Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

Trojan.Gen.SMH.2

-

Risk Level: Very Low. Type: Trojan.

Trojan.ADH.SMH.2

-

Risk Level: Very Low. Type: Trojan.

Backdoor.Korgapam

- Mon, 21 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Linux.Kaiten

- Sat, 19 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus.

Packed.Generic.463

-

Risk Level: Very Low. Type: Trojan.

Infostealer.Bankeiya.C

- Thu, 17 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Pittyger!gen1

- Thu, 17 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

PUA.Downloader

- Thu, 17 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Trojan.Cryptolocker.G

- Wed, 16 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Pittyger

- Wed, 16 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Packed.Dromedan!gen10

-

Risk Level: Very Low. Type: Worm.

Trojan.Asterope

- Tue, 15 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Linux.Netweird

- Tue, 15 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Chikdos.B!gen1

- Tue, 15 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Zbot!gen78

- Mon, 14 Jul 2014 00:00:00 +0000

Risk Level: Low. Type: Trojan.

Infostealer.Mysayad

- Mon, 14 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.M

- Sat, 12 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Snifula.F

- Thu, 10 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Packed.Generic.462

- Thu, 10 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Worm.

Trojan.Celptex

- Wed, 9 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.FakeAV!gen126

- Thu, 10 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomlock!g73

- Mon, 7 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Crossid

- Mon, 7 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Shylock!gen1

- Mon, 7 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Infostealer!g1

- Mon, 7 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Necurs!gen1

- Mon, 7 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Trojan.Ransomlock!g74

- Mon, 7 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cidox!gen3

- Mon, 7 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Posdump

- Sun, 6 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Dynopage

- Sun, 6 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Posscrape

- Sun, 6 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Injecta

- Sun, 6 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Kivars

- Sun, 6 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Ransomlock.Q!g1

- Mon, 7 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptdef!gen2

- Fri, 4 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Android.Milipnot

- Fri, 4 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Typideg

- Sat, 5 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Typideg!gen1

-

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.L

- Thu, 3 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Klovbot!gen2

- Wed, 2 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Viknok.D!inf

- Thu, 3 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Eupuds

- Thu, 3 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Android.Selfmite

- Tue, 1 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Worm.

Backdoor.Lancafdo!gen2

- Sat, 28 Jun 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Oldrea!gen2

- Fri, 27 Jun 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2014-1805

- Fri, 27 Jun 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Android.Generisk

- Fri, 27 Jun 2014 00:00:00 +0000

Risk Level: Very Low.

Backdoor.Piltabe

- Thu, 26 Jun 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Korplug!gen7

- Wed, 25 Jun 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.K

- Wed, 25 Jun 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Miniduke!gen3

- Thu, 26 Jun 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

VBS.Dunihi!lnk

- Tue, 24 Jun 2014 00:00:00 +0000

Risk Level: Very Low. Type: Worm.

Backdoor.Korplug!gen6

- Wed, 25 Jun 2014 00:00:00 +0000

Risk Level: Very Low.

Backdoor.Oldrea!gen1

- Wed, 25 Jun 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cidox!kmem

- Wed, 25 Jun 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

PayPal signs "ten of thousands" customers in Nigerian launch

- Tue, 22 Jul 2014 14:14:21 -0400

A PayPal sign is seen at an office building in San Jose, CaliforniaBy Chijioke Ohuocha LAGOS (Reuters) - PayPal has signed up "tens of thousand" of Nigerians in its first week of operating in Africa's biggest economy, with consumers already purchasing items from Britain, China and the United States via its online platform, a company official said. E-commerce remains in its infancy in most of Africa but is growing exponentially with the advent of online retailers such as Jumia, partly owned by South African phone operator MTN, and a growing middle class with money to spend. Citizens of Africa's most populous nation could not buy goods directly from foreign merchants before the launch by PayPal, the payments unit of online auctioneer eBay Inc. "We have seen great uptake by Nigerians ... in terms of coverage," Malvina Goldfeld, PayPal's head of business development for sub-Saharan Africa, said in Lagos on Tuesday. PayPal entered Nigeria and 10 other nations last month, providing online payment alternatives for consumers via mobile phones or PCs in markets often blighted by financial fraud.


Integrating Into the 'Internet of Things' (Op-Ed)

- Tue, 22 Jul 2014 13:36:45 -0400

Integrating Into the 'Internet of Things' (Op-Ed)Kevin Curran is a reader in Computer Science at the University of Ulster and an IEEE Senior Member. The Internet of Things †(IoT) will allow consumers to interact with nearly every appliance and device they own. We are seeing elements of the IoT in the marketplace already, with home automation having a strong consumer pull ? controlling the lights and temperature, closing the garage door while across town, getting alerts from a smoke detector. If IoT is campaigning to run nearly every aspect of people's digital lives, we need to consider factors that will ensure a seamless and safe introduction.


