Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

Trojan.Gen.4

- Mon, 28 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

PUA.Gen.2

- Mon, 28 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Spyware.Gen

-

Risk Level: Very Low.

RemoteAccess.Gen

-

Risk Level: Very Low.

Hacktool.Gen

-

Risk Level: Very Low.

Trackware.Gen

-

Risk Level: Very Low.

SecurityRisk.Gen

-

Risk Level: Very Low.

Adware.Gen.2

- Thu, 17 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Joke.Gen

-

Risk Level: Very Low.

Dialer.Gen.2

-

Risk Level: Very Low.

Trojan.Retefe

- Fri, 25 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Scieron!gen1

- Thu, 24 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

PUA.ChangeDNS

- Thu, 24 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Backdoor.Baccamun

- Fri, 25 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Scieron

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Android.Bankosy

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.OutBrowse.1

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.DomaIQ.2

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.InstalleRx.6

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.OutBrowse.2

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Soft32Dwn.1

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.1

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.DomaIQ.3

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.2

-

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.3

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.SoftPulse.3

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.AdGazelle.1

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Widdit.1

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Downware.1

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.InstalleRx.7

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Android.Simplocker.B

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Gen.SMH.2

- Tue, 22 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.ADH.SMH.2

- Tue, 22 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Kasidet

- Tue, 22 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Worm.

Backdoor.Korgapam

- Mon, 21 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Linux.Kaiten

- Sat, 19 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus.

Infostealer.Ecsudown

-

Risk Level: Very Low. Type: Trojan.

Infostealer.Bankeiya.C

- Thu, 17 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Pittyger!gen1

- Thu, 17 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Packed.Generic.463

-

Risk Level: Very Low. Type: Trojan.

Trojan.Pittyger

- Wed, 16 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

PUA.Downloader

- Thu, 17 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Trojan.Cryptolocker.G

- Wed, 16 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Chikdos.B!gen1

- Tue, 15 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Asterope

- Tue, 15 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Linux.Netweird

- Tue, 15 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Packed.Dromedan!gen10

- Tue, 15 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Worm.

Trojan.Zbot!gen78

- Mon, 14 Jul 2014 00:00:00 +0000

Risk Level: Low. Type: Trojan.

Infostealer.Mysayad

- Mon, 14 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.M

- Sat, 12 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Snifula.F

- Thu, 10 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Packed.Generic.462

- Thu, 10 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Worm.

Trojan.Celptex

- Wed, 9 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.FakeAV!gen126

- Thu, 10 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomlock!g73

- Mon, 7 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Crossid

- Mon, 7 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Shylock!gen1

- Mon, 7 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Infostealer!g1

- Mon, 7 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Necurs!gen1

- Mon, 7 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Infostealer.Posdump

- Sun, 6 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Dynopage

- Sun, 6 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Posscrape

- Sun, 6 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Injecta

- Sun, 6 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomlock!g74

- Mon, 7 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cidox!gen3

- Mon, 7 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Kivars

- Sun, 6 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Ransomlock.Q!g1

- Mon, 7 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptdef!gen2

- Fri, 4 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Android.Milipnot

- Fri, 4 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Typideg

- Sat, 5 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Typideg!gen1

-

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.L

- Thu, 3 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Klovbot!gen2

- Wed, 2 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Viknok.D!inf

- Thu, 3 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Eupuds

- Thu, 3 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Android.Selfmite

- Tue, 1 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Worm.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

Aretha Franklin Kicked Out of Johnny Rockets

- Mon, 28 Jul 2014 18:23:37 -0400

Aretha Franklin Kicked Out of Johnny RocketsToday in celebrity gossip: A Johnny Rockets waiter out-diva'd Aretha Franklin, Keith Urban's fans nearly drank themselves to death at his concert, and Comic-Con yielded so many celebrity group-selfies. Ordering a hamburger to go and then deciding to eat it in the restaurant.


Apple iPhones allow extraction of deep personal data, researcher finds

- Fri, 25 Jul 2014 21:00:54 -0400

The exploded view of the home button which doubles as a fingerprint sensor is seen on an image of the new iPhone 5S at Apple Inc's media event in CupertinoBy Joseph Menn SAN FRANCISCO (Reuters) - Personal data including text messages, contact lists and photos can be extracted from iPhones through previously unpublicized techniques by Apple Inc employees, the company acknowledged this week. The same techniques to circumvent backup encryption could be used by law enforcement or others with access to the "trusted" computers to which the devices have been connected, according to the security expert who prompted Apple's admission. In a conference presentation this week, researcher Jonathan Zdziarski showed how the services take a surprising amount of data for what Apple now says are diagnostic services meant to help engineers. As word spread about Zdziarski?s initial presentation at the Hackers on Planet Earth conference, some cited it as evidence of Apple collaboration with the National Security Agency.


