IANS Blog RSS Feed

http://www.iansresearch.com

Poulin to CSO: We Hacked a Smart Building Using ?Old-School? Techniques

- Thu, 11 Feb 2016 00:00:00 GMT

The ?smarter? buildings get, the easier they are to hack? Maybe. IANS Faculty Chris Poulin, research strategist for IBM?s X-Force ethical hacking team, recently spoke to CSO?s Maria Korolov about a penetration test in which his team was able to gain access to all of the buildings operated by a building management company.

Privacy, Security Concerns Rise as States Mull Encryption Backdoor Requirements

- Wed, 27 Jan 2016 00:00:00 GMT

National Data Privacy Day (January 28th) certainly comes at an interesting time this year, as legislators in two of the most technology-centric U.S. states recently introduced similar bills that would force smartphone manufacturers to include encryption backdoors in their devices.

Fledgling Cyber-Insurance Market Tested by Early Denials, Lawsuits

- Wed, 20 Jan 2016 00:00:00 GMT

Cybersecurity insurance policies may be relatively new, but they have one important thing in common with established, legacy business coverage: They live and die in the fine print.

Hacker-Caused Ukrainian Power Outage Marks First Known Attack With Immediate, Direct Public Impact

- Tue, 05 Jan 2016 00:00:00 GMT

Security researchers have confirmed that a recently updated version of the highly destructive BlackEnergy malware package infected the systems of at least three power authorities in Ukraine, causing a massive outage that left thousands of homes in the Ivano-Frankivsk region of the country without electricity. 

Top 10 IANS Insights from a Tumultuous 2015

- Mon, 28 Dec 2015 00:00:00 GMT

Another year is in the books and what a year it was for infosec pros. From the Ashley Madison hack to the OPM breach, to Jeep commandeering and mysterious backdoors in popular networking gear, every week brought a new security twist that forced us all to keep our heads on swivels.

Herold: Misguided CISA Heightens Security, Privacy Concerns

- Mon, 21 Dec 2015 00:00:00 GMT

The controversial Cybersecurity Information Sharing Act (CISA) is now the law of the land, slipped into an eleventh-hour spending bill designed to keep the federal government running through 2016.

Patch Now: Rogue Code Leaves Gaping Hole in Juniper Gear

- Fri, 18 Dec 2015 00:00:00 GMT

Juniper Networks says unauthorized code could allow attackers to gain administrative access to its NetScreen appliances and decrypt VPN connections without leaving any trace of their actions. Users are urged to apply fixes immediately.

Poulin: Time to Realistically Acknowledge Vehicle Vulnerabilities

- Wed, 16 Dec 2015 00:00:00 GMT

The images and breathless banter were difficult to ignore: celebrity security researchers gaining remote command of an automobile, disrupting on-board systems before forcing the vehicle and its helpless driver into a ditch.

NIST to Infosec Pros: How Is Our Framework Working?

- Mon, 14 Dec 2015 00:00:00 GMT

The National Institute of Standards and Technology is asking infosec practitioners in the public and private sectors to comment on the efficacy of its cybersecurity framework as it prepares to update the popular, two-year-old document.

As Ransomware Attacks Evolve, Security Teams Must Prepare For New ?Drive-By? Tactics

- Thu, 10 Dec 2015 00:00:00 GMT

Another week, another evolution of the popular ransomware attacks. When we last wrote about it, researchers had discovered a new iteration ? ?Linux.Encoder.1? ? that enabled attackers to inject malware into Linux-powered websites and encrypt all files in the home and backup directories. Now, it appears the popular exploit kit Angler is being used to spread the latest version of CryptoWall and other ransomware on websites as part of ?drive-by? campaigns that begin with the deployment of password-stealing malware. 

Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

Trojan.Ransomcrypt.AL

- Thu, 28 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomlock.AQ

- Thu, 28 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Pekelog

- Wed, 27 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Adupihan

- Wed, 27 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Prociy

- Thu, 28 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Downloader.Exopire

- Thu, 28 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Godmodir

- Wed, 27 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Pekato

- Thu, 28 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Etumbot

- Tue, 26 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Exedapan!gm

- Tue, 26 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Pladrop

- Tue, 26 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-2347

- Wed, 27 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Boyapki.E

- Mon, 25 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AO

- Mon, 25 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Banswift

- Mon, 25 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-0147

- Sun, 24 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-0127

- Sun, 24 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Packed.Generic.503

- Sun, 24 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Contwoo

- Fri, 22 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Phytob

- Thu, 21 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Exedapan

- Thu, 21 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

JS.Ransomcrypt

- Wed, 20 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Packed.Generic.501

- Wed, 20 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Multigpos

- Wed, 20 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Multig!gm

- Wed, 20 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

JS.Proxybrowse

- Thu, 21 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AN

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptlock.AN!gm

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

BBOS.Stealthgenie

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Exploz.C

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus.

W32.Exploz.C

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Virus.

Exp.CVE-2016-0164

- Wed, 20 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-0155

- Wed, 20 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Adwind!gen1

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g112

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Downloader!gen2

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g200

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g100

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g140

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g173

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.OF!g2

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.OF!g3

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Nancrat!gen3

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SillyFDC!gen5

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Worm.

