, like a local company,†might get your password and then use it elsewhere,†like your PayPal account. Beyond duplicate passwords, the study found that the passwords themselves are just utter crap right from the start. According to the data, here are the five most common user passwords across all services: 123456 123456789 111111 qwerty 12345678 Are you serious right now? If there were a GIF that depicted a disheveled dog pooping on an account login screen, I'd use it right now. In short, if you're using strings of numbers or even whole words as your password ? and especially if you're duplicating or nearly duplicating them between services ? you need to spend a Saturday completely revamping your account security, or you're just making yourself an easier target.

US close to solving mystery of alleged hacking of Georgia

- Fri, 09 Dec 2016 19:19:16 -0500

FILE - In this Sept. 9, 2014, file photo, a specialist works at the National Cybersecurity and Communications Integration Center (NCCIC) in Arlington, Va. The U.S. Homeland Security Department is closer to solving the mystery about why the state of Georgia believed the federal government was trying to hack its election systems. An official involved in the investigation said Dec. 9, 2016, that a DHS employee in part of the department far removed from cybersecurity operations visited the Georgia secretary of state's website for his work. But the employee's system was configured in a way that caused Georgia's security vendor to misinterpret the visit as a scan of its systems. (AP Photo/Manuel Balce Ceneta, File)WASHINGTON (AP) ? The U.S. Homeland Security Department moved closer Friday to solving the mystery about why the state of Georgia believed the federal government was trying to hack its election systems.


Fugitive Indian tycoon Mallya cries foul over Twitter hack

- Fri, 09 Dec 2016 03:56:59 -0500

The super yacht Indian Empress, owned by fugitive Indian businessman Vijay Mallya, is seen berthed beneath Fort St Angelo in Valletta's Grand HarbourFugitive Indian businessman Vijay Mallya said on Friday that his Twitter account had been penetrated by a hacking group called Legion, which posted links to what it alleged were details of Mallya's bank accounts, offshore investments and luxury cars. Mallya, a flamboyant former billionaire who made his fortune from a liquor and beer empire, moved to Britain in March after being pursued in courts by banks that his now defunct Kingfisher airline owed around $1.4 billion. "Legion will find you, hack you, expose you," read one of several postings tweeted by the hackers on Mallya's official Twitter account before they were erased at around 1215 IST (0645 GMT).


U.S. SEC enforcement chief Ceresney to depart at year-end

- Thu, 08 Dec 2016 18:09:17 -0500

Andrew Ceresney, Director of SEC Enforcement division, speaks as Preet Bharara, U.S. Attorney for the Southern District of New York, looks on during a news conference on Las Vegas sports bettor William "Billy" Walters and Dean Food's former chairman ThomasAndrew Ceresney, the U.S. Securities and Exchange Commission's Wall Street policeman, will leave the agency at the end of December, joining other top officials who are departing before Donald Trump is sworn in as president in January. Ceresney is the seventh top official at the SEC to announce his departure since Trump won November's election. Since then, the SEC has been hit with a wave of resignations, led by the announcement that SEC Chair Mary Jo White plans to step down at the end of the Obama administration.


Georgia accuses US of trying to hack its election systems

- Thu, 08 Dec 2016 17:47:29 -0500

WASHINGTON (AP) ? The state of Georgia on Thursday accused the U.S. Homeland Security Department of apparently trying to hack its election systems

White House voices concerns about China cyber law

- Thu, 08 Dec 2016 17:02:40 -0500

A lock icon, signifying an encrypted Internet connection, is seen on an Internet Explorer browser in ParisThe White House said on Thursday that it raised concerns about China's new cyber security law during a meeting with a Chinese official after the latest round of talks between the two countries on cyber crime. U.S. National Security Adviser Susan Rice met with Chinese State Councilor Guo Shengkun to discuss the importance "of fully adhering" to an anti-hacking accord signed last year between the China and the United States, National Security Council spokesman Ned Price said. The deal, brokered during Chinese President Xi Jinping's state visit to Washington in 2015, included a pledge that neither country would knowingly carry out hacking for commercial advantages.


BNY Mellon's payment woes its second big tech glitch in 18 months

- Thu, 08 Dec 2016 16:55:02 -0500

A BNY Mellon sign is seen on their headquarters in New York's financial districtA payment processing glitch at BNY Mellon Corp this week should not be a surprise as executives inside the world's largest custody bank recently highlighted a number of problems with the daily task of moving trillions of dollars around the global banking system. BNY Mellon on Thursday declined to say how widespread the problem was. The bank provides payment services in more than 100 currencies through more than 2,000 correspondent bank accounts worldwide.


