Get access to millions of new customers in minutes. Zero hassle PayPal integration from Braintree.
Welcome Guest | Sign In
TechNewsWorld.com
Con Artist Harasses Aussie Apple Customers in Ransomware Attempt
May 28, 2014
Apple on Tuesday aimed to calm anxiety among its iCloud users with reassurances that the service hadn't been breached in a ransomware-style attack. "Apple takes security very seriously and iCloud was not compromised during this incident," reads a company statement. The referenced "incident" is a collection of reports on Apple forums by iPhone users, most of them in Australia.
eBay's In With the Breached Crowd
May 21, 2014
If there's a list of retailers that have not exposed their customers' data to a security breach, it just got shorter. The most recent company to confess to being hacked is eBay, which on Wednesday began sending emails urging customers to change their passwords. eBay announced that a cyberattack had compromised a database containing encrypted passwords and other nonfinancial data.
Hackers Paint Bull's-eyes on Cybercurrencies
May 19, 2014
Another digital currency was brought to its knees last week when the administrators of Doge Vault had to suspend operations after they discovered their online wallet service had been attacked by hackers. Following an investigation of the incident and the reconstruction of some of their damaged information from a backup, the administrators contacted users.
For Safe, Private Mobile Browsing, Huddle Under F-Secure's Freedome
May 15, 2014
At a meeting with the press earlier this year, F-Secure Chief Research Officer Mikko Hypponen -- yes, the man who sparked the angry exodus of a small group of malware vendors from the RSA security conference -- mentioned the company would soon unveil Freedome, a cloud-based service that would be pretty much the bees' knees for protecting mobile devices.
Ransomware Gang Targets Android Phones
May 13, 2014
The Reveton Gang is at it again. This time, though, they're targeting users of Android phones -- typically visitors to porn sites. The gang that pioneered the idea of locking up a target's computer and demanding a ransom to unlock it has turned its attention to the rapidly growing mobile market. Once Reveton mobile infects a phone, it will display a bogus warning.
Snapchat Makes FTC Privacy Charges Disappear
May 09, 2014
Snapchat has agreed to a settlement with the United States Federal Trade Commission to resolve privacy issues resulting from a hacker's publication in January of data associated with 4.6 million of its users. The company has not admitted any wrongdoing, but it has agreed to implement a comprehensive privacy program that will be audited by a third party for the next 20 years.
John McAfee Makes Dubious Tech Comeback With Chadder Privacy App
May 07, 2014
Future Tense Central and Etransfr have debuted Chadder, an app that sends private encrypted messages. The app is one of a growing number of security products built around encryption technology and touted as secure that hit the market following Edward Snowden's massive data dump revealing the extent of the U.S. government's reach into consumers' digital lives.
The Tangled Web of IoT Security
May 06, 2014
The Internet of Things, or IoT, consists of "uniquely identifiable objects and their virtual representations in an Internet-like structure," according to Wikipedia. The IoT is "the network of physical objects accessed through the Internet," according to Cisco Systems. In addition to there being no clear definition of the IoT, estimates vary widely about the number of unique devices it includes.
Microsoft Gives XP One last Hug
May 03, 2014
When Microsoft included Windows XP in the Internet Explorer zero-day browser vulnerability patch it issued this week, some industry observers were stunned. Had the company decided to backtrack on its assertion that it would no longer support XP? Had it knuckled under to user protests? Not really. Redmond has not decided to backtrack on killing support for Windows XP; it made a one-time exception.
AOL Users Waiting to Exhale
April 29, 2014
AOL on Monday disclosed that a "significant number" of user accounts had been hacked, confirming rumors swirling around the issue for a week and denying its week-ago statement that users' email accounts were being spoofed. The hackers stole users' email and postal addresses, address book contacts, encrypted passwords and encrypted answers to security questions, and "certain employee information."
Clandestine Fox Nips at Explorer's Heels
April 28, 2014
Microsoft's Internet Explorer Web browser has a flaw that allows hackers to commandeer control of computers, FireEye reported Saturday. Although the never-seen-before vulnerability can be found in all versions of the browser, hackers are targeting IE versions 9 through 11, according to a blog post by the three security researchers who made the discovery.