SONAR.Trafic2.RGC!g15

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspExt!gen1

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic1.RGC!g13

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic2.RGC!g4

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Infostealer.Naibe

- Mon, 18 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AK

- Mon, 18 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Nymaim.B!gm

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AM

- Tue, 19 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W97M.Downloader.H

- Mon, 18 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptlock.W!g2

- Sat, 16 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Packed.Generic.500

- Thu, 14 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-0157

- Fri, 15 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-0158

- Fri, 15 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.Qakbot!gen12

- Fri, 15 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Virus, Worm.

SONAR.Trafic2.RGC!g13

- Wed, 13 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.SH!g8

- Wed, 13 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.CM!g5

- Wed, 13 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Kotver!gen2

- Wed, 13 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g129

- Wed, 13 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MSWord!g1

- Wed, 13 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Zbot.D

- Wed, 13 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AJ

- Tue, 12 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Orcalata

- Mon, 11 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Downloader.Orcalata

- Mon, 11 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AI

- Sun, 10 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Downloader.Zirchap

- Sat, 9 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Karus

- Sat, 9 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W97M.Downloader.G

- Tue, 5 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-1019

- Fri, 8 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Heur.RGC!g153

- Thu, 7 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g186

- Thu, 7 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g151

- Thu, 7 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g152

- Thu, 7 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g155

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g156

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Infostealer.Poslit

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Perper

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptolocker.AL

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptlock.AL!gm

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.AH

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Cryptlocker!g51

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g103

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g106

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g101

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g102

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g115

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g114

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g117

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g111

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g119

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g118

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g110

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g120

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g116

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g121

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g122

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g124

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g131

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g126

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g125

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g133

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g132

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g135

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic2.RGC!g6

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic2.RGC!g16

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g134

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic2.RGC!g10

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Trafic1.RGC!g10

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g145

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspLaunch!gen11

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspLaunch!gen10

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.SH!g6

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspDrop!gen7

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g143

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g146

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Nancrat!gen4

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g141

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g149

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g148

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.DL!g3

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.CM!g8

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.CM!g21

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC.CM!g10

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g98

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g97

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g95

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g94

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g93

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g199

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g197

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g195

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g194

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g193

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g188

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g192

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g177

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g187

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g178

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g184

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g179

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g176

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g175

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g174

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g172

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g170

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g168

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g162

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g163

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g165

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g159

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g167

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g157

- Wed, 6 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

W32.Grenail.O!inf

- Tue, 5 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Virus.

Trojan.Cryptolocker.AK

- Tue, 5 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.Ransomlock.AP

- Tue, 5 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Worm.

Infostealer.Fakepude

- Mon, 4 Apr 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

Qatar bank says some leaked customer data may be accurate

- Sun, 01 May 2016 12:07:59 -0400

DUBAI, United Arab Emirates (AP) ? Qatar's largest bank acknowledged Sunday that some personal customer data that was leaked online may be authentic, and said it has hired an outside expert to review potential vulnerabilities to its computer systems.

Qatar National Bank says customer accounts safe despite data breach

- Sun, 01 May 2016 08:39:41 -0400

A general view of Qatar National Bank's head office building in DohaQatar National Bank, the Middle East's largest lender by assets, said it had taken immediate steps to ensure customers would not suffer any financial loss after a security breach last week exposed personal data of thousands of clients.


Islamic State-linked hackers post target list of New Yorkers

- Fri, 29 Apr 2016 14:19:54 -0400

Picture illustration taken in Zenica shows man typing on a keyboard in front of a computer screen on which an Islamic State flag is displayedBy Joseph Ax NEW YORK (Reuters) - A group of hackers linked to Islamic State has posted online a list of thousands of New York residents and urged followers of the militant group to target them, according to a source with knowledge of the matter. Federal agents and New York City police officers have been contacting the individuals on the list to inform them of the posting, but the source said law enforcement does not believe there is any credible threat. In a statement, the Federal Bureau of Investigation said, "While our standard practice is to decline comment on specific operational and investigative matters, the FBI routinely notifies individuals and organizations of information collected during the course of an investigation that may be perceived as potentially threatening in nature." The list includes names, home addresses and email addresses.


Meet Rep. Ted Lieu, a Congressman who says encryption is a ?national security priority?

