IANS Blog RSS Feed

http://www.iansresearch.com

Court Gives FTC Green Light to Continue Wyndham Cybersecurity Suit

- Wed, 02 Sep 2015 00:00:00 GMT

Companies lacking strong cybersecurity controls now have something else to worry about if they are breached: the Federal Trade Commission.

Hackers Release More Ashley Madison Data

- Mon, 24 Aug 2015 00:00:00 GMT

Even if you have been living under a rock, you?ve probably heard about the hack and subsequent data dump targeting Ashley Madison, a controversial online dating service for married individuals.

Newly Discovered ?Stagefright? Bug the Worst Android Vulnerability Yet

- Wed, 29 Jul 2015 00:00:00 GMT

A researcher has discovered a massive security flaw impacting Android mobile devices that potentially allows hackers to gain remote code execution privileges simply by knowing the targeted individual?s phone number.

Officials: United Airlines, NYSE Shutdowns Not Caused by Hackers

- Thu, 09 Jul 2015 00:00:00 GMT

Speculation and conspiracy theories were running wild one day after United Airlines, the New York Stock Exchange and the Wall Street Journal unexpectedly shut down as a result of what government and company officials are calling technical glitches.

Surveillance Software Maker ?Hacking Team? Victimized in Data Breach

- Mon, 06 Jul 2015 00:00:00 GMT

What happens when the hackers get hacked? We?re quickly finding out, as an Italian company that sells surveillance software to government agencies recently fell victim to what appears to be a significant data breach.

Cisco to Purchase OpenDNS in $635 Million Deal

- Tue, 30 Jun 2015 00:00:00 GMT

Cisco?s efforts to add a cloud security layer took a major step forward this week, as the technology giant has announced it plans to acquire San Francisco-based cloud security firm OpenDNS.

Millions of Samsung Galaxy Phones Vulnerable to Keyboard Software Flaw

- Wed, 17 Jun 2015 00:00:00 GMT

A security flaw in the pre-installed keyboard software on Samsung Galaxy mobile devices could potentially give hackers system user level privileges, enabling them to install malicious apps and even eavesdrop on phone calls.

LastPass Breach Exposes User Emails, Password Reminders

- Tue, 16 Jun 2015 00:00:00 GMT

It?s commonly stated that no matter how diligent one is when it comes to information security, it?s impossible to ever be 100 percent protected, and a recently disclosed breach of a password manager provided a stark reminder of this reality.

Federal Union: OPM Breach Far More Extensive Than Initially Disclosed

- Fri, 12 Jun 2015 00:00:00 GMT

The union representing government employees claims the hackers who breached the Office of Personnel Management (OPM) gained access to far more data than the office has disclosed.

Kaspersky: Nation-State Attack Targeted Hotels Hosting Iran Nuclear Negotiations

- Thu, 11 Jun 2015 00:00:00 GMT

Cybersecurity firm Kaspersky says it has uncovered a cyberattack likely perpetrated by a nation state that targeted hotels where negotiations over the Iran nuclear deal were being held.

Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

Trojan.Carberp.D

- Wed, 2 Sep 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

IOS.Keyraider

- Mon, 31 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Packed.Dromedan!gen19

- Tue, 1 Sep 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AA

- Mon, 31 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Downloader.Escelar!gm

- Mon, 31 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

W32.Ransomlock.AO!inf4

- Sun, 30 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Virus.

Trojan.Kotver

- Sat, 29 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Switrex

- Sat, 29 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

W32.Cridex!gen5

- Thu, 27 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Worm.