China's Xiaomi hopes Mi 4 smartphone can take on Apple

- Tue, 22 Jul 2014 08:36:19 -0400

Lei Jun, founder and CEO of China's mobile company Xiaomi, shows new features at launch ceremony of Xiaomi Phone 4 in BeijingXiaomi launched its flagship Mi 4 smartphone at a glitzy event in Beijing, where the Chinese budget handset maker's chief executive sought to challenge larger U.S. rival Apple Inc. The Mi 4 comes as budget handset makers in China are competing more aggressively on price and generous features, with even high-end manufacturers feeling the pressure. Dressed in a black T-shirt and blue jeans, Xiaomi CEO Lei Jun took aim repeatedly at iPhone maker Apple during the presentation on Tuesday, comparing the design and manufacturing process of his new 4G handset to the U.S. firm's more expensive offerings. "Even our white color is whiter!" Apple, which was due to announce second-quarter earnings later on Tuesday, was not immediately available to comment. The forthright Jun spent nearly an hour on stage describing the Mi 4 phone's construction - particularly its beveled metal rim whose similarity with Apple's phones drew murmurs of "iPhone" from the journalists at the event.


Apple denies having included a backdoor in iOS or other products

- Tue, 22 Jul 2014 07:15:56 -0400

Apple denies having included a backdoor in iOS or other productsAn extensive research paper from a security specialist revealed earlier this week that governments and other third-parties with malicious intentions would be able to use certain tools in iOS to extract information from iPhones and other iOS devices, without the user?s consent or knowledge. Apple has already issued a response on the matter, denying the existence of backdoors in its products, and further emphasizing the security and privacy features of iOS. ?We have designed iOS so that its diagnostic functions do not compromise user privacy and security, but still provides needed information to enterprise IT departments, developers and Apple for troubleshooting technical issues,? Apple wrote in an email statement that was published on Twitter by Financial Times journalist Tim Bradshaw.


Fund managers unconvinced by Apple rebound

- Tue, 22 Jul 2014 05:45:59 -0400

The leaf on the Apple symbol is tinted green at the Apple flagship store on 5th Ave in New YorkBy David Randall and Edwin Chan NEW YORK/SAN FRANCISCO (Reuters) - Apple, once a can't-miss stock, is finding it tough to persuade portfolio managers to come back into the fold. Yet the company remains one of the most significantly underweighted stocks among large cap fund managers, according to a Goldman Sachs report. Part of the reason for a lack of portfolio manager enthusiasm is that Apple Inc no longer seems to be the hot growth company of old, fund managers say. Apple reports results for its fiscal third quarter on Tuesday, July 22.


Fund managers unconvinced by Apple rebound as firm readies results

- Mon, 21 Jul 2014 18:13:33 -0400

The Apple logo is pictured at a retail store in the Marina neighborhood in San FranciscoBy David Randall and Edwin Chan NEW YORK/SAN FRANCISCO (Reuters) - Apple, once a can't-miss stock, is finding it tough to persuade portfolio managers to come back into the fold. Yet the company remains one of the most significantly underweighted stocks among large cap fund managers, according to a Goldman Sachs report. Part of the reason for a lack of portfolio manager enthusiasm is that Apple Inc no longer seems to be the hot growth company of old, fund managers say. Apple reports results for its fiscal third quarter on Tuesday, July 22.


Hacking talks axed over the years

- Mon, 21 Jul 2014 15:08:19 -0400

(Reuters) - A highly anticipated talk on how to identify users of the Tor service, widely used to access the Internet anonymously, has been withdrawn from next month's annual Black Hat security conference. Hacking experts disclose vulnerabilities at conferences to alert the public about security flaws, both to pressure developers to fix them and to warn users about products that may not be completely safe. Here are some examples of other hacking talks that have been pulled from conferences over the past decade: 2013 - Three European computer scientists canceled a talk on hacking the locks of luxury cars at a prestigious U.S. academic conference known as USENIX, after Volkswagen AG obtained a restraining order from a British court. 2007 - Security firm IOActive Inc pulled a talk at Black Hat DC on bugs in radio-frequency identification, or RFID, technology, saying it was pressured to do so by RFID technology firm HID Global Corp. 2005 - Cisco Systems Inc persuaded security firm Internet Security Systems to pull a discussion on hacking routers by researcher Michael Lynn at the Black Hat hacking conference in Las Vegas.