- Fri, 29 Apr 2016 12:27:26 -0400

Ted Lieu is one of the few bona fide computer geeks in Congress. Even if you didn?t already know the California Democrat is one of only four congressmen (out of a total of 535) with a computer science degree, it?s the kind of thing that quickly becomes apparent when talking to the Stanford grad about a range of privacy and encryption matters. For starters, he recently downloaded and started using WhatsApp, the Facebook-owned messaging platform that earlier this month defaulted to end-to-end encryption for all users. He?s not only a supporter of strong encryption without backdoors ? Lieu considers it ?a national security priority.? DON'T MISS:  Completely change the look of your iPhone with round folder icons, no jailbreak needed Earlier this year, he co-sponsored legislation that would introduce a National Commission on Security and Technology Challenges. Essentially, it would impanel a group of digital security experts to make recommendations on how law enforcement can pursue investigations without undermining privacy protections or the competitiveness of U.S. tech companies. It?s also not every day you hear a sitting U.S. congressman ask you, as Lieu did during a conversation with BGR: ?Hey, by the way, do you watch ?Mr. Robot?? ? I actually don?t think the show is far-fetched at all.? As the idealogical fault lines over encryption and privacy continue to sharpen and government officials past and present continue moving over to this or that side of the line, Lieu represents an influential addition to the debate. Notwithstanding his membership in the minority party in the House, he?s a current federal lawmaker who thinks that writing new laws around encryption and privacy is something the government isn?t ready to tackle quite yet. ?My general view is I?m a great believer in both state and federal legislatures,? Lieu told BGR. At the same time, though, Lieu thinks that persuading lawmakers to pass legislation that tries to prevent situations like the recent flap between the FBI and Apple over an iPhone belonging to one of the San Bernadino shooters isn?t the right approach. ?(Legislatures) do a lot of good for America, but there are some things we?re not,? he continued. ?We are not nimble. We are not quick. We?re not elegant. And the law is often a very blunt instrument to try to address a problem. With technology, it?s pretty much the exact opposite of all of those characteristics. My view is you have to have very precise and well-written laws to address issues on technology. That?s often hard to do. And if you can?t do it right, my view is we shouldn?t be doing it at all.? Former Homeland Security Secretary Michael Chertoff, who today has a security consultancy called the Chertoff Group, is among a set of ex-national security types mentioned in a New York Times piece a few days ago who - perhaps surprisingly - side with Lieu when it comes to encryption. They include officials like former director of national intelligence Mike McConnell; former CIA director R. James Woolsey and former White House counterterrorism official Richard Clarke, among others. This is from a 28-page report prepared by the Chertoff group about encryption: ?Efforts to constrain encryption through forms of extraordinary access (for law enforcement) will inevitably introduce vulnerabilities into the security of consumer products in ways that are likely to have an adverse long-term effect on the security, privacy, and civil liberties of citizens ? our conclusion is that a mandate to require extraordinary lawful access to commercial encryption products would incur greater social, security, and economic costs than the benefits it would achieve. Based on what we know today from the public record, we recommend against the enactment of (an) extraordinary lawful access requirement.? Lieu, for his part, thinks now is also the least ideal time for congress to try to get involved. ?That?s why you have (defense secretary) Ash Carter coming out publicly saying he?s a strong believer in strong encryption without back doors, and that he doesn?t believe legislation should be done in times of grief and anger,? Lieu says. ?The FBI tries to frame this as privacy versus safety. And when you frame it that way, of course you?d say, well, we want our lives. But that?s not the proper frame. Because you can?t do back doors just for the good guys. ?My view is there?s not a lot of technical expertise in congress. I?m the only Democrat with a computer science degree. Before we wade into this fast-evolving area, let?s take a step back, get all the relevant information and consult with experts before moving forward.?

U.S. high court approves rule change to expand FBI hacking power

- Fri, 29 Apr 2016 03:39:33 -0400

A lock icon, signifying an encrypted Internet connection, is seen on an Internet Explorer browser in ParisBy Dustin Volz WASHINGTON (Reuters) - The Supreme Court on Thursday approved a rule change that would let U.S. judges issue search warrants for access to computers located in any jurisdiction despite opposition from civil liberties groups who say it will greatly expand the FBI's hacking authority. U.S. Chief Justice John Roberts transmitted the rules to Congress, which will have until Dec. 1 to reject or modify the changes to the federal rules of criminal procedure.


Hackers leak stolen Kenyan foreign ministry documents

- Fri, 29 Apr 2016 03:11:39 -0400

By George Obulutsa NAIROBI (Reuters) - Online activists who claim ties to Anonymous said on Thursday they had begun to leak documents from Kenya's foreign ministry as part of a campaign to expose government and corporate corruption across Africa. HackRead, a cyber security news site, reported that a hacker affiliated with "Operation Africa" had told it: "In (a) few days you will receive full disclosure of the data ? We the Anonymous will stand against corruption, child abuse, and child labour!" A link to a sample of 95 documents was published to a widely known Anonymous Twitter account, part of what it claimed was a one-terabyte stash of date from Kenya's Ministry of Foreign Affairs and International Trade. The documents, viewed by Reuters, appear to consist of mostly routine correspondence between Kenyan foreign ministry officials and other diplomatic missions, trade partners and international companies around the world.

Vasco posts 1Q profit

- Thu, 28 Apr 2016 18:19:52 -0400

The Oakbrook Terrace, Illinois-based company said it had net income of 6 cents per share. Earnings, adjusted for amortization costs and non-recurring costs, were 14 cents per share. The Internet security ...

Texas man in Iowa to face lottery jackpot fraud charges

- Thu, 28 Apr 2016 17:24:11 -0400

A Texas man accused of helping a lottery computer manager in Iowa collect jackpots from rigged lottery games gave up a yearlong extradition fight on Thursday and traveled to Iowa to face charges. Robert ...

Canada's Goldcorp says computer network hacked

- Thu, 28 Apr 2016 16:19:08 -0400

A general view shows the open pit gold mine of Goldcorp in PenasquitoBy Susan Taylor TORONTO (Reuters) - Canada's Goldcorp Inc on Thursday said its computer network had been compromised and the gold mining company was working to determine the scope and impact of the data breach. Vancouver-based Goldcorp's internal security team and independent technology security firms are gathering facts and informing affected employees, but Chief Executive David Garofalo said he was not overly worried. "The extent of the data breach is not of significant concern for us because we're a public company and anything of a material nature has to be in the public domain by law anyways.