JS.Downloader!gen5

- Fri, 28 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Uwarrat

- Wed, 26 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen38

- Tue, 25 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen471

- Tue, 25 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen312

- Tue, 25 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen444

- Tue, 25 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.PUA!gen7

- Tue, 25 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Mimikatz!gen3

- Tue, 25 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Gatak!gen5

- Tue, 25 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Trojan.LH2

- Tue, 25 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Infostealer.Canfili

- Tue, 25 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Downloader.Upatre!g18

- Mon, 24 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Emdivi!gm

- Fri, 21 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Duuzer

- Fri, 21 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.Z

- Tue, 18 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.Y

- Tue, 18 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

W32.Ransomlock.AO!inf3

- Mon, 17 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Virus.

W32.Ransomlock.AO!gen2

- Mon, 17 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Virus.

Trojan.Sofacy.C

- Sat, 15 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.X

- Sat, 15 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptlock.X!gm

- Sat, 15 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Ranscrypt.T!gm

- Thu, 13 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

W32.Greypac!gen1

- Wed, 12 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Worm.

Trojan.Aniralia!gm2

- Wed, 12 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Linux.Pinscan

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

SONAR.SuspBeh!gen307

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen466

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen540

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g13

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g15

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspLaunch!gen6

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen488

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen391

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen316

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MultiExt!gen2

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Tapaoux.C

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomlock!g79

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Linux.Pinscan.B

- Tue, 11 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

W32.Ransomlock.AQ!inf

- Mon, 10 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Virus.

Trojan.Aniralia!gm1

- Thu, 6 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Packed.Dromedan!gen17

- Sat, 8 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Korplug!gen10

- Sat, 8 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Cozer.B

- Sat, 8 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Cozer.B!gm

- Sat, 8 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Backdoor.Korplug!gen9

- Thu, 6 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Aniralia

- Thu, 6 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Aniralia!gm

- Thu, 6 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Trojan.Patchbrowse

- Fri, 7 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Infostealer.Atimpo

- Wed, 5 Aug 2015 00:00:00 -0700

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

Report: Some top baby monitors lack basic security features

- Wed, 02 Sep 2015 18:59:31 -0400

NEW YORK (AP) ? Several of the most popular Internet-connected baby monitors lack basic security features, making them vulnerable to even the most basic hacking attempts, according to a new report from a cybersecurity firm.

Trader accused in $100 million hacking scheme pleads not guilty in U.S.

- Wed, 02 Sep 2015 18:08:13 -0400

By Alice Popovici NEWARK, N.J. (Reuters) - A man charged over his alleged role in a more than $100 million insider trading scheme that involved hacking into networks that distribute corporate news releases pleaded not guilty on Wednesday. Arkadiy Dubovoy, who spoke Russian and used an interpreter, entered his plea to securities fraud, wire fraud and conspiracy charges in a brief appearance before U.S. District Judge Madeline Cox Arleo in Newark, New Jersey. Dubovoy's son, Igor, appeared separately on related charges before U.S. Magistrate Judge Cathy Waldor, also in Newark, on Wednesday, and is expected to enter a formal plea at a Sept. 14 arraignment.

'Concussion' football movie altered to avoid angering NFL: NY Times

- Wed, 02 Sep 2015 15:17:47 -0400

A football helmet's health warning sticker is pictured between a U.S. flag and the number 55, in memory of former student and NFL player Junior Seau, as the Oceanside Pirates high school football team prepares for their Friday night game in OceansideBy Reuters Staff NEW YORK (Reuters) - Sony Pictures Entertainment executives altered the script of its forthcoming movie "Concussion," about football-related brain trauma, to avoid antagonizing the National Football League, the New York Times reported on Wednesday. Citing emails between Sony studio executives that were leaked by hackers last year, the Times said marketing plans for the movie were positioned to focus on the story of a whistle-blower, rather than a condemnation of the sport. Sony said on Wednesday that the New York Times story "contains many misleading references" and that nothing had been "softened" in the film to placate anyone.