Senior U.S. Homeland Security cyber official Larry Zelvin to retire

- Thu, 24 Jul 2014 07:47:49 -0400

A U.S. Department of Homeland Security employee stands inside the National Cybersecurity and Communications Integration Center in ArlingtonLarry Zelvin, the head of the U.S. Department of Homeland Security's center for countering cyber threats, is retiring next month after a government career of nearly 30 years during which he advised U.S. businesses on fighting hostile hackers. Zelvin helped coordinate efforts to advise U.S. banks as they responded to denial of service attacks believed to have originated from Iran, which disrupted their websites in recent years. He also assisted U.S. retailers looking to prevent cyber attacks on their point of sales systems after last year's unprecedented breach at Target Corp. A spokesman said a successor has not been named to run the agency's National Cybersecurity and Communications Integration Center (NCCIC) in suburban Virginia, which helps government agencies and private firms identify and respond to cyber attacks.


ECB says website hacked, no sensitive data affected

- Thu, 24 Jul 2014 07:18:12 -0400

A passerby uses his smartphone to take a picture of the euro sign landmark in front of the headquarters of the European Central Bank (ECB) in FrankfurtThe European Central Bank said on Thursday its website had been hacked and some email addresses and other contact information stolen but insisted no market-sensitive data were affected. The hackers broke into a database storing details of people who had registered for ECB conferences, visits and other events, the bank said. "No internal systems or market sensitive data were compromised," the ECB said in a statement. The ECB is currently running a particularly sensitive review of the euro zone's top lenders, collecting streams of data to gauge whether banks have valued loans and other assets correctly, before it starts supervising them.


Nokia's fortunes brighten on heavy network spending

- Thu, 24 Jul 2014 06:40:03 -0400

By Sakari Suoninen and Jussi Rosendahl HELSINKI (Reuters) - Nokia surprised investors with strong quarterly earnings and raised its full-year profit margin forecast as network operators install more powerful systems to cope with surging mobile data traffic. The Finnish company sold its once-dominant phone business to Microsoft in April, leaving it more reliant on a mobile network equipment business that shrank by 8 percent in the April-to-June quarter. Much of the decline was due to foreign currency fluctuations and divestments and Nokia said it expected network sales to return to growth in the second half of the year after a period in which the company sought to exit unprofitable contracts. The company raised its profitability estimate for networks, saying its operating margin this year would be at or slightly above the high end of a long-term target of 5 to 10 percent.

U.S. says Chinese man pleads guilty in military technology sting

- Wed, 23 Jul 2014 20:04:28 -0400

A 28-year-old Chinese man pleaded guilty on Wednesday of attempting to smuggle military technology obtained from undercover U.S. agents out of the United States to China, the U.S. Justice Department said. Bo Cai, an employee of a Chinese technology firm, was accused along with his cousin Wentong Cai, 29, of trying to illegally export sensors primarily manufactured for sale to the U.S. Department of Defense. Wentong Cai, who was in the United States on a student visa, has pleaded not guilty to the charges against him. The U.S. Arms Export Control Act and International Traffic in Arms Regulations prohibit the export of defense-related materials from the United States without a license or written approval from the U.S. Department of State.

NYC official: Thieves got into 1K StubHub accounts

- Wed, 23 Jul 2014 18:59:47 -0400

Bryan Caputo, left, and Daniel Petryszyn sit during arraignment proceedings in New York state Supreme Court, Wednesday, July 23, 2014. They are two of six people who were indicted Wednesday in an international ring that took over more than 1,600 StubHub users' accounts and fraudulently bought tickets to such prime events as Jay-Z and Elton John concerts and Broadway shows like "The Book of Mormon," the Manhattan district attorney said Wednesday. (AP Photo)NEW YORK (AP) ? Some of the hottest tickets in town ? to Broadway hits, Jay-Z and Justin Timberlake concerts, a New York Yankees-Boston Red Sox game ? were snapped up by an international ring of cyber thieves who commandeered more than 1,000 StubHub users' accounts to make big money by fraudulently buying tickets and reselling them, prosecutors said Wednesday.


Seven arrests made in $1.6 million StubHub cyberfraud case

- Wed, 23 Jul 2014 18:16:30 -0400

Manhattan District Attorney Cyrus Vance Jr. speaks during a news conference at his office in midtown Manhattan, New YorkBy Karen Freifeld NEW YORK (Reuters) - Police have arrested seven people on charges they were tied to an international ring that defrauded eBay Inc's StubHub online ticketing service of some $1.6 million, the latest in a string of high-profile cybercrime busts in recent months. Manhattan District Attorney Cyrus Vance Jr announced the arrests on Wednesday. They were charged with involvement in a cybercrime ring that used stolen credit card numbers to purchase thousands of tickets to events, including concerts of Justin Timberlake and Jay-Z as well as games for sports teams including the Boston Red Sox and New York Giants, according to court documents unsealed Wednesday. StubHub's head of global communications, Glenn Lehrman, told Reuters his firm has been working with law enforcement around the world for the last year on the case.