The Galaxy S8?s future processor barely beats Apple?s current iPhone 7 in benchmarks

- Thu, 08 Dec 2016 12:30:11 -0500

Try as they might , Qualcomm†and Samsung are still not able to outperform Apple?s A-series mobile chips. The iPhone 7 is the undisputed king when it comes to mobile performance, both in benchmark tests and real-life use. Even the 2015 iPhone 6s is still able to beat 2016 flagships in real-life CPU performance. Come next year, a new generation of mobile processors will hit the market, and Android flagships will outscore the iPhone 7. Maybe. And if they do, they'll†just barely have the edge. It?s likely their reign will be short-lived too, as Apple is working on even more†powerful A-series chips for its 2017 iPhones and iPads. An AnTuTu benchmark test for Qualcomm?s Snapdragon 835 processor found by Phone Arena shows a score of more than†180,000 points. That?s impressive, considering that the Snapdragon 835 isn?t even out yet. The processor is expected to power most of next year?s Android-based flagship handsets, including the version of Samsung?s Galaxy S8 that will be sold in the US. But as amazing as that score might seem, it only tops Apple?s iPhone 7 by less than 10,000 points . Sure, we may be looking at a prototype Snapdragon 835 in prototype hardware, and final versions might be even better (or worse).†But Apple?s A11 chip that will go into the iPhone 8 next year will undoubtedly†top that score by a big margin. Samsung?s next Exynos chip and Qualcomm?s Snapdragon 835 CPU will both be made using†10nm process technology. That means we?re looking at significant performance and energy efficiency improvements. The Snapdragon 835 alone should be 27% faster than predecessors and 40% more efficient. However, Apple?s A11 is also going to be a 10nm processor. So we?d expect it to do better than rivals in both benchmark tests and in actual usage scenarios. We'll also remind you that there might be a device out there in testing that already topped 200,000 in AnTuTu tests . Huawei, meanwhile, demoed a processor that does better than the iPhone 7 in actual real-life tests, but it's yet to power a new flagship handset. That said, 2017 will be an exciting year for mobile hardware. Regardless of what flagship phone you end up buying, it?s very likely that it's†going to be faster at day-to-day chores than anything released up to this point.

ThyssenKrupp secrets stolen in 'massive' cyber attack

- Thu, 08 Dec 2016 11:53:58 -0500

The logo of German steel-to-elevators group ThyssenKrupp AG is pictured during the company's annual news conference in EssenBy Eric Auchard and Tom Kšckenhoff FRANKFURT (Reuters) - Technical trade secrets were stolen from the steel production and manufacturing plant design divisions of ThyssenKrupp AG in cyber attacks earlier this year, the German company said on Thursday. ThyssenKrupp, one of the world's largest steel makers, said it had been targeted by attackers located in southeast Asia engaged in what it said were "organized, highly professional hacker activities". In breaches discovered by the company's internal security team in April and traced back to February, hackers stole project data from ThyssenKrupp's plant engineering division and from other areas yet to be determined.


Exclusive: Bangladesh panel finds insiders negligent in central bank heist

- Thu, 08 Dec 2016 10:27:03 -0500

Commuters pass by the front of the Bangladesh central bank building in DhakaA Bangladesh government-appointed panel investigating the cyber-heist of $81 million from its central bank in February found five officials at the bank were guilty of negligence and carelessness, the head of the panel told Reuters on Thursday. In his first detailed comments on the inquiry since a report was submitted to the government in May, former central bank governor Mohammed Farashuddin said the officials were low to mid-level and were not directly involved in the crime. Bangladesh has so far refused to make the inquiry report public saying it wanted to deny perpetrators knowledge of the investigation into one of the world's biggest cyber-heists.


Ericsson says Swedish staff cuts running ahead of plan

- Thu, 08 Dec 2016 08:50:59 -0500

Ericsson workers walk outside the Ericsson factory in BorasStruggling telecom equipment maker Ericsson said on Thursday sweeping staff cuts in its Swedish home market were running ahead of schedule, resulting in higher restructuring costs this year. There has been speculation among analysts and staff at Ericsson about whether the company might need further cost savings to deal with tough market conditions and one analyst said it looked like more jobs could go be lost globally. The company said it expected restructuring costs this year of 5.5-6.5 billion Swedish crowns ($606-717 million), higher than a previous estimate of 4-5 billion.