Huawei takes aim at Apple, Samsung with Mate S phone

- Wed, 02 Sep 2015 12:20:25 -0400

Huawei CEO Yu presents the new Mate S ahead the of the IFA Electronics show in BerlinBy Harro Ten Wolde and Nadine Schimroszik BERLIN (Reuters) - China's Huawei Technologies [HWT.UL] unveiled a new smartphone on Wednesday, taking aim at the high end of the market, which is dominated by Apple and Samsung Electronics. The Mate S, launched on the sidelines of Europe's biggest consumer electronics show, IFA, in Berlin, has a 5.5-inch display, a 13 mega pixel rear camera and fingerprint security. Huawei says it is one of the first smartphones to include a Force Touch display, which can distinguish between a light tap and deep press, enabling access to more functions just by pressing harder.


'Concussion' director says no compromises were made for NFL

- Wed, 02 Sep 2015 11:41:14 -0400

'Concussion' director says no compromises were made for NFLA day after its trailer debuted online and months before it hits theaters, the Will Smith football head-trauma film "Concussion" is already sparking controversy. Citing studio emails leaked in ...


U.S. cyber security firm Tanium valued at $3.5 billion

- Wed, 02 Sep 2015 08:32:38 -0400

By Heather Somerville SAN FRANCISCO (Reuters) - Cyber security software firm Tanium has raised $120 million from investment firms as more U.S. federal agencies rely on its technology to fend off attacks from nation-states and hackers, the company announced Wednesday. Tanium closed the round - its third in just more than a year - at a $3.5 billion valuation. Tanium is the highest-valued venture-backed cyber security company worldwide, according CB Insights, which does research on venture capital.

Report: Malware targeting Android smartphones on the rise

- Wed, 02 Sep 2015 07:36:13 -0400

FILE - This is a Friday, Sept. 5, 2014 file photo of a woman as she passes an installation with curved screens, displayed by Samsung at the consumer electronic fair IFA in Berlin, Germany. Europe?s flagship gadget show, the IFA in Berlin, opens its doors to the public on Friday Sept. 4, 2015 . Almost 1,500 companies and over 250 000 people are expected to visit the event, which runs through Sept. 9. (AP Photo/Markus Schreiber)BERLIN (AP) ? Malicious software targeting smartphones with the Android operating system is becoming more common, with some handsets already infected when they're bought.


How many Ashley Madison users were flirting with fembots?

- Tue, 01 Sep 2015 20:45:07 -0400

Ashley Madison is claiming that millions of real women regularly use its website to help them have affairs. But if that?s the case, why do so many of the website?s robo-users disproportionately send messages to male users?†Gizmodo?s Annalee Newitz has done some more detective work on the leaked Ashley Madison data and has discovered that the website has had its bots send more than 20 million messages to men while sending less than 2,000 such robo-messages to women. Meanwhile, Ashley Madison?s bots engaged in instant message chats with men more than 11 million times and chatted with women on the site just 2,400 times. MUST READ:†Enough: It?s time for major tech companies to take a stand against ISP data caps

Millions hit by personal data hack still have not been told

- Tue, 01 Sep 2015 18:22:54 -0400

U.S. Office of Personnel Management building in WashingtonThe U.S. government has not yet notified any of the 21.5 million federal employees and contractors whose security clearance data was hacked more than three months ago, officials acknowledged on Tuesday. The agency whose data was hacked, the Office of Personnel Management (OPM), said the Defense Department will begin "later this month" to notify employees and contractors across the government that their personal information was accessed by hackers.


FIFA scandal becomes exhibit at Mob Museum in Las Vegas

- Tue, 01 Sep 2015 16:38:10 -0400

LAS VEGAS (AP) ? Al Capone, with raised eyebrows, appeared to be taking a curious sideways glance at the two-minute video of soccer playing and talk about corruption and crooks.

5 things to watch at the IFA gadget show in Berlin

- Tue, 01 Sep 2015 11:52:28 -0400

Report: Malware targeting Android smartphones on the riseSome 1,500 companies and over 250,000 people are expected to visit Europe's flagship technology show, the IFA in Berlin, when it opens to the public on Friday. The event, which runs through Sept. 9, will ...