Reuters U.S. Sports Schedule at 2 PM EDT on Wednesday, July 23

- Wed, 23 Jul 2014 14:31:04 -0400

July 23 (Reuters) - Reuters U.S. sports schedule at 2 PM ET on Wednesday: - - - - The duty editor is Steve Ginsburg, 202-898-8427 - - - - NATIONAL FOOTBALL LEAGUE Wednesday: NFC previews and rankings by division - - Broncos owner Bowlen battling Alzheimer's, resigns control of team Denver Broncos owner Pat Bowlen is resigning control of the team to focus on battling Alzheimer's Disease. ...

Six indicted in New York for involvement in StubHub cyber fraud

- Wed, 23 Jul 2014 14:12:50 -0400

Manhattan District Attorney Cyrus Vance Jr. speaks during a news conference at his office in midtown Manhattan, New YorkNew York (Reuters) - Six people were indicted in New York for involvement in a global cybercrime ring that took over more than 1,000 accounts of eBay Inc's StubHub online ticket reselling service, according to a statement released by the office of Manhattan District Attorney Cyrus R. Vance Jr. Cybercriminals are believed to have defrauded StubHub of $1 million, the statement said, citing City of London Police Commissioner Adrian Leppard. (Reporting by Karen Freifeld in New York. Writing by Jim Finkle in Boston; Editing by Chris Reese)


AP source: Thieves got into 1K StubHub accounts

- Wed, 23 Jul 2014 12:50:30 -0400

Cyber thieves got into more than 1,000 StubHub customers' accountsNEW YORK (AP) ? Cyber thieves got into more than 1,000 StubHub customers' accounts and fraudulently bought tickets for events through the online ticket reseller, a law enforcement official and the company said.


Apple denies intentionally compromising iOS security, explains ?backdoor? features

- Wed, 23 Jul 2014 08:45:14 -0400

Apple denies intentionally compromising iOS security, explains ?backdoor? featuresFollowing an extensive security report from an iOS forensic and security expert that questioned some of Apple?s iOS tools when it comes to the user?s security and privacy (see his questions in the image above), Apple has taken another step to address ?backdoor? concerns on top of stating that it?s not working with anyone to include backdoors in any of its products. Researcher Jonathan Zdziarski said in his paper that certain tools available in iOS will allow governmental spying agencies and other third parties to remotely control an iOS device and install silent malware that could then be used to spy on an unsuspecting user. Apple has published a new support document on its website, offering some explanations on how


PayPal signs "ten of thousands" customers in Nigerian launch

- Wed, 23 Jul 2014 02:39:47 -0400

Onasanya, managing director of First Bank of Nigeria, and Dahan, PayPal's regional director of Israel and Africa shake hands at the announcement of a partnership between First Bank of Nigeria and PayPal, in LagosBy Chijioke Ohuocha LAGOS (Reuters) - PayPal has signed up "tens of thousand" of Nigerians in its first week of operating in Africa's biggest economy, with consumers already purchasing items from Britain, China and the United States via its online platform, a company official said. E-commerce remains in its infancy in most of Africa but is growing exponentially with the advent of online retailers such as Jumia, partly owned by South African phone operator MTN, and a growing middle class with money to spend. ...


Integrating Into the 'Internet of Things' (Op-Ed)

- Tue, 22 Jul 2014 13:36:45 -0400

Integrating Into the 'Internet of Things' (Op-Ed)Kevin Curran is a reader in Computer Science at the University of Ulster and an IEEE Senior Member. The Internet of Things †(IoT) will allow consumers to interact with nearly every appliance and device they own. We are seeing elements of the IoT in the marketplace already, with home automation having a strong consumer pull ? controlling the lights and temperature, closing the garage door while across town, getting alerts from a smoke detector. If IoT is campaigning to run nearly every aspect of people's digital lives, we need to consider factors that will ensure a seamless and safe introduction.


China's Xiaomi hopes Mi 4 smartphone can take on Apple

- Tue, 22 Jul 2014 08:36:19 -0400

Lei Jun, founder and CEO of China's mobile company Xiaomi, shows new features at launch ceremony of Xiaomi Phone 4 in BeijingXiaomi launched its flagship Mi 4 smartphone at a glitzy event in Beijing, where the Chinese budget handset maker's chief executive sought to challenge larger U.S. rival Apple Inc. The Mi 4 comes as budget handset makers in China are competing more aggressively on price and generous features, with even high-end manufacturers feeling the pressure. Dressed in a black T-shirt and blue jeans, Xiaomi CEO Lei Jun took aim repeatedly at iPhone maker Apple during the presentation on Tuesday, comparing the design and manufacturing process of his new 4G handset to the U.S. firm's more expensive offerings. "Even our white color is whiter!" Apple, which was due to announce second-quarter earnings later on Tuesday, was not immediately available to comment. The forthright Jun spent nearly an hour on stage describing the Mi 4 phone's construction - particularly its beveled metal rim whose similarity with Apple's phones drew murmurs of "iPhone" from the journalists at the event.