Trump is Time magazine's Person of the Year

- Wed, 07 Dec 2016 10:08:28 -0500

President-elect Donald Trump shades his eyes while looking at supporters during a rally in Fayetteville, N.C., Tuesday, Dec. 6, 2016. (AP Photo/Gerry Broome)WASHINGTON (AP) ? Time magazine on Wednesday named Donald Trump its Person of the Year, bestowing what the president-elect called an "honor" even as he derided the idea that he'll lead "the Divided States of America."


U.S. lawmaker: Sony breach may have inspired Russian election hacking

- Tue, 06 Dec 2016 18:15:32 -0500

Representative Adam Schiff waves after speaking at the Democratic National Convention in Philadelphia, PennsylvaniaBy Patricia Zengerle WASHINGTON (Reuters) - The U.S. failure to retaliate strongly for the 2014 cyber attack against Sony Pictures may have helped inspire Russian hackers who sought to interfere in the 2016 U.S. election, a senior congressional Democrat said on Tuesday. "Russia may have concluded that they could hack American institutions and there'd be no price to pay," Representative Adam Schiff, the top Democrat on the House of Representatives Intelligence Committee, told a press breakfast sponsored by the Christian Science Monitor. Russia was blamed for high-profile attacks on Democratic organizations that damaged the party during the 2016 election campaign, in which Republican Donald Trump won the presidency and his party kept control of the Senate and the House.


Trooper responding to call of erratic driver killed by him

- Tue, 06 Dec 2016 16:21:22 -0500

New Jersey State Troopers and police officers work the scene of a crash where a vehicle crashed into a state trooper's vehicle in Millville, N.J., Monday, Dec. 5, 2016. New Jersey State Trooper Frankie Williams, who was injured in the head-on crash, died after he was flown to a hospital. State police said an unidentified driver was pronounced dead at the scene. (WPVI-TV via AP)MILLVILLE, N.J. (AP) ? A recently married rookie state trooper responding to an emergency call about an erratic driver was killed in a violent wreck on a highway when the erratic driver, traveling in the opposite direction, crossed a grassy median and slammed into his marked cruiser head-on, authorities said.


EU, NATO cement 'transatlantic bond' before Trump takes office

- Tue, 06 Dec 2016 13:21:52 -0500

EU foreign policy chief Mogherini and NATO Secretary-General Stoltenberg address a joint news conference during a NATO foreign ministers meeting in BrusselsBy Robin Emmott and Sabine Siebold BRUSSELS (Reuters) - NATO and the European Union overcame years of rivalry on Tuesday to agree a seven-point plan to counter tactics such as cyber attacks, information warfare and irregular militia from Russia and other potential aggressors. The pact, which is not legally-binding, allows the six EU states outside NATO to benefit from some of the U.S. military support that President-elect Donald Trump has suggested could be conditional on greater European defense spending. The proposals should also reassure Europe that the United States, the leading power in the North Atlantic Treaty Organization, is committed to the region despite Trump's campaign comments that have unsettled allies, NATO officials said.


Russian central bank, private banks lose $31 mln in cyber attacks

- Tue, 06 Dec 2016 10:44:08 -0500

A padlock is displayed at the Alert Logic booth during the 2016 Black Hat cyber-security conference in Las VegasCentral bank official Artyom Sychyov discussed the losses at a briefing, saying that the hackers had attempted to steal about 5 billion rubles. Sychyov was commenting on a central bank report released earlier in the day, that told of hackers breaking into accounts there by faking a client's credentials.


Prosecutor's office paid bitcoin ransom in cyberattack

- Mon, 05 Dec 2016 18:56:27 -0500

PITTSBURGH (AP) ? A state prosecutor's office in Pennsylvania was among hundreds of thousands of victims of a now-shuttered international cybercrime operation, paying nearly $1,400 in a bitcoin ransom to free up its infected computer network, authorities disclosed Monday.