New Nexus 5 and Nexus 6 cases leak, seem to confirm one major new feature

- Tue, 01 Sep 2015 08:45:39 -0400

Thanks to numerous leaks we already know a lot about†Google?s upcoming new Nexus 5 and Nexus 6†devices. They?re made by LG and Huawei, and they should be launched this fall as soon as Android 6.0 Marshmallow is ready for mass consumption. Considering that Google?s new mobile operating system brings support for some major new features, it seemed obvious long before leaks actually started coming in that the new Nexus handsets would pack specific hardware to take advantage of the new Marshmallow features, and a pair of new leaks have confirmed the presence of a fingerprint scanner on both devices. DON?T MISS: iPhone 6s and iPhone 6s Plus: Leaked pricing paints grim picture for your wallet Specifically, photos†from MKBHD and Steve

Web address explosion is bonanza for cyber-criminals: study

- Tue, 01 Sep 2015 07:21:36 -0400

An illustration picture shows projection of binary code on man holding aptop computer in WarsawAn explosion in the number of new Internet addresses has created a wealth of opportunities for criminals exploiting shady domains such as .zip, .kim or .party, according to an industry study published on Tuesday. An analysis of tens of millions of websites by enterprise security company Blue Coat found the most dangerous top-level domains (TLDs) were .zip, .review and .country, while the safest new ones were .london, .tel and .church. "Ideally, TLDs would all be run by security-conscious operators who diligently review new domain name applications, and reject those that don't meet a stringent set of criteria," Blue Coat wrote in its study.


UK agency against cybercrime targeted in online attack

- Tue, 01 Sep 2015 06:52:33 -0400

LONDON (AP) ? Britain's National Crime Agency says its website has been targeted in an apparent cyberattack.

Reporters cleared in Thai navy defamation case

- Tue, 01 Sep 2015 04:00:10 -0400

Australian journalist Alan Morison and Thai journalist Chutima Sidasathian smile as they arrive at court in Phuket, ThailandBy Martin Petty and Pairat Temphairojana PHUKET, Thailand (Reuters) - A court on the Thai island of Phuket cleared two journalists on Tuesday of defaming the Thai navy and other related charges in a report they published in 2013 on the trafficking of Muslim minority Rohingya people from Myanmar. The high-profile case was one of a number brought by authorities under Thailand's harsh defamation and cyber-crime laws that have drawn criticism from rights groups concerned about curbs on freedom of speech in the military-run country. The complaint against Australian Alan Morison and Thai national Chutima Sidasathian was filed by a naval officer based in Phuket.


Exclusive: U.S. weighs sanctioning Russia as well as China in cyber attacks

- Tue, 01 Sep 2015 01:19:25 -0400

A map of China is seen through a magnifying glass on a computer screen showing binary digits in SingaporeBy Arshad Mohammed, Matt Spetalnick and Mark Hosenball WASHINGTON (Reuters) - The United States is considering sanctions against both Russian and Chinese individuals and companies for cyber attacks against U.S. commercial targets, several U.S. officials said on Monday. The officials, who spoke on condition of anonymity, said no final decision had been made on imposing sanctions, which could strain relations with Russia further and, if they came soon, cast a pall over a state visit by Chinese President Xi Jinping in September. It did not mention Russia.


Ashley Madison owner says website still adding users after data hack

- Mon, 31 Aug 2015 19:09:08 -0400

A photo illustration shows the Ashley Madison website displayed on a smartphone in TorontoHundreds of thousands of people signed up for infidelity website Ashley Madison in the last week, parent company Avid Life Media said on Monday, even after hackers leaked data about millions of its clients. "Recent media reports predicting the imminent demise of Ashley Madison are greatly exaggerated," the company said in a statement. "Despite having our business and customers attacked, we are growing." On Aug. 18, hackers who claimed to be unhappy with Avid Life's business practices released Ashley Madison customer data.