Apple denies having included a backdoor in iOS or other products

- Tue, 22 Jul 2014 07:15:56 -0400

Apple denies having included a backdoor in iOS or other productsAn extensive research paper from a security specialist revealed earlier this week that governments and other third-parties with malicious intentions would be able to use certain tools in iOS to extract information from iPhones and other iOS devices, without the user?s consent or knowledge. Apple has already issued a response on the matter, denying the existence of backdoors in its products, and further emphasizing the security and privacy features of iOS. ?We have designed iOS so that its diagnostic functions do not compromise user privacy and security, but still provides needed information to enterprise IT departments, developers and Apple for troubleshooting technical issues,? Apple wrote in an email statement that was published on Twitter by Financial Times journalist Tim Bradshaw.


Fund managers unconvinced by Apple rebound

- Tue, 22 Jul 2014 05:45:59 -0400

The leaf on the Apple symbol is tinted green at the Apple flagship store on 5th Ave in New YorkBy David Randall and Edwin Chan NEW YORK/SAN FRANCISCO (Reuters) - Apple, once a can't-miss stock, is finding it tough to persuade portfolio managers to come back into the fold. Yet the company remains one of the most significantly underweighted stocks among large cap fund managers, according to a Goldman Sachs report. Part of the reason for a lack of portfolio manager enthusiasm is that Apple Inc no longer seems to be the hot growth company of old, fund managers say. Apple reports results for its fiscal third quarter on Tuesday, July 22.


Fund managers unconvinced by Apple rebound as firm readies results

- Mon, 21 Jul 2014 18:13:33 -0400

The Apple logo is pictured at a retail store in the Marina neighborhood in San FranciscoBy David Randall and Edwin Chan NEW YORK/SAN FRANCISCO (Reuters) - Apple, once a can't-miss stock, is finding it tough to persuade portfolio managers to come back into the fold. Yet the company remains one of the most significantly underweighted stocks among large cap fund managers, according to a Goldman Sachs report. Part of the reason for a lack of portfolio manager enthusiasm is that Apple Inc no longer seems to be the hot growth company of old, fund managers say. Apple reports results for its fiscal third quarter on Tuesday, July 22.


Hacking talks axed over the years

- Mon, 21 Jul 2014 15:08:19 -0400

(Reuters) - A highly anticipated talk on how to identify users of the Tor service, widely used to access the Internet anonymously, has been withdrawn from next month's annual Black Hat security conference. Hacking experts disclose vulnerabilities at conferences to alert the public about security flaws, both to pressure developers to fix them and to warn users about products that may not be completely safe. Here are some examples of other hacking talks that have been pulled from conferences over the past decade: 2013 - Three European computer scientists canceled a talk on hacking the locks of luxury cars at a prestigious U.S. academic conference known as USENIX, after Volkswagen AG obtained a restraining order from a British court. 2007 - Security firm IOActive Inc pulled a talk at Black Hat DC on bugs in radio-frequency identification, or RFID, technology, saying it was pressured to do so by RFID technology firm HID Global Corp. 2005 - Cisco Systems Inc persuaded security firm Internet Security Systems to pull a discussion on hacking routers by researcher Michael Lynn at the Black Hat hacking conference in Las Vegas.

Security researcher: iOS security has been intentionally compromised by Apple

- Mon, 21 Jul 2014 12:33:07 -0400

Apple denies intentionally compromising iOS security, explains ?backdoor? featuresApple?s placing a lot of emphasis on iOS security (especially when compared with that ?toxic hellstew? Android) and on privacy (again, compared to its rival) but it turns out that iOS might not be as secure or private as Apple has led customers to believe. Security researcher Jonathan Zdziarski has a new paper out†called ?Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices,? in which he†reveals Apple?s complex tools inside iOS that would allow Apple to share†certain user data†at the request of law enforcement without the user knowledge. More importantly, with or without Apple?s help, spying agencies such as NSA and other third parties that are very familiar with how iOS operates can apparently†use these vulnerabilities to grab plenty


Kenya military Twitter account hacked

- Mon, 21 Jul 2014 11:58:28 -0400

The Twitter account run by Kenya's military was taken over by hackers claiming to be from the international activist collective Anonymous, a military spokesman said Monday No internal military systems ...