The Latest: Michigan Republicans appealing recount order

- Mon, 05 Dec 2016 15:48:49 -0500

Officials count ballots during a statewide presidential election recount in Waterford Township, Mich., Monday, Dec. 5, 2016. The recount comes at the request of Green Party candidate Jill Stein, who also requested recounts in Pennsylvania and Wisconsin. (AP Photo/Paul Sancya)MADISON, Wis. (AP) ? The Latest on the presidential recount efforts in Michigan, Pennsylvania and Wisconsin (all times local):


The Latest: Little change in Wisconsin recount results

- Mon, 05 Dec 2016 13:51:10 -0500

Jill Stein, the presidential Green Party candidate, speaks at a news conference in front of Trump Tower, Monday, Dec. 5, 2016, in New York. Stein is spearheading recount efforts in Pennsylvania, Michigan and Wisconsin. (AP Photo/Mark Lennihan)MADISON, Wis. (AP) ? The Latest on the presidential recount efforts in Michigan, Pennsylvania and Wisconsin (all times local):


Bangladesh to share findings of heist inquiry with Philippines

- Mon, 05 Dec 2016 05:58:11 -0500

Commuters pass by the front of the Bangladesh central bank building in DhakaBangladesh will share findings from its investigation into how unidentified hackers pulled off one of the world?s biggest cyber bank heists to help speed up recovery of the stolen funds, its law minister said on Monday. Bangladesh has up to now declined to disclose its findings of an inquiry into how the hackers used stolen Bangladesh Bank credentials to try to transfer nearly $1 billion from its U.S. Federal Reserve account in February. Philippine Finance Secretary Carlos Dominguez, who last week met a Bangladesh delegation led by Minister of Law Anisul Huq, said Manila "strongly recommended" Dhaka share the results of its investigation.


U.S. reshaping budget to account for Russian military threat

- Sun, 04 Dec 2016 23:45:57 -0500

FILE PHOTO - Secretary of the Air Force James talks to members of the 341st Missile Wing during a visit to Malmstrom Air Force Base, MontanaBy Andrea Shalal SIMI VALLEY, Calif. (Reuters) - Russia's increasing military activities around the world have unsettled top U.S. military officials, who say they are reshaping their budget plans to better address what they now consider to be the most pressing threat to U.S. security. "Russia is the No. 1 threat to the United States. James, Chief of Naval Operations Admiral John Richardson and Pentagon chief arms buyer Frank Kendall, all voiced growing concern about Russia's increasingly aggressive behavior in interviews late on Saturday.


Green Party taking bid for election recount to federal court

- Sun, 04 Dec 2016 07:38:44 -0500

FILE - In this Oct. 6, 2016 file photo, Green party presidential candidate Jill Stein meets her supporters during a campaign stop at Humanist Hall in Oakland, Calif. Green Party-backed voters dropped a court case Saturday night, Dec. 3, 2016, that had sought to force a statewide recount of Pennsylvania's Nov. 8 presidential election, won by Republican Donald Trump, in what Green Party presidential candidate Stein had framed as an effort to explore whether voting machines and systems had been hacked and the election result manipulated. (AP Photo/D. Ross Cameron)HARRISBURG, Pa. (AP) ? Green Party presidential candidate Jill Stein is taking her bid for a statewide recount of Pennsylvania's Nov. 8 presidential election to federal court.


Philippines urges Bangladesh to share results of heist investigation

- Sun, 04 Dec 2016 01:59:08 -0500

Commuters pass by the front of the Bangladesh central bank building in DhakaThe Philippine government wants Bangladesh to share the findings of its investigation into how unknown hackers pulled off one of the world's largest cyber bank heists, to help speed up recovery of the stolen funds. Finance Secretary Carlos Dominguez, who last week met with a Bangladesh delegation, said Manila "strongly recommended" Dhaka share the results of its investigation. Cyber criminals tried to steal nearly $1 billion from Bangladesh Bank in February and made off with $81 million via an account at the New York Federal Reserve.


Green Party switches strategy in Pennsylvania recount bid

- Sun, 04 Dec 2016 00:30:03 -0500

FILE - In this Oct. 6, 2016 file photo, Green party presidential candidate Jill Stein meets her supporters during a campaign stop at Humanist Hall in Oakland, Calif. Green Party-backed voters dropped a court case Saturday night, Dec. 3, 2016, that had sought to force a statewide recount of Pennsylvania's Nov. 8 presidential election, won by Republican Donald Trump, in what Green Party presidential candidate Stein had framed as an effort to explore whether voting machines and systems had been hacked and the election result manipulated. (AP Photo/D. Ross Cameron)HARRISBURG, Pa. (AP) ? A Green Party-backed campaign changed its strategy to force a statewide recount of Pennsylvania's Nov. 8 presidential election, won by Republican Donald Trump, and said late Saturday night that it will seek help in the federal courts, rather than the state courts.