7 Overlooked Risks When Your Child Goes To College

- Mon, 31 Aug 2015 19:04:00 -0400

When a child goes away to college parents need to be aware of these seven overlooked risks and how to protect against them to ensure safety and insure the family's assets.

DDoS attacks are getting much more powerful and the Pentagon is scrambling for solutions

- Mon, 31 Aug 2015 15:10:57 -0400

No wonder the Pentagon has announced it?s working on a plan to fund tools and researchers to help organizations defend themselves against the pervasive threat of cyber assaults known as distributed denial-of-service (DDoS) attacks. In recent days, the agency said it?s looking to fund researchers who can come up with tools as part of a program starting next April that would, among other things, help organizations recover from DDoS attacks in a maximum of 10 seconds.†And the acknowledgement of that hunt for†researchers for the program, called Extreme DDoS Defense, arguably comes not a moment too soon. DON?T MISS:†It?s not just Windows 10, Windows 7 and 8 are also tracking you ? here?s how to stop them A few new industry

Google tries to woo iPhone owners with Android watch app

- Mon, 31 Aug 2015 13:14:40 -0400

In this Aug. 21, 2015, a new Android Wear smartwatch that is compatible with the Apple iPhone is displayed at Google's offices in San Francisco. Google is introducing an application that will connect Android smartwatches with Apple's iPhone, escalating the rivals' battle to strap their technology on people's wrists. (AP Photo/Eric Risberg)SAN FRANCISCO (AP) ? Google is introducing an application that will connect Android smartwatches with Apple's iPhone, escalating the rivals' battle to strap their technology on people's wrists.


Largest Apple account theft ever discovered ? how to tell if you?re affected

- Mon, 31 Aug 2015 10:30:32 -0400

Apple?s walled iOS garden is more resistant to†malware†than Android, though there are still malware apps that can take advantage of Apple?s mobile operating system. A security company found what?s believed to be the largest known Apple account theft caused by malware, and it?s developed an online tool that can help you check out whether you were affected already exists. DON?T MISS: iPhone 6s and iPhone 6s Plus: Leaked pricing paints grim picture for your wallet The first thing you need to know about this malware threat is that it affected just over 225,000 accounts originating from 18 countries including China, France, Russia, Japan, United Kingdom, United States, Canada, Germany, Australia, Israel, Italy, Spain, Singapore, and South Korea. Furthermore, only jailbroken

T-Mobile CEO declares war on ?thieves? who are ?stealing? tethered LTE data

- Mon, 31 Aug 2015 08:25:18 -0400

How can someone steal something that?s unlimited? That?s a question you might ask when hearing that T-Mobile has started a war on data hogs who are taking advantage of its unlimited data plans. But the uncarrier?s CEO made it clear on Periscope and on the company?s blog on Sunday how that?s happening, as T-Mobile has had enough of people using workarounds to use their T-Mobile connections to get unlimited tethering data and mask their abuse. DON?T MISS: iPhone 6s and iPhone 6s Plus: Leaked pricing paints grim picture for your wallet ?Here?s what?s happening: when customers buy our unlimited 4G LTE plan for their smartphones we include a fixed amount of LTE to be used for tethering (using the ?Smartphone

U.S. considering sanctions over Chinese cyber theft: Washington Post

- Mon, 31 Aug 2015 06:01:04 -0400

A map of China is seen through a magnifying glass on a computer screen showing binary digits in SingaporeThe White House is considering applying sanctions against companies and individuals in China it believes have benefited from Chinese hacking of U.S. trade secrets, the Washington Post reported on Sunday. The newspaper, citing several unidentified Obama administration officials, said a final determination on whether to issue the sanctions was expected soon, possibly as early as the next two weeks. Suspicions that Chinese hackers were behind a series of data breaches in the United States have been an irritant in relations between the world's two largest economies as President Xi Jinping prepares to make his first visit to the United States next month.