Huawei's H1 revenue up 19 percent year-on-year at $22 billion

- Sun, 20 Jul 2014 22:45:58 -0400

A man walks past a Huawei company logo outside the entrance of a Huawei office in Wuhan, Hubei provinceHuawei Technologies Co Ltd, the world's No. 2 telecom equipment maker, said on Monday it will achieve sustainable growth in 2014 after posting a 19 percent jump in first-half revenue to 135.8 billion yuan ($21.88 billion). "Driven by increasing investments in LTE networks worldwide, Huawei has further solidified its leadership position in mobile broadband," Huawei's CFO Cathy Meng said in the statement. "Rapid growth in software and services helped maintain steady growth in our carrier network business." Meng said Huawei achieved "sustainable growth" in its consumer business, which includes smartphone manufacturing, thanks to better brand awareness.


Snowden seeks to develop anti-surveillance technologies

- Sat, 19 Jul 2014 18:23:31 -0400

Accused government whistleblower Snowden is seen on a screen as he speaks via videoconference with members of the Committee on legal Affairs and Human Rights of the Parliamentary Assembly of the Council of Europe in StrasbourgBy Jim Finkle NEW YORK (Reuters) - Edward Snowden, a former U.S. spy agency contractor who leaked details of major U.S. surveillance programs, called on supporters at a hacking conference to spur development of easy-to-use technologies to subvert government surveillance programs around the globe.† Snowden, who addressed conference attendees on Saturday via video link from Moscow, said he intends to devote much of his time to promoting such technologies, including ones that allow people to communicate anonymously and encrypt their messages. He escaped the United States after leaking documents that detailed massive U.S. surveillance programs at home and abroad - revelations that outraged some Americans and sparked protests from countries around the globe. At the HOPE hacking conference, several talks detailed approaches for thwarting government surveillance, including a system known as SecureDrop that is designed to allow people to anonymously leak documents to journalists. The conference featured about 100 presentations on topics ranging from surveillance to hacking elevators and home routers.


Golf-Blood spilt as Els says he put 'jinx' on his group

- Fri, 18 Jul 2014 02:45:00 -0400

Ernie Els of South Africa walks off after finishing his first round of the British Open Championship at the Royal Liverpool Golf Club in HoylakeBy Martyn Herman HOYLAKE England (Reuters) - Ernie Els left a spectator bloodied with a wild opening tee shot, defending champion Phil Mickelson went out of bounds, and Bubba Watson's promising start was blown away at the British Open on Thursday. Double Open champion Els went round in 79 after being visibly shaken by the bloody aftermath of an errant drive at the first and then missing two tiddlers on the green, one with a casual back-handed putt usually reserved for park hackers.


Hackers target Nest as a warning to Google about data-sharing

- Thu, 17 Jul 2014 17:00:19 -0400

If you ask Nest about sharing data with its new owner, the company will say that advertising isn?t part of its business model†and that it plans to protect the privacy of its customers from Google. Nest will have to share some data with Google and others†in order to enable automatic home-related features, but it is†not supposed to lead to Google targeting users with even more ads than it currently does. To make sure Google won?t someday spam Nest owners with ads, a group of hackers plans to take preemptive action against Google and Nest, Forbes reports. Researchers from the University of Central Florida have found a vulnerability they can exploit in order to stop Nest thermostats from sending data to

Hackers target Nest in as a warning to Google about data-sharing

- Thu, 17 Jul 2014 17:00:19 -0400

If you ask Nest about sharing data with its new owner, the company will say that advertising isn?t part of its business model†and that it plans to protect the privacy of its customers from Google. Nest will have to share some data with Google and others†in order to enable automatic home-related features, but it is†not supposed to lead to Google targeting users with even more ads than it currently does. To make sure Google won?t someday spam Nest owners with ads, a group of hackers plans to take preemptive action against Google and Nest, Forbes reports. Researchers from the University of Central Florida have found a vulnerability they can exploit in order to stop Nest thermostats from sending data to

Blood spilt as Els says he put 'jinx' on his group

- Thu, 17 Jul 2014 16:02:59 -0400

By Martyn Herman HOYLAKE England (Reuters) - Ernie Els left a spectator bloodied with a wild opening tee shot, defending champion Phil Mickelson went out of bounds, and Bubba Watson's promising start was blown away at the British Open on Thursday. Double Open champion Els went round in 79 after being visibly shaken by the bloody aftermath of an errant drive at the first and then missing two tiddlers on the green, one with a casual back-handed putt usually reserved for park hackers.