Security researcher: iOS security has been intentionally compromised by Apple

- Mon, 21 Jul 2014 12:33:07 -0400

Security researcher: iOS security has been intentionally compromised by AppleApple?s placing a lot of emphasis on iOS security (especially when compared with that ?toxic hellstew? Android) and on privacy (again, compared to its rival) but it turns out that iOS might not be as secure or private as Apple has led customers to believe. Security researcher Jonathan Zdziarski has a new paper out†called ?Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices,? in which he†reveals Apple?s complex tools inside iOS that would allow Apple to share†certain user data†at the request of law enforcement without the user knowledge. More importantly, with or without Apple?s help, spying agencies such as NSA and other third parties that are very familiar with how iOS operates can apparently†use these vulnerabilities to grab plenty


Kenya military Twitter account hacked

- Mon, 21 Jul 2014 11:58:28 -0400

The Twitter account run by Kenya's military was taken over by hackers claiming to be from the international activist collective Anonymous, a military spokesman said Monday No internal military systems ...

Huawei's H1 revenue up 19 percent year-on-year at $22 billion

- Sun, 20 Jul 2014 22:45:58 -0400

A man walks past a Huawei company logo outside the entrance of a Huawei office in Wuhan, Hubei provinceHuawei Technologies Co Ltd, the world's No. 2 telecom equipment maker, said on Monday it will achieve sustainable growth in 2014 after posting a 19 percent jump in first-half revenue to 135.8 billion yuan ($21.88 billion). "Driven by increasing investments in LTE networks worldwide, Huawei has further solidified its leadership position in mobile broadband," Huawei's CFO Cathy Meng said in the statement. "Rapid growth in software and services helped maintain steady growth in our carrier network business." Meng said Huawei achieved "sustainable growth" in its consumer business, which includes smartphone manufacturing, thanks to better brand awareness.


Snowden seeks to develop anti-surveillance technologies

- Sat, 19 Jul 2014 18:23:31 -0400

Accused government whistleblower Snowden is seen on a screen as he speaks via videoconference with members of the Committee on legal Affairs and Human Rights of the Parliamentary Assembly of the Council of Europe in StrasbourgBy Jim Finkle NEW YORK (Reuters) - Edward Snowden, a former U.S. spy agency contractor who leaked details of major U.S. surveillance programs, called on supporters at a hacking conference to spur development of easy-to-use technologies to subvert government surveillance programs around the globe.† Snowden, who addressed conference attendees on Saturday via video link from Moscow, said he intends to devote much of his time to promoting such technologies, including ones that allow people to communicate anonymously and encrypt their messages. He escaped the United States after leaking documents that detailed massive U.S. surveillance programs at home and abroad - revelations that outraged some Americans and sparked protests from countries around the globe. At the HOPE hacking conference, several talks detailed approaches for thwarting government surveillance, including a system known as SecureDrop that is designed to allow people to anonymously leak documents to journalists. The conference featured about 100 presentations on topics ranging from surveillance to hacking elevators and home routers.


Golf-Blood spilt as Els says he put 'jinx' on his group

- Fri, 18 Jul 2014 02:45:00 -0400

Ernie Els of South Africa walks off after finishing his first round of the British Open Championship at the Royal Liverpool Golf Club in HoylakeBy Martyn Herman HOYLAKE England (Reuters) - Ernie Els left a spectator bloodied with a wild opening tee shot, defending champion Phil Mickelson went out of bounds, and Bubba Watson's promising start was blown away at the British Open on Thursday. Double Open champion Els went round in 79 after being visibly shaken by the bloody aftermath of an errant drive at the first and then missing two tiddlers on the green, one with a casual back-handed putt usually reserved for park hackers.


Hackers target Nest as a warning to Google about data-sharing

- Thu, 17 Jul 2014 17:00:19 -0400

If you ask Nest about sharing data with its new owner, the company will say that advertising isn?t part of its business model†and that it plans to protect the privacy of its customers from Google. Nest will have to share some data with Google and others†in order to enable automatic home-related features, but it is†not supposed to lead to Google targeting users with even more ads than it currently does. To make sure Google won?t someday spam Nest owners with ads, a group of hackers plans to take preemptive action against Google and Nest, Forbes reports. Researchers from the University of Central Florida have found a vulnerability they can exploit in order to stop Nest thermostats from sending data to

Hackers target Nest in as a warning to Google about data-sharing

- Thu, 17 Jul 2014 17:00:19 -0400

If you ask Nest about sharing data with its new owner, the company will say that advertising isn?t part of its business model†and that it plans to protect the privacy of its customers from Google. Nest will have to share some data with Google and others†in order to enable automatic home-related features, but it is†not supposed to lead to Google targeting users with even more ads than it currently does. To make sure Google won?t someday spam Nest owners with ads, a group of hackers plans to take preemptive action against Google and Nest, Forbes reports. Researchers from the University of Central Florida have found a vulnerability they can exploit in order to stop Nest thermostats from sending data to

Blood spilt as Els says he put 'jinx' on his group

- Thu, 17 Jul 2014 16:02:59 -0400

By Martyn Herman HOYLAKE England (Reuters) - Ernie Els left a spectator bloodied with a wild opening tee shot, defending champion Phil Mickelson went out of bounds, and Bubba Watson's promising start was blown away at the British Open on Thursday. Double Open champion Els went round in 79 after being visibly shaken by the bloody aftermath of an errant drive at the first and then missing two tiddlers on the green, one with a casual back-handed putt usually reserved for park hackers.