Ashley Madison courted several buyers, landed none before attack

- Sat, 29 Aug 2015 07:50:43 -0400

A photo illustration shows the privacy policy of the Ashley Madison website seen behind a smartphone running the Ashley Madison app in TorontoBy Allison Martell and Alastair Sharp TORONTO (Reuters) - The owner of adultery website Ashley Madison had already been struggling to sell itself or raise funds for at least three years before the publication of details about its members, according to internal documents and emails also†released by hackers as part of their assault on the company in recent weeks. Avid Life Media announced on Friday that CEO Noel Biderman, who founded the website in 2001, had left the company with immediate effect, the latest sign of the wrenching impact on the company of the attack that led to the disclosure of sensitive data about millions of clients.


Uber hires two security researchers to improve car technology

- Fri, 28 Aug 2015 18:23:50 -0400

Uber logo is seen on a vehicle near Union Square in San Francisco, CaliforniaBy Joseph Menn and Heather Somerville SAN FRANCISCO (Reuters) - Uber Technologies Inc [UBER.UL] has hired two top vehicle security researchers, the company said on Friday, high-profile additions that come as the ride-hailing service ramps up its work on technology for self-driving cars. Charlie Miller, who had been working at Twitter Inc, and Chris Valasek, who worked at security firm IOActive, have resigned from their jobs and will join Uber next week. Miller and Valasek won wide attention this month after demonstrating that they could hack into a moving Jeep.


Exclusive: Russia's Kaspersky threatened to 'rub out' rival, email shows

- Fri, 28 Aug 2015 17:52:09 -0400

Eugene Kaspersky, chairman and CEO of Kaspersky Lab, listens to a question during an interview in New YorkBy Joseph Menn SAN FRANCISCO (Reuters) - In 2009, Eugene Kaspersky, co-founder of one of the world's top security companies, told some of his lieutenants that they should attack rival antivirus software maker AVG Technologies N.V. by "rubbing them out in the outhouse," one of several previously undisclosed emails shows. As previously reported by Reuters, the plan involved creating fake virus samples and malware identifications to fool competitors into disabling or deleting important files, thereby creating problems for their customers.


United Airlines to revamp scheduling to fight flight delays

- Fri, 28 Aug 2015 17:46:35 -0400

United Airlines planes are seen on platform at the Newark Liberty International Airport in New JerseyUnited Airlines plans to change the way it schedules flights and to use new technology to tackle the delays and cancellations that have hurt its competitiveness, company executives told Reuters. The new initiatives aim to narrow the gap in performance between United Continental Holdings Inc and Delta Air Lines Inc , which has the best on-time record of U.S. airlines.


Ashley Madison CEO steps down in wake of hacking

- Fri, 28 Aug 2015 16:16:51 -0400

Hackers Release Confidential Member Information From The Ashley Madison Infidelity WebsiteNEW YORK (AP) ? The CEO of the company that runs adultery website Ashley Madison is stepping down in the wake of the massive breach of the company's computer systems and outing of millions of its members.


Ashley Madison parent CEO quits after huge infidelity data hack

- Fri, 28 Aug 2015 13:22:35 -0400

Ashley Madison founder Noel Biderman poses with a poster during an interview in Hong KongBy Alastair Sharp TORONTO (Reuters) - The chief executive of infidelity website Ashley Madison's parent company Avid Life Media has left, just over a week after hackers leaked data about millions of its clients in a massive cyber assault. Avid Life said on Friday the departure of Noel Biderman was by "mutual agreement" and its existing senior management team would take over until a new CEO is appointed. On Aug. 18, hackers who claimed to be unhappy with its business practices released the Ashley Madison customer data, and police probing the breach said it had sparked extortion attempts and at least two unconfirmed suicides.