These are the absurd names British intelligence spies have to remember to spy on you

- Tue, 15 Jul 2014 21:45:21 -0400

These are the absurd names British intelligence spies have to remember to spy on youIn case you didn?t know it by now, spy agencies are really good ? and hopefully effective ? at†spying on people, including both actual valid targets as well as†unsuspecting citizens who†aren?t plotting anything bigger than a trip to†an exotic country.†To further demonstrate the power of one such agency ? NSA?s close buddy, the British GCHQ, in this case ? The Intercept has published a new Snowden leak, which reveals such ambitious mass spying plans, as well as their silly names. ?The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, ?amplif[y]? sanctioned messages on YouTube, and


'Smart' technology could make utilities more vulnerable to hackers

- Tue, 15 Jul 2014 21:31:53 -0400

By Christoph Steitz and Harro Ten Wolde FRANKFURT (Reuters) - Last November, Felix Lindner came very close to shutting down the power supply of Ettlingen, a town of almost 40,000 people in the south of Germany. "We could have switched off everything: power, water, gas," Lindner, head of Berlin-based Recurity Labs, an IT security company, said. Fortunately for residents, Lindner's cyber attack on its energy utility, Stadtwerke Ettlingen, was simulated. "The experiment has shown that sensitive, critical infrastructure is not sufficiently protected," said Eberhard Oehler, managing director of the utility, Stadtwerke Ettlingen.

Apple, IBM team up in mobile devices, applications

- Tue, 15 Jul 2014 18:13:10 -0400

CUPERTINO, Calif. (AP) ? Apple is teaming up with former nemesis IBM in an attempt to sell more iPhones and iPads to corporate customers and government agencies.

Insurers struggle to get grip on burgeoning cyber risk market

- Mon, 14 Jul 2014 13:20:05 -0400

A lock icon, signifying an encrypted Internet connection, is seen on an Internet Explorer browser in ParisHigh profile cases of hackers seizing sensitive customer data from companies, such as U.S. retailer Target Corp or e-commerce company eBay Inc, have executives checking their insurance policies. Increasingly, corporate risk managers are seeing insurance against cyber crime as necessary budget spending rather than just nice to have. The insurance broking arm of Marsh & McLennan Companies estimates the U.S cyber insurance market was worth $1 billion last year in gross written premiums and could reach as much as $2 billion this year. The European market is currently a fraction of that, at around $150 million, but is growing by 50 to 100 percent annually, according to Marsh.


FBI cyber expert is ex-discount furniture salesman

- Sun, 13 Jul 2014 20:50:07 -0400

FBI Supervisory Special Agent J. Keith MularskiPITTSBURGH (AP) ? J. Keith Mularski's world has expanded greatly since he stopped selling discount furniture to join the FBI in 1998. Now recognized as a foremost expert on cybercrime, Mularski's profile has risen since the U.S. Justice Department used Mularski's sleuthing to bring two indictments with worldwide ramifications.


Chinese man accused of hacking into US computers

- Fri, 11 Jul 2014 21:18:35 -0400

SAN DIEGO (AP) ? U.S. authorities have charged a Chinese businessman with hacking into the computer systems of U.S. companies with large defense contracts, including Boeing, to steal data on military projects, including some of the latest fighter jets, officials said Friday.

Microsoft says cybercrime bust frees 4.7 million infected PCs

- Thu, 10 Jul 2014 18:25:04 -0400

The Microsoft logo is seen at their offices in BucharestBy Jim Finkle BOSTON (Reuters) - Microsoft Corp said it has freed at least 4.7 million infected personal computers from control of cyber crooks in its most successful digital crime-busting operation, which interrupted service at an Internet-services firm last week. The world's largest software maker has also identified at least another 4.7 million infected machines, though many are likely still controlled by cyber fraudsters, Microsoft's cybercrime-fighting Digital Crimes Unit said on Thursday. Richard Domingues Boscovich, assistant general counsel of the unit, said Microsoft would quickly provide government authorities and Internet service providers around the world with the IP addresses of infected machines so they can help users remove the viruses. "Those victims are currently not aware they are infected," Boscovich said in an interview.


Beijing Security Conference Offers $10,000 Bounty for Tesla Hack

- Thu, 10 Jul 2014 16:16:31 -0400

Beijing Security Conference Offers $10,000 Bounty for Tesla HackThe Symposium on Security for Asia Network (SyScan), a†security conference in Beijing, is asking attendees to try their hand at hacking into a Tesla car. The conference will be full of security experts and if one of them succeeds at cracking Tesla's code, they will walk away with $10,000. The conference takes place next Wednesday and Thursday, so participants have time to prepare their hacking tactics.† John Pescatore,†director for emerging security trends at The SANS Institute, told Fox News, "They have a good security reputation mainly because nobody has pounded on them yet."†


Report: Chinese hackers hit US personnel networks

- Thu, 10 Jul 2014 12:35:21 -0400

Secretary of State John Kerry, left, meets with Chinese President Xi JinpingWASHINGTON (AP) ? Chinese hackers broke into the computer networks of the Office of Personnel Management earlier this year with the intention of accessing the files of tens of thousands of federal employees who had applied for top-secret security clearances, according to The New York Times.