The Latest: Stein changes strategy in Pennsylvania recount

- Sun, 04 Dec 2016 00:05:18 -0500

HARRISBURG, Pa. (AP) ? The Latest on the Green Party's effort to force a statewide recount of the Nov. 8 presidential election in Pennsylvania: (all times local):

Panel urges better cybersecurity to President-elect Trump

- Sat, 03 Dec 2016 07:14:37 -0500

FILE - In this Feb. 17, 2016, file photo, President Barack Obama, joined by from left, Commerce Secretary Penny Pritzker, former IBM CEO Sam Palmisano, former National Security Adviser Tom Donilon, and Homeland Security Secretary Jeh Johnson, talks to media in the Oval Office of the White House, in Washington. Donilon, and Palmisano, are being appointed as the Chair and Vice Chair, respectively, of the Commission on Enhancing National Cybersecurity. A national commission is delivering urgent recommendations to improve the nation's cybersecurity, weeks before President-elect Donald Trump takes office. The report follows the worst hacking of U.S. government systems in history and the Obama administration accusing Russia of meddling in the U.S. presidential election by hacking Democrats. (AP Photo/Carolyn Kaster, File)WASHINGTON (AP) ? A presidential commission on Friday made 16 urgent recommendations to improve the nation's cybersecurity, including creating a nutritional-type label to help consumers shop wisely and appointing a new international ambassador on the subject ? weeks before President-elect Donald Trump takes office.


Russian central bank loses $31 million in cyber attack

- Fri, 02 Dec 2016 15:09:17 -0500

A padlock is displayed at the Alert Logic booth during the 2016 Black Hat cyber-security conference in Las VegasHackers stole more than 2 billion rubles ($31 million) from correspondent accounts at the Russian central bank, the bank said on Friday, the latest example of an escalation of cyber attacks on financial institutions around the globe. Central bank official Artyom Sychyov discussed the losses at a briefing, saying that the hackers had attempted to steal about 5 billion rubles. Sychyov was commenting on a central bank report released earlier in the day, that told about hackers breaking into accounts there by faking a client's credentials.


Radical Pirate Party to seek to form government in Iceland

- Fri, 02 Dec 2016 13:33:22 -0500

FILE - In this Sunday, Oct. 30, 2016 file photo, Birgitta Jonsdottir of the Pirater (Pirate) Party addresses the media during a conference in Reykjavik, Iceland. Iceland?s president has asked the anti-authoritarian Pirate Party to try to form a government, after two earlier rounds of coalition talks failed. On Friday, Dec. 2, 2016, Gudni Johannesson said he has asked senior Pirate lawmaker Birgitta Jonsdottir to try to assemble a government with other parties. (AP Photo/Frank Augstein, File)LONDON (AP) ? Iceland's anti-authoritarian Pirate Party took the helm in talks to form a new coalition government for the island nation Friday, after two earlier rounds of negotiations broke down.


Europe must brace for new, varied IS attacks: security chief

- Fri, 02 Dec 2016 13:10:52 -0500

EU Counter-Terrorism Coordinator Gilles de Kerchove is seen during an interview with Reuters in his office in BrusselsBy Alastair Macdonald BRUSSELS (Reuters) - Islamic State will attack Europe again, security chiefs warned on Friday, and may add car bombs, cyber and chemical warfare to its local arsenal as European militants drift home after reverses in Syria and Iraq. Gilles de Kerchove, the European Union's Counter-Terrorism Coordinator, said it was impossible to know for sure how many militants were already in Europe plotting. "We have to be prepared because some of them will come to Europe," said de Kerchove, a veteran EU official whose Brussels office is packed with books and souvenirs from nine years of intensive travel and talking with Europe's troubled neighbors.


Factbox: Deals scuppered by U.S. regulatory scrutiny

- Fri, 02 Dec 2016 12:24:31 -0500

(Reuters) - Aixtron SE's takeover by China's Fujian Grand Chip Investment Fund may soon be on the list of deals called off due to increased U.S. regulatory scrutiny. The Committee on Foreign Investment in the United States (CFIUS) has recommended that the 670 million-euro deal be blocked due to security concerns. The CFIUS, that examines deals to determine the effect on national security, has targeted Chinese companies aggressively pursuing acquisitions in the United States and has already derailed several high-profile deals. ...