ISIS is assembling a cyber army

- Thu, 28 Apr 2016 16:02:33 -0400

Following the deadly assaults on Europe in late 2015 and early 2016, reports emerged suggesting that ISIS has an army of organized hackers  who can provide consistent, round the clock  support to foot soldiers. However, new information on the matter seems to suggest that ISIS?s remaining hacking arm is nothing more than a propaganda machine capable of dealing minor hits, if any, to enemies. But ISIS is showing more interest in expanding its hacking capabilities. The news comes at a time when the U.S. government has declared cyber war on the Islamic paramilitary organization. DON?T MISS:  Apple issues statement following apparent suicide at Cupertino headquarters A report from Flashpoint called Hacking for ISIS: The Emergent Cyber Threat Landscape , first seen by Ars Technica , says that ISIS in April merged four independent pro-ISIS cyber teams into a single group called the United Cyber Caliphate. The group is made of the Sons Caliphate Army, the Caliphate Cyber Army, the Ghost Caliphate Section and Kalashnikov E-Security Team. These sound like rather scary organizations, but Flashpoint says they can?t do that much harm as they lack the expertise to conduct sophisticated digital assaults. ?Until recently, our analysis of the group's overall capabilities indicated that they were neither advanced nor did they demonstrate sophisticated targeting,? Flashpoint co-founder and Director of Research & Analysis for the Middle East and North Africa Laith Alkhouri said. ?With the latest unification of multiple pro-ISIS cyber groups under one umbrella, there now appears to be a higher interest and willingness amongst ISIS supporters in coordinating and elevating cyber attacks against governments and companies.? The report reveals that British citizen Junaid Hussain, who was killed in a raid in August 2015 , was the leader of ISIS's former Cyber Caliphate Army. Known as TriCK and part of a well-known black hat hackers group called TeaMp0isoN, Hussain joined ISIS in the summer of 2014. Since then, he has tried to recruit other colleagues into his team, but he hasn't been very successful. ISIS was able to take over social media accounts, defame websites (including CENTCOM and Newsweek), and attack the sites of certain cities, although it hasn't accomplished any major hack. Rather than coming up with its own hacks, the unified UCC group ? not to be confused with the US Cyber Command fighting ISIS hackers ? is likely going to employ ?malware as a service? exploit sites and other tools that can be purchased off hacker forums. The UCC would still be able to conduct propaganda operations and cause damage to ?soft? targets. So their capabilities, while limited, shouldn?t be completely ignored.

Google?s 2016 Nexus phones are probably going to be unbeatable

- Thu, 28 Apr 2016 15:12:14 -0400

Multiple reports have said that Google is already working hard on a couple of new Nexus handsets, undoubtedly the successors of the Nexus 5X and Nexus 6P . But rather than have LG and Huawei make them, Google supposedly hired HTC, the same company that made the iconic Nexus One. A pair of new reports bring further evidence that Google may indeed partner with HTC for the 2016 Nexus handsets ? yes, two devices are supposedly in the works. DON?T MISS:  How Snapchat and stupidity almost left five people dead First off, not only is HTC capable of making some impressive Android handsets ? just look at this year?s HTC 10 ? but the rumors come from sources who?re generally in the know about these type of things. https://twitter.com/evleaks/status/725395035022319616 Evan Blass and Android Police independently came out with details about the new Nexus handsets. Blass found out from his sources that HTC is making a pair of Android N handsets for Google, dubbed M1 and S1 internally. Meanwhile, a source told Android Police that Marlin and Sailfish are Google?s internal codenames for the new Nexus phones. The blog also dug through the available code to uncover evidence of one of the two names: Marlin. Sailfish is a weird choice for Google considering that it happens to be the name of a rival mobile operating system, but the company is known for using fish names for its Nexus devices. Furthermore, Blass and Android Police ?s reports certainly align: M1 might be the Marlin while S1 could stand for Sailfish. What about the numbers you ask? Neither source explains the detail. But an earlier report suggested that HTC may have inked a three-year Nexus exclusivity deal . So there?s that. It?s too early for specs, features or pictures. But the possibility of seeing HTC 10 variations turned into Nexus handsets is exciting. The HTC 10 is the most powerful smartphone ever and HTC'c hardware designs are always best-in-class. Add in stock Android and immediate access to software updates and you've got a pair of phones that might be unbeatable.

That time a Windows 10 update alert ruined a live TV broadcast

- Thu, 28 Apr 2016 09:35:09 -0400

How annoyed do you get each and every time a little alert pops up on your Windows computer insisting that you install the latest available platform updates? Do you keep your cool and just dismiss it? Do you get a little miffed and take your frustrations out on your mouse? Or maybe you're so tired of seeing these notifications that your blood begins to boil and you have to fight back the urge to break something. Now imagine you're reporting a weather forecast in the middle of a live TV broadcast when an alert pops up asking you to update... DON'T MISS:  Making sense of Apple now that everything has changed Via BetaNews , KCCI 8's meteorologist Metinka Slater was reporting the weather on live television when the Windows-powered computer her station uses to power weather graphics took an unplanned detour. Just as she was discussing heavy amounts of rainfall across southwest Iowa, an alert popped up saying that the channel's Windows computer wanted to install Windows 10. In the process, it covered her handy weather map graphics. To Slater's credit, she handled the curveball quite well. "Microsoft recommends upgrading to Windows 10... what should I do?" she asked sarcastically. "Ahhhh don't you love when that pops up, huh?" Microsoft has been pushing PC users with earlier Windows versions to update to Windows 10 in the hopes that they'll forget the Windows 8 debacle ever happened, and it has been doing so using annoying pop-up alerts like this one. Windows 10 is a huge improvement and we certainly recommend the free update, but don't worry, there's a way to stop those bothersome upgrade alerts if you're not quite ready to pull the trigger.  Here you go , Metinka. A video showing the blooper is embedded below.