Symantec in talks with Chinese government after software ban report

- Thu, 10 Jul 2014 11:43:42 -0400

By Jim Finkle BOSTON (Reuters) - U.S. security software maker Symantec Corp said it is holding discussions with authorities in Beijing after a state-controlled Chinese newspaper reported that the Ministry of Public Security had banned use of one of its products. The China Daily reported last week that the ministry had issued an order to its branches across the nation telling them to uninstall Symantec's data loss prevention, or DLP, products from their systems and banning their future purchase, saying the software "could pose information risks." (http://bit.ly/1okVF3v)The vaguely worded report did not explain why the ministry believed Symantec's software presented a security threat. Symantec is the latest large U.S. technology company to encounter challenges in China since last year when former National Security Agency contractor Edward Snowden began leaking details about U.S. surveillance programs.

Chinese hackers pursue key data on U.S. workers: NYT

- Thu, 10 Jul 2014 09:00:02 -0400

An analyst looks at code in the malware lab of a cyber security defense lab at the Idaho National Laboratory(Reuters) - Chinese hackers broke into the computer networks of the U.S. government agency that keeps the personal information of all federal employees in March, the New York Times reported, citing senior U.S. officials. The hackers appeared to be targeting files on tens of thousands of employees who have applied for top-secret security clearances, the newspaper said.


US, China talk cyberhacking amid new allegations

- Thu, 10 Jul 2014 08:48:30 -0400

US, China talk cyberhacking amid new allegationsTop American officials said Thursday they challenged their counterparts in China to rein in alleged cybersecurity infringements as a new allegation emerged of a brazen attempt by Chinese hackers to break ...


China, U.S. to boost security ties, but no breakthroughs

- Thu, 10 Jul 2014 06:08:16 -0400

U.S. Secretary of State John Kerry talks with China's President Xi Jinping at the Great Hall of the People in BeijingBy Lesley Wroughton and Michael Martina BEIJING (Reuters) - China and the United States agreed on Thursday to boost military ties and counter-terrorism cooperation during high-level annual talks in Beijing, but there was little immediate sign of progress on thorny cyber-security or maritime issues. The two-day talks, led by Secretary of State John Kerry and Treasury Secretary Jack Lew for the United States and Vice Premier Wang Yang and top diplomat Yang Jiechi for China, were never expected to achieve great breakthroughs. After discussions on topics ranging from the value of China's currency to North Korea, Yang said the two sides agreed to strengthen cooperation in counter-terrorism, law enforcement and military-to-military relations. On two of the most sensitive issues - maritime disputes and cyber-spying - Yang largely restated Beijing's position on both.


 

Twitter / SecureMac

http://twitter.com/SecureMac

SecureMac: MacScan 2.9.3 with Google Chrome & SeaMonkey Support Released for Macs #privacy #security #mac - http://t.co/wCy0sddR

- Fri, 18 May 2012 14:52:24 +0000

SecureMac: MacScan 2.9.3 with Google Chrome & SeaMonkey Support Released for Macs #privacy #security #mac - http://t.co/wCy0sddR

SecureMac: Proud @MacworldUK and @MacworldAU reviewed @PrivacyScan and gave it 5/5 stars & an Editor's Choice award! http://t.co/ew6Wjj67

- Thu, 05 Apr 2012 01:30:08 +0000

SecureMac: Proud @MacworldUK and @MacworldAU reviewed @PrivacyScan and gave it 5/5 stars & an Editor's Choice award! http://t.co/ew6Wjj67

SecureMac: Researching new piece of Mac #malware that is currently in the wild infecting computers running OS X. http://t.co/38RsQVAQ

- Tue, 20 Mar 2012 06:00:04 +0000

SecureMac: Researching new piece of Mac #malware that is currently in the wild infecting computers running OS X. http://t.co/38RsQVAQ

SecureMac: SecureMac is honored ~ @MacworldUK has awarded @PrivacyScan as Best of Show for Macworld | iWorld this year. http://t.co/bBqaCH7F

- Fri, 16 Mar 2012 20:18:06 +0000

SecureMac: SecureMac is honored ~ @MacworldUK has awarded @PrivacyScan as Best of Show for Macworld | iWorld this year. http://t.co/bBqaCH7F

SecureMac: Attention Developers, @SecureMac is hiring Cocoa Developers. http://t.co/F4Give2s #jobs #dev #hiring

- Tue, 13 Mar 2012 18:52:23 +0000

SecureMac: Attention Developers, @SecureMac is hiring Cocoa Developers. http://t.co/F4Give2s #jobs #dev #hiring

SecureMac: SecureMac is hiring more Mac Cocoa Developers. See requirements & submit resume! #jobs #macjobs http://t.co/LOfi5e5T

- Mon, 05 Mar 2012 21:06:20 +0000

SecureMac: SecureMac is hiring more Mac Cocoa Developers. See requirements & submit resume! #jobs #macjobs http://t.co/LOfi5e5T