Russia says foreign spies plan cyber attack on banking system

- Fri, 02 Dec 2016 05:00:15 -0500

A hand is silhouetted in front of a computer screen in this picture illustration taken in BerlinBy Christian Lowe and Natalia Zinets MOSCOW/KIEV (Reuters) - Russia said on Friday it had uncovered a plot by foreign spy agencies to sow chaos in Russia's banking system via a coordinated wave of cyber attacks and fake social media reports about banks going bust. Russia's domestic intelligence agency, the Federal Security Service (FSB), said that the servers to be used in the alleged cyber attack were located in the Netherlands and registered to a Ukrainian web hosting company called BlazingFast.


FBI to gain expanded hacking powers as Senate effort to block fails

- Thu, 01 Dec 2016 18:42:13 -0500

The word 'password' is pictured on a computer screen in this picture illustration taken in BerlinBy Dustin Volz WASHINGTON (Reuters) - A last-ditch effort in the Senate to block or delay rule changes that would expand the U.S. government's hacking powers failed Wednesday, despite concerns the changes would jeopardize the privacy rights of innocent Americans and risk possible abuse by the incoming administration of President-elect Donald Trump. Democratic Senator Ron Wyden attempted three times to delay the changes, which will take effect on Thursday and allow U.S. judges will be able to issue search warrants that give the FBI the authority to remotely access computers in any jurisdiction, potentially even overseas. Magistrate judges can currently only order searches within the jurisdiction of their court, which is typically limited to a few counties.


Business Highlights

- Thu, 01 Dec 2016 17:19:41 -0500

___ US consumers should feel muted impact from rising oil price OPEC's decision to cut production gave an immediate boost to oil prices, but the impact on consumers and the U.S. economy is likely to be ...

The Latest: Stein calls Trump's recount objection 'shameful'

- Thu, 01 Dec 2016 16:45:49 -0500

Ballots from the town of Middleton, Wis., are placed in front of workers as a statewide presidential election recount begins, Thursday, Dec. 1, 2016, in Madison, Wis. The first candidate-driven statewide recount of a presidential election in 16 years began Thursday in Wisconsin, a state that Donald Trump won by less than a percentage point over Hillary Clinton after polls long predicted a Clinton victory. (AP Photo/Scott Bauer)LANSING, Mich. (AP) ? The Latest on the presidential recount efforts in Michigan, Pennsylvania and Wisconsin (all times local):


Shamoon virus returns in Saudi computer attacks after four-year hiatus

- Thu, 01 Dec 2016 15:40:32 -0500

Shamoon, the destructive computer virus that four years ago crippled tens of thousands of computers at Middle Eastern energy companies, was used two weeks ago to attack computers in Saudi Arabia, according to several U.S. cyber security firms. CrowdStrike, FireEye Inc, Intel Corp's McAfee security unit, Palo Alto Networks Inc and Symantec Corp warned of the attacks, though they did not name any victims.

Police make 5 arrests in 'unprecedented' cybercrime takedown

- Thu, 01 Dec 2016 13:28:58 -0500

German Interior Minister Thomas de Maiziere speaks about the arrest of heads of a group called Avalanche, in Berlin, Thursday Dec. 1, 2016. Also Europol says five key suspects have been arrested in connection with a massive operation aimed at knocking out a cybercrime group accused of inflicting hundreds of millions of euros in losses worldwide. The European Union police agency said the sweep was "unprecedented in its scale" and resulted in the seizure of 39 servers and hundreds of thousands of internet domains used by the group, nicknamed Avalanche. (Kay Nietfeld/dpa via AP)PARIS (AP) ? U.S. and European officials say they've knocked out a cybercrime group accused of inflicting hundreds of millions of dollars in losses worldwide, putting five key suspects in custody.


On nuclear weapons, Trump face questions of modernization

- Thu, 01 Dec 2016 12:53:54 -0500

FILE - In this Nov. 10, 2016 file photo, President-elect Donald Trump speaks during his meeting with President Barack Obama in the Oval Office of the White House in Washington. President-elect Donald Trump is poised to take a victory lap, appearing first in Indiana to salute workers at a factory that he made a campaign promise to save. He then goes to Ohio on the first stop of a ?Thank You Tour? to honor the supporters in states that gave him his stunning victory. The Midwest swing will be the first time Trump has barnstormed across the country since the campaign. (AP Photo/Pablo Martinez Monsivais, File)WASHINGTON (AP) ? As commander in chief, Donald Trump will face politically fraught decisions about a nuclear arsenal in need of modernizing. Among the open questions: How much modernization is enough? Can the U.S. get by with fewer of these weapons? Is it time to take some off hair-trigger alert?