These are the absurd names British intelligence spies have to remember to spy on you

- Tue, 15 Jul 2014 21:45:21 -0400

These are the absurd names British intelligence spies have to remember to spy on youIn case you didn?t know it by now, spy agencies are really good ? and hopefully effective ? at†spying on people, including both actual valid targets as well as†unsuspecting citizens who†aren?t plotting anything bigger than a trip to†an exotic country.†To further demonstrate the power of one such agency ? NSA?s close buddy, the British GCHQ, in this case ? The Intercept has published a new Snowden leak, which reveals such ambitious mass spying plans, as well as their silly names. ?The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, ?amplif[y]? sanctioned messages on YouTube, and


'Smart' technology could make utilities more vulnerable to hackers

- Tue, 15 Jul 2014 21:31:53 -0400

By Christoph Steitz and Harro Ten Wolde FRANKFURT (Reuters) - Last November, Felix Lindner came very close to shutting down the power supply of Ettlingen, a town of almost 40,000 people in the south of Germany. "We could have switched off everything: power, water, gas," Lindner, head of Berlin-based Recurity Labs, an IT security company, said. Fortunately for residents, Lindner's cyber attack on its energy utility, Stadtwerke Ettlingen, was simulated. "The experiment has shown that sensitive, critical infrastructure is not sufficiently protected," said Eberhard Oehler, managing director of the utility, Stadtwerke Ettlingen.

Apple, IBM team up in mobile devices, applications

- Tue, 15 Jul 2014 18:13:10 -0400

CUPERTINO, Calif. (AP) ? Apple is teaming up with former nemesis IBM in an attempt to sell more iPhones and iPads to corporate customers and government agencies.

Insurers struggle to get grip on burgeoning cyber risk market

- Mon, 14 Jul 2014 13:20:05 -0400

A lock icon, signifying an encrypted Internet connection, is seen on an Internet Explorer browser in ParisHigh profile cases of hackers seizing sensitive customer data from companies, such as U.S. retailer Target Corp or e-commerce company eBay Inc, have executives checking their insurance policies. Increasingly, corporate risk managers are seeing insurance against cyber crime as necessary budget spending rather than just nice to have. The insurance broking arm of Marsh & McLennan Companies estimates the U.S cyber insurance market was worth $1 billion last year in gross written premiums and could reach as much as $2 billion this year. The European market is currently a fraction of that, at around $150 million, but is growing by 50 to 100 percent annually, according to Marsh.


FBI cyber expert is ex-discount furniture salesman

- Sun, 13 Jul 2014 20:50:07 -0400

FBI Supervisory Special Agent J. Keith MularskiPITTSBURGH (AP) ? J. Keith Mularski's world has expanded greatly since he stopped selling discount furniture to join the FBI in 1998. Now recognized as a foremost expert on cybercrime, Mularski's profile has risen since the U.S. Justice Department used Mularski's sleuthing to bring two indictments with worldwide ramifications.


Chinese man accused of hacking into US computers

- Fri, 11 Jul 2014 21:18:35 -0400

SAN DIEGO (AP) ? U.S. authorities have charged a Chinese businessman with hacking into the computer systems of U.S. companies with large defense contracts, including Boeing, to steal data on military projects, including some of the latest fighter jets, officials said Friday.

Microsoft says cybercrime bust frees 4.7 million infected PCs

- Thu, 10 Jul 2014 18:25:04 -0400

The Microsoft logo is seen at their offices in BucharestBy Jim Finkle BOSTON (Reuters) - Microsoft Corp said it has freed at least 4.7 million infected personal computers from control of cyber crooks in its most successful digital crime-busting operation, which interrupted service at an Internet-services firm last week. The world's largest software maker has also identified at least another 4.7 million infected machines, though many are likely still controlled by cyber fraudsters, Microsoft's cybercrime-fighting Digital Crimes Unit said on Thursday. Richard Domingues Boscovich, assistant general counsel of the unit, said Microsoft would quickly provide government authorities and Internet service providers around the world with the IP addresses of infected machines so they can help users remove the viruses. "Those victims are currently not aware they are infected," Boscovich said in an interview.