Republican Rubio attacks China's Xi ahead of visit

- Fri, 28 Aug 2015 12:37:45 -0400

Republican presidential candidate, Senator Marco Rubio participates in "Restoring American Leadership: A Conversation with Senator Marco Rubio" at the 3 West Club in New YorkBy Alistair Bell WASHINGTON (Reuters) - Republican presidential candidate Marco Rubio on Friday accused Chinese President Xi Jinping, who is scheduled to make a state visit to Washington next month, of stepping up a campaign to push the United States out of Asia. Rubio, a foreign policy hawk, called on President Barack Obama "to speak bluntly to this authoritarian ruler" and downgrade Xi's visit by scrapping a planned state dinner at the White House. Rubio, a U.S. senator from Florida, accused Xi of trying to undermine U.S. influence in Asia by asserting Chinese control over disputed territories in the East and South China Seas.


Investors still in the dark as cyber threat grows

- Fri, 28 Aug 2015 10:38:01 -0400

An illustration picture shows projection of binary code on man holding aptop computer in WarsawBy Simon Jessop and Ross Kerber LONDON/BOSTON (Reuters) - Investors are being poorly served by a haphazard approach from fund managers to the growing threat of cyber crime damaging the companies in which they invest, with a lack of clarity from the businesses themselves compounding the problem. Banks have led the way in developing cyber defenses and some top fund managers have ramped up pressure on companies to do more, but the broader picture is less encouraging. "I don't see any visible stand asset managers are taking, like they do on other social responsibility items," said Malcolm Harkins, information security chief at U.S. cyber security start-up Cylance Inc. The soft underbelly of companies outside the banking sector was exposed again this month when hackers leaked details of nearly 37 million clients of Ashley Madison.


US national security adviser in China ahead of Xi's US trip

- Fri, 28 Aug 2015 08:51:38 -0400

U.S. National Security Advisor Susan Rice, left, shakes hands with Chinese President Xi Jinping prior to their meeting at the Great Hall of the People in Beijing Friday, Aug. 28, 2015. Rice met with Xi amid final preparations for the Chinese leader's visit to Washington next month, with both sides expressing optimism despite their differences. (Jason Lee/Pool Photo via AP)BEIJING (AP) ? The U.S. national security adviser met with President Xi Jinping on Friday amid final preparations for the Chinese leader's visit to Washington next month, with both sides expressing optimism despite their differences.


U.S., China stress positives ahead of Xi trip

- Fri, 28 Aug 2015 07:07:18 -0400

Chinese President Xi Jinping applauds during the opening ceremony of the 15th IAAF World Championships at the National Stadium in BeijingChina and the United States stressed the positives in their complex relationship on Friday during meetings between U.S. National Security Adviser Susan Rice and Chinese officials ahead of a U.S. visit by Chinese President Xi Jinping next month. While the world's two largest economies have important mutual interests, like trying to rein in North Korea's nuclear program, deep disagreements exist over everything from Internet security to China's claims in the South China Sea. "We have seen our bilateral relationship evolve and strengthen in recent months.†And we have found areas of broadened and deepened cooperation that we are certainly looking forward to building upon," Rice told China's top diplomat, State Councillor Yang Jiechi, who outranks the foreign minister.


Huawei brings online smartphone brand Honor to Europe

- Fri, 28 Aug 2015 05:55:22 -0400

A worker adjusts the logo at the stand of Huawei at the CeBIT trade fair in Hanover((This August 27 has been corrected to mention June 30 in fifth paragraph)) LONDON (Reuters) - Huawei Technologies Co Ltd [HWT.UL] brought its youth-focused mobile phone brand Honor to Europe on Thursday with the launch of the Honor 7, a handset that has chalked up sales of more than 1.5 million in China since June. Huawei, the world's number three smartphone maker according to Gartner, has invested heavily in the past couple of years to establish Honor as a standalone brand challenging Beijing-based Xiaomi Inc [XTC.UL] in appealing to digitally savvy consumers. George Zhao, president of Huawei's Honor brand, said the handsets would be mainly promoted and sold online in Europe, as they were in China.