Tennessee law to allow counselors to deny service based on beliefs

- Thu, 28 Apr 2016 09:03:59 -0400

File photo of Tennessee Republican Governor Haslam listening during the National Governors Association Winter Meeting in WashingtonGovernor Bill Haslam signed the bill into law three weeks after it was approved by the legislature. "The substance of this bill doesn't address a group, issue or belief system," Haslam said in a statement.


Philippine anti-money laundering body says remittance firm a 'cleaning house' in heist

- Thu, 28 Apr 2016 08:21:42 -0400

Commuters pass by the front of the Bangladesh central bank building in DhakaA Philippine anti-money laundering body has lodged a complaint against owners of a remittance firm it called a "cleaning house" to hide the trail of $81 million looted from a Bangladesh bank, in one of the biggest cyber heists in history. Philrem Service Corporation muddied the process and washed the stolen funds via a web of transfers and currency conversions around Philippine bank accounts, before moving it into Manila casinos and junket operators, the Anti-Money Laundering Council (AMLC) said in the filing dated Wednesday. Unidentified hackers infiltrated the computers at Bangladesh Bank, the central bank, in early February and tried to transfer some $951 million from its account at the Federal Reserve Bank of New York.


FBI says it won't disclose how it accessed locked iPhone

- Wed, 27 Apr 2016 23:39:15 -0400

FILE - In this Feb. 17, 2016 file photo, an iPhone is seen in Washington. The FBI said Wednesday, April 27, 2016, that it will not publicly disclose the method that allowed it to break into a locked iPhone used by one of the San Bernardino attackers, saying it lacks enough ?technical information? about the software vulnerability that was exploited. (AP Photo/Carolyn Kaster, File)WASHINGTON (AP) ? The FBI said Wednesday that it will not publicly disclose the method that allowed it to access a locked iPhone used by one of the San Bernardino attackers, saying it lacks enough "technical information" about the software vulnerability that was exploited.


Philippine central bank says foiled attempts to hack its website

- Wed, 27 Apr 2016 23:29:50 -0400

A logo of Bangko Sentral ng Pilipinas is seen at their main building in ManilaBy Karen Lema MANILA (Reuters) - The Philippine central bank has foiled attempts to hack its website, its governor said on Thursday amid a warning from global financial network SWIFT about recent multiple cyber fraud incidents targeting its system. SWIFT'S disclosure came as law enforcement authorities in Bangladesh and elsewhere investigated the February cyber theft of $81 million from the Bangladesh central bank account at the New York Federal Reserve Bank. "There were attempts, and I think this is a fact of life, but we have been able to turn them back," Amando Tetangco told reporters.


Wall Street watchdog has unfinished business with bad brokers

- Wed, 27 Apr 2016 19:54:37 -0400

CEO of the Financial Industry Regulatory Authority Richard Ketchum speaks during the Global Wealth Management Summit in New YorkIn an interview with Reuters on Wednesday, Richard Ketchum, chairman and chief executive of the Financial Industry Regulatory Authority (FINRA), mentioned several ways data should be better collected and used by regulators and investors. "There's no doubt in my mind that the future of regulation is going to be about data analytics," said Ketchum. A top priority is getting more and better information onto FINRA's BrokerCheck website, a free database where investors can research professional histories of brokers and firms.


Qatar's largest bank investigating alleged data breach

- Wed, 27 Apr 2016 14:21:58 -0400

FILE- In this Friday, May 14, 2010 file photo, a Qatari woman walks in front of the city skyline in Doha. Qatar National Bank was responding to files circulating on social media that purport to show the personal information of hundreds of people, including staff at the broadcaster Al-Jazeera and members of the ruling family. (AP Photo/Kamran Jebreili)DUBAI, United Arab Emirates (AP) ? Qatar's largest bank is investigating a security breach that appears to have exposed sensitive personal data for what could be hundreds of customers, including employees of international broadcaster Al-Jazeera and potentially senior government officials.


Qatar National Bank investigating alleged data hack

- Wed, 27 Apr 2016 12:16:45 -0400

A general view of Qatar National Bank's head office building in DohaBy Tom Finn DOHA (Reuters) - Qatar National Bank, the largest lender in the Middle East and Africa by assets, is investigating an alleged security breach of data posted online this week that revealed the names and passwords of a large number of customers. QNB said it was investigating "social media speculation in regard to an alleged data breach" and would not comment on reports circulated via social media. One file contained information on what appeared to be 465,437 QNB accounts, although only a fraction of these accounts had anything resembling full account details.


The FBI?s Most-Wanted Cybercriminals

- Wed, 27 Apr 2016 10:00:07 -0400

For more than 60 years, the FBI has kept a list of its top ten most wanted fugitives. The idea took root in the bureau when a reporter asked the FBI in 1949 for a list of the ?toughest guys? it was looking for, and published the list in the Washington Daily News, according to the agency. The article captured so much interest that FBI Director J. Edgar Hoover institutionalized the most-wanted list the very next year.

German nuclear plant infected with computer viruses, operator says

- Wed, 27 Apr 2016 09:02:12 -0400

Nuclear power plant is pictured in GundremmingenBy Christoph Steitz and Eric Auchard FRANKFURT (Reuters) - A nuclear power plant in Germany has been found to be infected with computer viruses, but they appear not to have posed a threat to the facility's operations because it is isolated from the Internet, the station's operator said on Tuesday. The Gundremmingen plant, located about 120 km (75 miles) northwest of Munich, is run by the German utility RWE . The viruses, which include "W32.Ramnit" and "Conficker", were discovered at Gundremmingen's B unit in a computer system retrofitted in 2008 with data visualization software associated with equipment for moving nuclear fuel rods, RWE said.