Beijing Security Conference Offers $10,000 Bounty for Tesla Hack

- Thu, 10 Jul 2014 16:16:31 -0400

Beijing Security Conference Offers $10,000 Bounty for Tesla HackThe Symposium on Security for Asia Network (SyScan), a†security conference in Beijing, is asking attendees to try their hand at hacking into a Tesla car. The conference will be full of security experts and if one of them succeeds at cracking Tesla's code, they will walk away with $10,000. The conference takes place next Wednesday and Thursday, so participants have time to prepare their hacking tactics.† John Pescatore,†director for emerging security trends at The SANS Institute, told Fox News, "They have a good security reputation mainly because nobody has pounded on them yet."†


Report: Chinese hackers hit US personnel networks

- Thu, 10 Jul 2014 12:35:21 -0400

Secretary of State John Kerry, left, meets with Chinese President Xi JinpingWASHINGTON (AP) ? Chinese hackers broke into the computer networks of the Office of Personnel Management earlier this year with the intention of accessing the files of tens of thousands of federal employees who had applied for top-secret security clearances, according to The New York Times.


Symantec in talks with Chinese government after software ban report

- Thu, 10 Jul 2014 11:43:42 -0400

By Jim Finkle BOSTON (Reuters) - U.S. security software maker Symantec Corp said it is holding discussions with authorities in Beijing after a state-controlled Chinese newspaper reported that the Ministry of Public Security had banned use of one of its products. The China Daily reported last week that the ministry had issued an order to its branches across the nation telling them to uninstall Symantec's data loss prevention, or DLP, products from their systems and banning their future purchase, saying the software "could pose information risks." (http://bit.ly/1okVF3v)The vaguely worded report did not explain why the ministry believed Symantec's software presented a security threat. Symantec is the latest large U.S. technology company to encounter challenges in China since last year when former National Security Agency contractor Edward Snowden began leaking details about U.S. surveillance programs.

Chinese hackers pursue key data on U.S. workers: NYT

- Thu, 10 Jul 2014 09:00:02 -0400

An analyst looks at code in the malware lab of a cyber security defense lab at the Idaho National Laboratory(Reuters) - Chinese hackers broke into the computer networks of the U.S. government agency that keeps the personal information of all federal employees in March, the New York Times reported, citing senior U.S. officials. The hackers appeared to be targeting files on tens of thousands of employees who have applied for top-secret security clearances, the newspaper said.


US, China talk cyberhacking amid new allegations

- Thu, 10 Jul 2014 08:48:30 -0400

U.S. Secretary of State John Kerry meets with China's President Xi Jinping, right, at the Great Hall of the People in Beijing Thursday, July 10, 2014. (AP Photo/Jim Bourg, Pool)BEIJING (AP) ? Top American officials said Thursday they challenged their counterparts in China to rein in alleged cybersecurity infringements as a new allegation emerged of a brazen attempt by Chinese hackers to break into U.S. government personnel files.


China, U.S. to boost security ties, but no breakthroughs

- Thu, 10 Jul 2014 06:08:16 -0400

U.S. Secretary of State John Kerry talks with China's President Xi Jinping at the Great Hall of the People in BeijingBy Lesley Wroughton and Michael Martina BEIJING (Reuters) - China and the United States agreed on Thursday to boost military ties and counter-terrorism cooperation during high-level annual talks in Beijing, but there was little immediate sign of progress on thorny cyber-security or maritime issues. The two-day talks, led by Secretary of State John Kerry and Treasury Secretary Jack Lew for the United States and Vice Premier Wang Yang and top diplomat Yang Jiechi for China, were never expected to achieve great breakthroughs. After discussions on topics ranging from the value of China's currency to North Korea, Yang said the two sides agreed to strengthen cooperation in counter-terrorism, law enforcement and military-to-military relations. On two of the most sensitive issues - maritime disputes and cyber-spying - Yang largely restated Beijing's position on both.


Philippines nabs Taiwanese, Chinese linked to scam

- Thu, 10 Jul 2014 05:11:26 -0400

Philippine police arrested 44 foreigners who allegedly ran an online blackmail syndicate that defrauded victims in China and Taiwan by duping them into believing that their bank accounts have been used ...

Philippines arrests Taiwanese in alleged bank scam

- Thu, 10 Jul 2014 03:54:03 -0400

MANILA, Philippines (AP) ? Philippine police arrested 44 Taiwanese who allegedly ran an online blackmail syndicate that defrauded victims in China and Taiwan by duping them into believing that their bank accounts have been used by money launderers or terrorists, police said Thursday.