Banking Trojan Enters Mobiles via Facebook
April 21, 2014
Purveyors of a notorious mobile banking Trojan have started targeting Facebook users to infect Android smartphones. The Net predators use a desktop Trojan to leverage a Facebook socializer to install banking malware on their phone, ESET malware researcher Jean-Ian Boutin discovered last week. The desktop bad app, Win32/Qadars, waits for an infected machine to open a Facebook page.
Michaels Crafts Artless Response to Customer Data Breach
April 21, 2014
Another retailer security breach, another national conversation about how these now regular occurrences need to stop. In the Michaels case, though, some of the talk touched on what by now should be remedial public relations. When you screw up and it affects your clients, apologize -- profusely and without hedging or reservation. The hacked retailer du jour apparently was unaware of this rule.
Internet Leeches Drawn to Heartbleed
April 14, 2014
It's been more than a week since news of the Heartbleed flaw launched a frantic scramble on the Web, but security professionals' palpitations haven't subsided. The OpenSSL Software Foundation has issued a fix, and Google, Cisco, and hordes of other companies have begun patching their products. Predictably, scammers and spammers have climbed onto the Heartbleed solution bandwagon.
White Hats Use Heartbleed to Steal Keys
April 14, 2014
The tech industry reeled last week when security researchers discovered a flaw in a key security technology in the Internet's infrastructure. The bug, ghoulishly named "Heartbleed," was found in an open source library, OpenSSL, used by the protocol, SSL, used to encrypt data in transit on the Net. By exploiting the flaw with a specially crafted packet, hackers can extract data from a server's memory in 64K chunks.
PCI 3.0, Part 3: Validating Your Cardholder Data Environment
April 14, 2014
Most e-commerce businesses already are preparing for their 2015 PCI audit, and plenty of changes are afoot when it comes to meeting 3.0 compliance requirements. Remember, compliance itself does not equal security, but rather is a reporting function of your security program. It is both a mandatory part of meeting 3.0 standards and a critical step toward improving your security posture.
Consumers Can't Stanch Heartbleeding
April 11, 2014
Consumers can do little to protect themselves from the catastrophic Heartbleed bug. "Catastrophic is the right word," wrote security guru Bruce Schneier in his blog this week. "On the scale of 1 to 10, this is an 11." Heartbleed is an extension of the SSL/TLS protocol used to encrypt data in transit on the Internet. Heartbleed is used to keep a secure connection alive.
XP Users Have a Bad Headache Coming On
April 07, 2014
Money will be the biggest problem users of Windows XP will face when Microsoft officially stops supporting it on Tuesday. As a last resort, Microsoft is offering custom support for Windows XP as a temporary stopgap. That could cost as much as $200 per PC per year, Gartner estimated. The UK government reportedly has paid Microsoft about $9 million to extend Windows XP support for one year.
Yahoo Issues Security Sitrep
April 03, 2014
Yahoo has announced a new effort to upgrade its security, in the wake of a torrent of breaches and hacker attacks over recent months. Yahoo's plans include encryption of data in motion, enabling HTTPS encryption, and implementing the latest in security best practices, said Chief Information Security Officer Alex Stamos, who took over the job in March.
Big Blue Dons Big Data Gloves to Fight Fraud
March 21, 2014
IBM on Thursday launched a set of software and consulting services to help fight fraud and financial crime. The so-called smarter counterfraud initiative draws from more than 500 fraud consulting experts, 290 fraud-related research patents, and the $24 billion IBM has invested in its Big Data and analytics software and services capabilities over the past nine years.
Target Breach Lesson: PCI Compliance Isn't Enough
March 18, 2014
"Target was certified as meeting the standard for the payment card industry in September 2013. Nonetheless, we suffered a data breach." Those words by Target CEO Gregg Steinhafel affirmed what security experts know as gospel: Compliance does not equal security. "Just because you pass a PCI audit does not mean that you're secure," said HyTrust President Eric Chiu.
The Internet of Things: There's a Great Big Beautiful Tomorrow
March 18, 2014
When I was 10 years old, I took my first trip to Disney World. The futuristic rides in Tomorrow Land were my favorites. In particular, I loved "The Carousel of Progress," which, at the time, was an attraction designed by General Electric to showcase its new technologies at the 1964 New York World's Fair. The song, "There's a Great Big Beautiful Tomorrow," played as the curtains opened.

See More Articles in Consumer Security Section >>
Facebook Twitter LinkedIn Google+ RSS