Apple upbeat on iPhone SE demand but some Asian retailers, suppliers less cheery

- Wed, 27 Apr 2016 08:33:07 -0400

File photo of hostesses holding the the Huawei's Ascend P7 smartphone during a presentation in ParisBy Yimou Lee HONG KONG (Reuters) - After announcing its first-ever drop in iPhone sales on Tuesday, Apple Inc sought to reassure investors by saying its latest and cheapest model was in strong demand after being launched in late March. In a Reuters survey of 10 retailers in Hong Kong, Beijing, Shanghai and Shenzhen, seven - including four Apple Stores - reported solid early demand, but three third-party retailers said sales were weak. Two suppliers of components for Apple phones, including the new iPhone SE, said they were seeing lower orders.


Apple says FBI gave it first vulnerability tip on April 14

- Tue, 26 Apr 2016 20:14:13 -0400

Logo of U.S. technology company Apple is seen in ZurichThe FBI informed Apple Inc of a vulnerability in its iPhone and Mac software on April 14, the first time it had told the company about a flaw in Apple products under a controversial White House process for sharing such information, the company told Reuters on Tuesday. The FBI told the company that the disclosure resulted from the so-called Vulnerability Equities Process for deciding what to do with information about security holes, Apple said. The vulnerability that was disclosed to Apple involved older versions of the iPhone and the Mac, Apple said.


Estonian sentenced in U.S. to seven years in prison for cyber fraud

- Tue, 26 Apr 2016 19:27:27 -0400

By Nate Raymond NEW YORK (Reuters) - An Estonian man who authorities said ran a cyber criminal enterprise that infected more than four million computers worldwide with malware to carry out a lucrative click fraud scheme was sentenced by a U.S. judge on Tuesday to 7-1/4 years in prison. Vladimir Tsastsin, 35, was sentenced by U.S. District Judge Lewis Kaplan in Manhattan after pleading guilty in July to charges that he engaged in wire fraud and computer intrusion conspiracies in a scheme that caused $14 million in losses. Tsastsin was extradited in October 2014 from Estonia, where he was arrested in 2011 and separately tried and convicted in a court in Estonia on related money-laundering charges.

Microsoft is bringing my favorite iPhone and Mac feature to Windows 10

- Tue, 26 Apr 2016 07:52:50 -0400

It's incredible how quickly the tide can turn on the internet. It seems like just yesterday that hordes of angry Windows users were banding together and vowing in unison that they would never patronize Microsoft again because of its shoddy Windows 8 platform. Now, it's almost as though Windows 8 never existed ? apparently skipping 9 and jumping directly to 10 worked pretty well indeed. But Windows 10 isn't just a marketing trick, it's a well-crafted desktop platform that doesn't overcompensate for Microsoft's shortcomings in mobile, which is why the Windows 8 experience was so terrible. The best part is that Microsoft continues to make important improvements to its Windows 10 platform, and it looks like the next big addition to Windows will be one of my favorite features from iOS and OS X. DON'T MISS:  My iPhone screen is bigger than your HDTV, but it still fits in my pocket Desktop and smartphone user experiences were entirely separate for a period of time, but Apple and Google have made great strides to better link them. Email protocols like Exchange and IMAP allowed changes made on one device to be reflected on the other, so why couldn't this same concept extend to other areas as well? Apple's Handoff feature suite was introduced as a way to make that happen. Using Handoff, users can switch seamlessly from an iPhone to a MacBook to an iPad without skipping a beat. Web pages you were browsing on your iPhone are instantly available on your MacBook. Documents you were editing on your MacBook open in the blink of an eye on your iPad. Now, it looks like Microsoft is getting ready to bake a similar feature set into Windows 10. As noted by a user on Reddit , a new option appeared for some users in the latest Windows 10 update that refers to Microsoft's upcoming handoff feature. It's not yet fully implemented so it cannot be tested, but this falls in line with earlier reports suggesting that Microsoft is working on functionality similar to handoff. It's important to note that this functionality, once launched, will not be limited to users with Windows smartphones. As reiterated by MSpoweruser , the handoff feature in Windows 10 will be cloud based and will work with third-party apps on the iOS and Android platforms.

Exclusive: SWIFT warns customers of multiple cyber fraud cases

- Tue, 26 Apr 2016 06:23:26 -0400

Swift code bank logo is displayed on an iPhone 6s on top of Euro banknotes in this picture illustration made in ZenicaThe disclosure came as law enforcement authorities in Bangladesh and elsewhere investigated the February cyber theft of $81 million from the Bangladesh central bank account at the New York Federal Reserve Bank. SWIFT has acknowledged that the scheme involved altering SWIFT software on Bangladesh Bank's computers to hide evidence of fraudulent transfers. Monday's statement from SWIFT marked the first acknowledgement that the Bangladesh Bank attack was not an isolated incident but one of several recent criminal schemes that aimed to take advantage of the global messaging platform used by some 11,000 financial institutions.