Philippines nabs 44 Taiwanese linked to fraud

- Thu, 10 Jul 2014 02:28:05 -0400

MANILA, Philippines (AP) ? Philippine police say they have arrested 44 Taiwanese who allegedly ran an online blackmail syndicate that defrauded victims in China and Taiwan by duping them into thinking their bank accounts have been used by money launderers or terrorists.

Microsoft drops lawsuit against Vitalwerks after service cuts

- Wed, 09 Jul 2014 16:12:00 -0400

The Microsoft logo is seen at their offices in BucharestBy Jim Finkle BOSTON (Reuters) - Microsoft Corp has dropped a lawsuit against Vitalwerks Internet Solutions that alleged the privately held Web services firm failed to take proper steps to prevent its systems from being abused by cybercriminals. The two companies said on Wednesday they had settled the lawsuit,which was announced by Microsoft on June 30 as it launched an operation to wrest control over infected PCs from cybercriminals. Microsoft's operation targeted malicious software known as Bladabindi and Jenxcus, which is believed have infected millions of Windows PCs around the globe. Microsoft obtained an order from a federal judge in Nevada to launch the operation, telling the court it would be able to siphon off criminal traffic without impacting legitimate users of a service run by Vitalwerks, known as No-IP.com.


Update Adobe Flash on your system right now

- Wed, 09 Jul 2014 06:50:28 -0400

Update Adobe Flash on your system right nowAdobe on Tuesday issued a critical security update to patch a vulnerability that could help hackers ?take control? of computers after users visit various sites, CNET reports. Security blogger Michele Spagnuolo, who detailed the security exploit, says the Flash issue can be used by hackers to steal cookies that authenticate users on ?thousands of websites.? ?Adobe has released security updates for Adobe Flash Player 14.0.0.125 and earlier versions for Windows and Macintosh and Adobe Flash Player 11.2.202.378 and earlier versions for Linux,? Adobe wrote. ?These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system. Adobe recommends users update their product installations to the latest versions.? Among the websites that may have been targeted


China dismisses claims of links to hackers targeting Iraq experts

- Tue, 08 Jul 2014 20:16:09 -0400

By Joseph Menn SAN FRANCISCO (Reuters) - China on Tuesday disputed claims by CrowdStrike, a U.S. security firm, that a group of hackers it calls "Deep Panda" is linked to unnamed Chinese government officials, saying the firm was merely seeking publicity. "Chinese laws prohibit cyber crimes of all forms, and Chinese government has done whatever it can to combat such activities," Geng Shuang, press counselor for China's embassy in Washington, said in response to questions from Reuters. On Monday, CrowdStrike said a highly sophisticated group of hackers believed to be associated with the Chinese government, who for years targeted U.S experts on Asian geopolitical matters, has suddenly begun breaching computers belonging to experts on Iraq as the rebellion there escalated.

There?s one major downside to relying so much on Google Maps

- Tue, 08 Jul 2014 18:00:18 -0400

There?s one major downside to relying so much on Google MapsThere?s a reason that people prefer using Google Maps over other mapping applications: It?s just a flat-out terrific service. That said, there is one downside to having Google Maps serve as the de facto online mapping service: It?s a major target for hackers who can use it to effectively ruin small businesses. Wired brings us the sad tale of a once-popular restaurant in Northern Virginia whose business mysteriously dried up for no apparent reason in early 2012. Although the restaurant couldn?t figure out why its sales were tanking in time to prevent itself from going under, its owner eventually discovered that a rival restaurant†had apparently changed the business?s hours on Google Places to make it look as though the restaurant


New York to add $3B windfall to state budget

- Tue, 08 Jul 2014 17:18:34 -0400

New York is poised to collect nearly $3.3 billion from a recent record settlement with France's largest bank, and the Cuomo administration plans to add it to the state's general fund. It's more than enough ...

Currency, maritime disputes at stake in U.S.-China talks

- Tue, 08 Jul 2014 12:24:21 -0400

U.S. Secretary of State Kerry greets media representatives flying aboard his plane bound for diplomatic talks in China while flying out of WashingtonBy Lesley Wroughton and Michael Martina BEIJING (Reuters) - The United States pressed China to implement structural reforms in its exchange rate and to modify its "aggressive behavior" in disputed waters during a preliminary round of bilateral talks on Tuesday, senior U.S. officials said. The United States, led by U.S. Secretary of State John Kerry and Treasury Secretary Jack Lew, will also push China this week to resume cooperation on fighting cyber espionage and return to dialogue on internet issues, a senior U.S. official said.