SecureMac: Read how Google's accused of Bypassing Safari's Privacy Controls http://t.co/1KyOlzbH Another Reason for @MacScan @PrivacyScan

- Fri, 17 Feb 2012 16:55:34 +0000

SecureMac: Read how Google's accused of Bypassing Safari's Privacy Controls http://t.co/1KyOlzbH Another Reason for @MacScan @PrivacyScan

SecureMac: PrivacyScan 1.0.1 has been released and is available on the Mac App Store adding bug fixes still 4.99! http://t.co/8fV15Tm7

- Wed, 08 Feb 2012 05:58:53 +0000

SecureMac: PrivacyScan 1.0.1 has been released and is available on the Mac App Store adding bug fixes still 4.99! http://t.co/8fV15Tm7

SecureMac: With the launch of @PrivacyScan in the Mac App Store we're #1 in utilities and ranking in top 10 paid overall. Day 1 http://t.co/Chc4IZDE

- Fri, 27 Jan 2012 02:19:15 +0000

SecureMac: With the launch of @PrivacyScan in the Mac App Store we're #1 in utilities and ranking in top 10 paid overall. Day 1 http://t.co/Chc4IZDE

SecureMac: @fakemacfusion Are you on the macworld press list? Let me know your email to get you off the PR list.

- Thu, 26 Jan 2012 16:06:39 +0000

SecureMac: @fakemacfusion Are you on the macworld press list? Let me know your email to get you off the PR list.

SecureMac: SecureMac staff will be on the Macworld show floor today at booth #442 talking security and demonstrating @PrivacyScan & @MacScan

- Thu, 26 Jan 2012 16:04:23 +0000

SecureMac: SecureMac staff will be on the Macworld show floor today at booth #442 talking security and demonstrating @PrivacyScan & @MacScan

SecureMac: PrivacyScan is now live on the Mac App Store! Check it out and give us your feedback! http://t.co/4W4y8ztO

- Wed, 25 Jan 2012 16:54:46 +0000

SecureMac: PrivacyScan is now live on the Mac App Store! Check it out and give us your feedback! http://t.co/4W4y8ztO

SecureMac: Need an Free/Discounted Expo Hall Pass to @Macworldexpo ? Get em while they last! http://t.co/gHP8PaZe #macworld

- Thu, 19 Jan 2012 20:39:49 +0000

SecureMac: Need an Free/Discounted Expo Hall Pass to @Macworldexpo ? Get em while they last! http://t.co/gHP8PaZe #macworld

SecureMac: We're going to be at @macworldexpo booth #442! Be sure to stop by and learn about the latest products!

- Wed, 18 Jan 2012 22:30:24 +0000

SecureMac: We're going to be at @macworldexpo booth #442! Be sure to stop by and learn about the latest products!

SecureMac: Getting ready for #macworld ~ booth 442. Be sure to follow us if you're still looking for a free expo hall pass, and watch for link.

- Fri, 06 Jan 2012 19:20:40 +0000

SecureMac: Getting ready for #macworld ~ booth 442. Be sure to follow us if you're still looking for a free expo hall pass, and watch for link.

SecureMac: Start off your New Year by changing your passwords. How long has it been? #macsecurity

- Wed, 04 Jan 2012 17:03:38 +0000

SecureMac: Start off your New Year by changing your passwords. How long has it been? #macsecurity

SecureMac: @ken_gok email macsec@securemac.com with as much info as you have on what you downloaded including links and we can check it out!

- Fri, 23 Dec 2011 15:50:24 +0000

SecureMac: @ken_gok email macsec@securemac.com with as much info as you have on what you downloaded including links and we can check it out!

SecureMac: MacScan 2.9.2 Released! Celebrate with us and download a free 30-day trial or upgrade your app! http://t.co/xr3NJoQk

- Tue, 20 Dec 2011 17:09:59 +0000

SecureMac: MacScan 2.9.2 Released! Celebrate with us and download a free 30-day trial or upgrade your app! http://t.co/xr3NJoQk

SecureMac: Love Cyber Monday? Get the http://t.co/G8EB7cwc software bundle for 49.99! First 10k people get MacScan!

- Mon, 28 Nov 2011 17:23:17 +0000

SecureMac: Love Cyber Monday? Get the http://t.co/G8EB7cwc software bundle for 49.99! First 10k people get MacScan!

SecureMac: RT @macscan: 1 Day Only - Black Friday Sale ~ MacScan 80% OFF Use Coupon Code CYBERSALE11 - http://t.co/AtD091ty

- Fri, 25 Nov 2011 05:08:17 +0000

SecureMac: RT @macscan: 1 Day Only - Black Friday Sale ~ MacScan 80% OFF Use Coupon Code CYBERSALE11 - http://t.co/AtD091ty