Dangerous Windows 10 flaw lets hackers secretly run any app on your PC

- Mon, 25 Apr 2016 23:17:39 -0400

A newly identified Windows 10 security flaw lets  hackers install malicious apps on any machine, without business owners being made aware anything out of the ordinary is happening. The issue lets anyone familiar with Windows security bypass its defenses without leaving any trace on the machine. Discovered accidentally, the issue is significant, and Microsoft is yet to issue a patch. DON?T MISS:  My iPhone screen is bigger than your HDTV, but it still fits in my pocket Found by Casey Smith , the Windows vulnerability doesn?t affect only Windows 10 machines. Malicious hackers could take advantage of the security flaw on enterprise versions of Windows dating back to Windows 7. The issue concerns a program called Regsvr32 (and Regsvr64 for 64-bit machines), which lets anyone execute code on a Windows computer from remote network locations. The flaw doesn?t trigger the AppLocker security software, which is supposed to only let users run apps from trusted sources, and it doesn?t leave any traces in the registry, as it doesn?t need administrator access. In other words, pretty much anyone could use it to install and run any application on an unsuspecting employee?s Windows machine. Microsoft has not yet provided a fix for the issue, but users can disable the Regsvr program using Windows Firewall. More details on Smith?s findings are available at the source links, including proof of concept scripts to demonstrate the security issue.

2nd security firm raises concerns about Cruz and Kasich apps

- Mon, 25 Apr 2016 22:45:01 -0400

WASHINGTON (AP) ? Another computer-security firm raised concerns Monday about the potential for hackers to glean users' personal data from phone apps released by the campaigns of Republican presidential contenders Ted Cruz and John Kasich.

Exclusive: SWIFT network says aware of multiple cyber fraud incidents

- Mon, 25 Apr 2016 19:20:49 -0400

Swift code bank logo is displayed on an iPhone 6s on top of Euro banknotes in this picture illustration made in ZenicaThe disclosure came as law enforcement authorities in Bangladesh and elsewhere investigated the February cyber theft of $81 million from the Bangladesh central bank account at the New York Federal Reserve Bank. SWIFT has acknowledged that the scheme involved altering SWIFT software on Bangladesh Bank's computers to hide evidence of fraudulent transfers. Monday's statement from SWIFT marked the first acknowledgement that the Bangladesh Bank attack was not an isolated incident but one of several recent criminal schemes that aimed to take advantage of the global messaging platform used by some 11,000 financial institutions.


Bangladesh Bank hackers compromised SWIFT software, warning issued

- Mon, 25 Apr 2016 11:06:10 -0400

Swift code bank logo is displayed on an iPhone 6s on top of Euro banknotes in this picture illustration made in ZenicaSWIFT, a cooperative owned by 3,000 financial institutions, confirmed to Reuters that it was aware of malware targeting its client software. Its spokeswoman Natasha Deteran said SWIFT on Monday released a software update to thwart the malware, along with a special warning for financial institutions to scrutinize their security procedures.


The iPhone 7 is going to be ?boring?

- Mon, 25 Apr 2016 09:46:39 -0400

Will the iPhone 7 be ?boring? in terms of novel new features? A new report from a reputable insider seems to suggest that the new smartphone won?t have alluring features that will convince masses of buyers to purchase it. On the contrary, the iPhone 7 might hurt Apple's bottom line this year and the company might sell fewer iPhones this year than it did in 2014. DON?T MISS: Guess which 'flop' sold twice as well as the iPhone in its first year KGI analyst Ming-Chi Kuo, who has been very accurate with iPhone predictions in the past, says that in a worst case scenario, Apple will sell 190 million iPhones in 2016, 3 million short of the 193 million units it sold in 2014. In a best case scenario, Apple is seen selling 205 million handsets, which is still much lower than the general Wall Street consensus ? analysts think Apple will sell between 210 million and 230 million iPhones in 2016. Kuo says that Apple might be the only smartphone maker from the top five smartphone brands that sees shipments decline year over year. That list includes Samsung, Apple, Huawei, Oppo and Vivo. The insider says the new iPhone SE will have little impact on overall iPhone sales, though he raised his SE sales estimates  from 12 million to 18 million shipments for the year. "While we believe the high-end smartphone market still has room for growth, the development of a newer, more innovative user experience is a prerequisite for growth," Kuo said, according to MacRumors. "We believe only iPhone will see shipments fall YoY in 2016, for three reasons: (1) intensification of market competition; (2) time needed for commercialization of new user experience technologies; and (3) iPhone needs a makeover (e.g. form factor design) to keep attracting consumers." Kuo said that the iPhone 7 doesn?t have ?attractive selling points,? without elaborating on exactly what that means. Presumably, Kuo is suggesting that the new features Apple intends to introduce won't be exciting enough to draw the types of crowds Apple's iPhones have drawn in the past. Earlier rumors suggest the iPhone 7 will be similar to the iPhone 6s when it comes to overall design, though it might be thinner thanks to the removal of the headphone jack. It will supposedly also feature a redesigned antenna assembly on the back, which some versions of the Plus model are expected to pack a dual lens camera. Other reports have suggested that the iPhone 7 will also be waterproof.

Two-thirds of German industry hit by digital crime, survey finds

- Mon, 25 Apr 2016 05:32:21 -0400

More than two-thirds of German industrial companies have been victims of digital crime in the past two years, according to a survey carried out by Bitkom, Germany's IT, telecoms and new media industry association. Such crimes cost German manufacturing industry more than 22 billion euros ($25 billion) a year, Bitkom estimated following its survey of 504 German manufacturing companies with at least 10 employees. "German industry, with its numerous hidden champions, is an attractive target for cybercriminals and foreign intelligence services," he added.

Can Veep Keep Up With the 2016 Election?