Security Firm Says Chinese Hackers Targeting U.S. Experts on Iraq

- Tue, 08 Jul 2014 12:06:55 -0400

Security Firm Says Chinese Hackers Targeting U.S. Experts on IraqA private cyber security firm has discovered evidence that a suspected Chinese government hacker group has been targeting U.S. experts on Iraq. CrowdStrike ? a firm consisting of former U.S. government officials and credited with exposing the motives of Russian hacker group Energetic Bear†? claims they have discovered that hackers belonging to "Deep Panda" have shifted from attacking experts associated with Southeast Asian geopolitical affairs to attacking the computers of U.S. think tank employees specializing in Iraq.†The hacking began on June 18 ?the day the rebel group Islamic State of Iraq and the Levant (ISIS) attacked an oil refinery.† "They immediately started going after Middle East specialists and experts, so it was a clear indication they were receiving tasking," CrowdStrike VP of Intelligence Adam Meyers told†The Wire.


iOS 8 and Yosemite will fiercly guard user privacy

- Tue, 08 Jul 2014 11:54:56 -0400

iOS 8 and Yosemite will fiercly guard user privacyApple has gone to great lengths to make privacy one of the main features of iOS 8 and Yosemite, which could be a very important differentiating factor for mobile device and computers buyers? especially considering the recent NSA-related leaks, the privacy-breaking practices of other companies†and the malware that can affect certain other operating systems†looking to steal personal data. IOS and web app designer Luis Abreu has taken an extensive look at Apple?s new operating systems, revealing the ways they protect user data while offering more advanced†features. In addition to focusing on the user-side, Abreu is also offering app developers advice on how to better adapt to the changes, in order to take advantage of the new iOS 8 and Yosemite


This huge Android security flaw could cost you a fortune

- Tue, 08 Jul 2014 11:31:45 -0400

This huge Android security flaw could cost you a fortuneAndroid?s open nature offers some substantial benefits to consumers versus rival mobile platforms such as Apple?s iOS operating system. There are also some negative affects, however, and one of them is the fact that Google?s Android devices are far more susceptible to malware attacks. We have seen plenty of reports on various Android security holes and malware in the past, and now a newly discovered flaw could end up costing Android device owners a fortune. FROM EARLIER:†Android users, beware: Huge security hole lets phones secretly spy on you and capture photos According to a report from†IDG News Service, a newly discovered Android vulnerability allows apps to make unauthorized phone calls†or†disrupt ongoing calls. By exploiting the security hole, malicious software would


 

Twitter / SecureMac

http://twitter.com/SecureMac

SecureMac: MacScan 2.9.3 with Google Chrome & SeaMonkey Support Released for Macs #privacy #security #mac - http://t.co/wCy0sddR

- Fri, 18 May 2012 14:52:24 +0000

SecureMac: MacScan 2.9.3 with Google Chrome & SeaMonkey Support Released for Macs #privacy #security #mac - http://t.co/wCy0sddR

SecureMac: Proud @MacworldUK and @MacworldAU reviewed @PrivacyScan and gave it 5/5 stars & an Editor's Choice award! http://t.co/ew6Wjj67

- Thu, 05 Apr 2012 01:30:08 +0000

SecureMac: Proud @MacworldUK and @MacworldAU reviewed @PrivacyScan and gave it 5/5 stars & an Editor's Choice award! http://t.co/ew6Wjj67

SecureMac: Researching new piece of Mac #malware that is currently in the wild infecting computers running OS X. http://t.co/38RsQVAQ

- Tue, 20 Mar 2012 06:00:04 +0000

SecureMac: Researching new piece of Mac #malware that is currently in the wild infecting computers running OS X. http://t.co/38RsQVAQ

SecureMac: SecureMac is honored ~ @MacworldUK has awarded @PrivacyScan as Best of Show for Macworld | iWorld this year. http://t.co/bBqaCH7F

- Fri, 16 Mar 2012 20:18:06 +0000

SecureMac: SecureMac is honored ~ @MacworldUK has awarded @PrivacyScan as Best of Show for Macworld | iWorld this year. http://t.co/bBqaCH7F

SecureMac: Attention Developers, @SecureMac is hiring Cocoa Developers. http://t.co/F4Give2s #jobs #dev #hiring

- Tue, 13 Mar 2012 18:52:23 +0000

SecureMac: Attention Developers, @SecureMac is hiring Cocoa Developers. http://t.co/F4Give2s #jobs #dev #hiring

SecureMac: SecureMac is hiring more Mac Cocoa Developers. See requirements & submit resume! #jobs #macjobs http://t.co/LOfi5e5T

- Mon, 05 Mar 2012 21:06:20 +0000

SecureMac: SecureMac is hiring more Mac Cocoa Developers. See requirements & submit resume! #jobs #macjobs http://t.co/LOfi5e5T