The most hilarious revelation about the Ashley Madison hack yet

- Thu, 27 Aug 2015 23:15:57 -0400

Was Ashley Madison a website full of married guys who spent their time trying to hook up with bots and/or other guys whom they thought were women?†Gizmodo has taken a look at some of the leaked data about the website and has found that the reality is it?s ?like a science fictional future where every woman on Earth is dead, and some Dilbert-like engineer has replaced them with badly-designed robots.? RELATED:†Things are getting worse and worse for Ashley Madison Gizmodo took a look at female profiles on the site and discovered that most of them were never used at all after they were created. In fact, the site estimates that roughly 12,000 of the 5.5 million registered female accounts are

Huge leak details another new iPhone 6s feature you?re going to love

- Thu, 27 Aug 2015 17:30:15 -0400

Apple Watch users who are in love with the Motion watch face ? the one where an animation of a flower, butterfly or jellyfish pops up on the screen†each time you check the time†?†should know that Apple is reportedly bringing the same kind of animated UI to the iPhone 6s and iPhone 6s Plus. DON?T MISS:†New free iPhone app will change the way you use email ? watch the video if you don?t believe us Coming from the often accurate Mark Gurman from 9toMac, the report says Apple will offer iPhone 6s buyers a ?spiced up set of animated wallpapers? that will work similarly to what?s available on the Apple Watch. Animated wallpapers have been seen by two sources who

Everything we expect to see at Apple?s big iPhone 6s event

- Thu, 27 Aug 2015 14:54:15 -0400

Apple on Thursday set September 9th as the official date for its fall 2015 iPhone launch. While Apple?s newest smartphone will be the highlight of its event, we?re expecting to see a lot more from the pride of Cupertino this year than just another phone. Below we?ll go over the biggest things we?re likely to see at Apple?s event on September 9th. RELATED:†iPhone 6s: New report reveals every single detail on new 12MP camera The iPhone 6s and the iPhone 6s Plus These are the twin bells of the ball, although we don?t expect them to look too different from the two smartphones Apple released last year. The most recent leaks indicate both smartphones will feature 12-megapixel cameras that can

Report links hacking scheme to Iran

- Thu, 27 Aug 2015 14:53:21 -0400

NEW YORK (AP) ? Researchers have linked a sophisticated hacking scheme targeting Iranian dissidents and at least one freedom of expression activist back to Iran.

Scary iPhone malware can spy on you even after you close infected apps

- Thu, 27 Aug 2015 14:07:21 -0400

A rather scary piece of iPhone malware†would let an attacker spy on a target using an approved App Store app without the person?s knowledge. In fact, the malware app could continue to gather data for the hackers†? or for a spy agency ? even after the infected†app is closed by the user.†Apple apparently fixed this huge vulnerability beginning with iOS 8.4.1, but earlier iOS builds are still affected. DON?T MISS:†New free iPhone app will change the way you use email ? watch the video if you don?t believe us If you stop using an app and minimize it to the background, the app stops working after about†three minutes to save processor power and thus battery life.†But the Ins0mnia bug, discovered

Finland detains Russian accused of U.S. malware crimes

- Thu, 27 Aug 2015 09:23:25 -0400

Finland confirmed on Thursday it has detained a Russian citizen, Maxim Senakh, at the request of U.S. federal authorities on computer fraud charges, in a move that Russia calls illegal. Konstantin Dolgov, the Russian Foreign Ministry's special representative for human rights, said on Wednesday that Senakh's detention was "another demonstration of the illegal practice of detaining Russian citizens abroad launched by U.S. authorities." If Finland had suspicions that Senakh was involved in illegal activity, it would have been more logical to send such information to Russia, Dolgov added in a statement.