- Sat, 23 Apr 2016 09:00:00 -0400

In the new season of Veep, President Selina Meyer (Julia Louis-Dreyfus) battles for reelection after an electoral college tie. She gets a new boyfriend, a rich Wall Street lobbyist, and weathers public scrutiny over his influence in the Oval Office; she has a Twitter mishap where she sends the whole world a message intended to be private; there?s some business with a poor makeup job for a stress pimple. It?s the same brand of political farce the HBO show has excelled at for five years, but the jokes feel a little off, the verbal barbs tamer than before. Which prompts the quest: Is Veep losing its edge? Or has the world of politics just gotten too crazy for the spoof version to keep up?

U.S. drops New York fight with Apple after gaining access to iPhone

- Fri, 22 Apr 2016 23:23:49 -0400

Details are pictured on the backside of an Apple I phone 6 on a table in a restaurant in HanauThe U.S. Justice Department on Friday dropped its effort to force Apple Inc to help unlock an iPhone in a drug case in New York after someone provided authorities the passcode to access the device. The letter marked a sudden end to a closely watched case, in which the Justice Department had been appealing a ruling by a federal magistrate judge holding that he could not force Apple to assist authorities.


Thrifty bank?s $10 routers lead to $81 million heist

- Fri, 22 Apr 2016 10:50:35 -0400

This past February, some clever hackers pulled off a daring bank heist that was aided by a Bangladeshi bank's decision to buy cheap second-hand $10 routers. In fact, the cheap routers let hackers get away with $81 million by giving them access to the secure computers that handle SWIFT monetary transactions and helping them hide their tracks. DON?T MISS: How do planes fly? This animation explains everything you need to know Some 20 individuals who received payments from hackers have been identified so far but the masterminds of the attack have yet to be discovered. Even worse is the fact that most of the funds, which were routed to accounts in the Philippines and diverted to a local casino, are still missing. According to Reuters , the head of the Forensic Training Institute of the Bangladesh police?s criminal investigation department revealed that security oversights from the bank helped hackers steal the money. Hackers took advantage of the $10 routers that had no firewalls to get into the bank?s system and were aided by the fact that the bank's switches weren't sophisticated enough to trace the hackers' steps. "You are talking about an organization that has access to billions of dollars and they are not taking even the most basic security precautions," cyber firm Optiv consultant Jeff Wichman told Reuters . Furthermore, the SWIFT servers inside the bank were on the same network with the rest of the banks? 5,000 computers, rather than being on a walled, secondary one. Furthermore, the room that houses the SWIFT computers isn?t monitored by a bank employee at all times in spite of the sensitive nature of the activity that goes on in it. Instead, all transactions are automatically printed on a printer in the room. Police believe that both the bank and SWIFT should take blame for the heist. The Belgian banking authority said that the heist only breached the Bangladesh Bank and not its secure messaging services. The bank stated that SWIFT officials only advised that a router upgrade is in order after the heist.

Philippine voter data hacked but polls to go ahead

- Fri, 22 Apr 2016 09:24:27 -0400

FILE - In this Wednesday, May 26, 2010, file photo security personnel and staff members of the Lower House keep a close eye on ballot boxes containing certificates of canvass, during the second day of deliberations of the National Board of Canvassers at the House of Representatives in Quezon City north of Manila, Philippines. Philippine election officials said Friday, April 22, 2016, that the May 9 national elections will go ahead despite a massive personal data leak of almost all 55 million registered voters in one of the biggest hacking scandals. (AP Photo/Pat Roque, File)MANILA, Philippines (AP) ? The hacking of a Philippine election database may have exposed the personal information of all 55 million registered voters, but will not undermine May 9 national elections, officials said Friday, in the latest hacking scandal to hit the Southeast Asian nation.


Lithuania govt websites hit by cyberattacks for 3rd time

- Fri, 22 Apr 2016 08:32:05 -0400

VILNIUS, Lithuania (AP) ? Lithuanian officials say government websites have been hit by cyberattacks for the third time this month.

Apple hopes to get its books, movies back online in China

- Fri, 22 Apr 2016 05:08:22 -0400

BEIJING (AP) ? Apple Inc. said Friday it hopes to resume its online iTunes and iBooks services in China, where they were recently shut down less than seven months after being launched.

Australian Rules-AFL teams seek deals in China foray

- Fri, 22 Apr 2016 02:16:06 -0400

The Gold Coast Suns are set to take on Port Adelaide in an Australian Football League championship match in China next year as the high-contact indigenous sport seeks a toe-hold in the world's second-largest economy. Top-flight Australian Rules football is embraced with religious fervour in Australia's southern states but in overseas markets remains a fringe sport confined to obscure time-slots on cable TV channels.

Bangladesh Bank exposed to hackers by cheap switches, no firewall: police

- Thu, 21 Apr 2016 19:31:31 -0400

Commuters pass by the front of the Bangladesh central bank building in DhakaBy Serajul Quadir DHAKA (Reuters) - Bangladesh's central bank was vulnerable to hackers because it did not have a firewall and used second-hand, $10 switches to network computers connected to the SWIFT global payment network, an investigator into one of the world's biggest cyber heists said. The shortcomings made it easier for hackers to break into the Bangladesh Bank system earlier this year and attempt to siphon off nearly $1 billion using the bank's SWIFT credentials, said Mohammad Shah Alam, head of the Forensic Training Institute of the Bangladesh police's criminal investigation department. The lack of sophisticated switches, which can cost several hundred dollars or more, also means it is difficult for investigators to figure out what the hackers did and where they might have been based, he added.