SecureMac: Read how Google's accused of Bypassing Safari's Privacy Controls http://t.co/1KyOlzbH Another Reason for @MacScan @PrivacyScan

- Fri, 17 Feb 2012 16:55:34 +0000

SecureMac: Read how Google's accused of Bypassing Safari's Privacy Controls http://t.co/1KyOlzbH Another Reason for @MacScan @PrivacyScan

SecureMac: PrivacyScan 1.0.1 has been released and is available on the Mac App Store adding bug fixes still 4.99! http://t.co/8fV15Tm7

- Wed, 08 Feb 2012 05:58:53 +0000

SecureMac: PrivacyScan 1.0.1 has been released and is available on the Mac App Store adding bug fixes still 4.99! http://t.co/8fV15Tm7

SecureMac: With the launch of @PrivacyScan in the Mac App Store we're #1 in utilities and ranking in top 10 paid overall. Day 1 http://t.co/Chc4IZDE

- Fri, 27 Jan 2012 02:19:15 +0000

SecureMac: With the launch of @PrivacyScan in the Mac App Store we're #1 in utilities and ranking in top 10 paid overall. Day 1 http://t.co/Chc4IZDE

SecureMac: @fakemacfusion Are you on the macworld press list? Let me know your email to get you off the PR list.

- Thu, 26 Jan 2012 16:06:39 +0000

SecureMac: @fakemacfusion Are you on the macworld press list? Let me know your email to get you off the PR list.

SecureMac: SecureMac staff will be on the Macworld show floor today at booth #442 talking security and demonstrating @PrivacyScan & @MacScan

- Thu, 26 Jan 2012 16:04:23 +0000

SecureMac: SecureMac staff will be on the Macworld show floor today at booth #442 talking security and demonstrating @PrivacyScan & @MacScan

SecureMac: PrivacyScan is now live on the Mac App Store! Check it out and give us your feedback! http://t.co/4W4y8ztO

- Wed, 25 Jan 2012 16:54:46 +0000

SecureMac: PrivacyScan is now live on the Mac App Store! Check it out and give us your feedback! http://t.co/4W4y8ztO

SecureMac: Need an Free/Discounted Expo Hall Pass to @Macworldexpo ? Get em while they last! http://t.co/gHP8PaZe #macworld

- Thu, 19 Jan 2012 20:39:49 +0000

SecureMac: Need an Free/Discounted Expo Hall Pass to @Macworldexpo ? Get em while they last! http://t.co/gHP8PaZe #macworld

SecureMac: We're going to be at @macworldexpo booth #442! Be sure to stop by and learn about the latest products!

- Wed, 18 Jan 2012 22:30:24 +0000

SecureMac: We're going to be at @macworldexpo booth #442! Be sure to stop by and learn about the latest products!

SecureMac: Getting ready for #macworld ~ booth 442. Be sure to follow us if you're still looking for a free expo hall pass, and watch for link.

- Fri, 06 Jan 2012 19:20:40 +0000

SecureMac: Getting ready for #macworld ~ booth 442. Be sure to follow us if you're still looking for a free expo hall pass, and watch for link.

SecureMac: Start off your New Year by changing your passwords. How long has it been? #macsecurity

- Wed, 04 Jan 2012 17:03:38 +0000

SecureMac: Start off your New Year by changing your passwords. How long has it been? #macsecurity

SecureMac: @ken_gok email macsec@securemac.com with as much info as you have on what you downloaded including links and we can check it out!

- Fri, 23 Dec 2011 15:50:24 +0000

SecureMac: @ken_gok email macsec@securemac.com with as much info as you have on what you downloaded including links and we can check it out!

SecureMac: MacScan 2.9.2 Released! Celebrate with us and download a free 30-day trial or upgrade your app! http://t.co/xr3NJoQk

- Tue, 20 Dec 2011 17:09:59 +0000

SecureMac: MacScan 2.9.2 Released! Celebrate with us and download a free 30-day trial or upgrade your app! http://t.co/xr3NJoQk

SecureMac: Love Cyber Monday? Get the http://t.co/G8EB7cwc software bundle for 49.99! First 10k people get MacScan!

- Mon, 28 Nov 2011 17:23:17 +0000

SecureMac: Love Cyber Monday? Get the http://t.co/G8EB7cwc software bundle for 49.99! First 10k people get MacScan!

SecureMac: RT @macscan: 1 Day Only - Black Friday Sale ~ MacScan 80% OFF Use Coupon Code CYBERSALE11 - http://t.co/AtD091ty

- Fri, 25 Nov 2011 05:08:17 +0000

SecureMac: RT @macscan: 1 Day Only - Black Friday Sale ~ MacScan 80% OFF Use Coupon Code CYBERSALE11 - http://t.co/AtD091ty