Modern endpoint backup means real-time data protection. Get it from Code42. Click here.
Welcome Guest | Sign In
TechNewsWorld.com
Russian 'Collector' Sells Stolen Email Credentials for a Song
May 5, 2016
A hacker dubbed "The Collector" turned over 272 million stolen email credentials in his possession, Hold Security announced Wednesday. The hacker bragged online about the stash, which included usernames and passwords, the firm said. It got a copy of the data -- which the hacker was peddling for 50 rubles, or less than US$1 -- after giving him a shout-out in the forum.
Researchers Hijack Samsung's SmartThings IoT System
May 4, 2016
Researchers at the University of Michigan on Monday announced they had uncovered a series of vulnerabilities in the Samsung SmartThings home automation system that essentially could have allowed hackers to take control of various functions and break into a user's home. The researchers, working with Microsoft, were able to perform four proof-of-concept attacks.
Law Affords More Protection to PINs Than Prints
May 3, 2016
A federal magistrate in Los Angeles ordered the girlfriend of an alleged gang member to open her phone using her fingerprint so prosecutors could look at the data on it for a case they were working on, according to a news report published last week. After Paytsar Bkhchadzhyan pleaded no contest to identity theft, a judge issued a warrant to force her to press her finger to her iPhone to open it.
Treasury Department Examines Internet's Impact on Finance System
April 25, 2016
Information technology -- especially the Internet -- can have a positive impact on the U.S. financial system. Used improperly, however, such tools can wreak havoc on the financial sector and consumers. The Office of the Comptroller of the Currency, a unit of the U.S. Department of the Treasury, has launched an initiative on the future of e-commerce finance in light of technology innovation.
With Latest Opera Browser, Everybody Gets Free VPN
April 22, 2016
Opera on Wednesday announced that it would add a free VPN service to the latest version of its browser. VPNs, or virtual private networks, add an extra level of security for Web surfers. Companies use them to provide secure communications for employees remotely accessing office systems, and consumers use them to block unwanted snooping on their online activity.
Sports Fans and Social Media, Part 2: Perils, Pitfalls and Best Practices
April 22, 2016
This fall will see a 10-game pilot of professional football streamed on social media -- Twitter, to be specific. It's a continuation of the NFL's search for gold in the veins of digital broadcasting and an opportunity for sports brands to forge new and deeper relations with fans. For teams looking to bolster their brands, social networks have evolved into a critical channel.
EFF Sues DoJ Over Secret Data Decryption Requests
April 22, 2016
The EFF has filed suit against the Justice Department seeking to learn whether the federal government secretly ordered technology companies to decrypt the private communications of their customers. Such orders could place millions of customers in harm's way, the complaint says. The suit seeks the release of records originally requested last fall under the Freedom of Information Act.
Viber Goes the Encryption Route
April 21, 2016
Viber on Tuesday announced that it has begun rolling out end-to-end encryption across all devices for the 711 million users of its messaging app. Users have to download Viber version 6.0 or higher. The app offers stronger security in every voice or video call, message, video and photo, in both group and one-on-one messages, the company said. In addition, Viber launched Hidden Chats.
Windows Users Warned to Dump QuickTime Pronto
April 16, 2016
The U.S. Department of Homeland Security on Thursday issued a warning to remove Apple's QuickTime for Windows. The alert came in response to Trend Micro's report of two security flaws in the software, which will never be patched because Apple has ended support for QuickTime for Windows. Computers running QuickTime are open to increased risk of malicious attack or data loss, US-CERT warned.
Microsoft Sues DoJ Over Spying Gag Orders
April 15, 2016
Microsoft on Thursday filed suit against the U.S. Department of Justice challenging the gag orders that accompany requests to access customers' private emails and other data. The orders prevent the company from notifying affected customers about the government's demands. The case is the fourth public lawsuit it has filed against the Justice Department in three years.
Senate Committee Hears Litany of IRS Cybersecurity Failings
April 15, 2016
The U.S. Internal Revenue Service's cybersecurity measures are woefully inadequate, according to testimony presented this week to the Senate Finance Committee. The hearing was convened to look into how the IRS is safeguarding taxpayer information this filing season and to determine improvements, said Sen. Orrin Hatch. Agencies, tax preparers and Congress have failed taxpayers, Sen. Ron Wyden said.
E2E Encryption Could Make WhatsApp a Spam Magnet
April 15, 2016
Facebook's WhatsApp last week announced it would roll out end-to-end encryption for its users, but the move could make the service more attractive to spammers. While encryption can safeguard information from data thieves, it also can block data protectors. The policy "will not stop the growth of spam on the platform and could make the problem worse," AdaptiveMobile's Simeon Coney said.
Male Snubbing Ride-Sharing Service Postpones Launch
April 13, 2016
Chariot for Women, a ride-sharing service that excludes males 13 and older, reportedly has postponed its launch to sometime this summer due to heavier-than-anticipated demand. The company originally had planned to debut the service in Boston next week. Chariot for Women is open to all women, including transgender women. Children, including boys under the age of 13, also may ride.
Zuckerberg Launches Remodeled Messenger
April 12, 2016
CEO Mark Zuckerberg on Tuesday launched the company's new Messenger platform beta at its annual F8 conference. The Messenger announcement was the first major initiative in the long-term vision he presented. Zuckerberg outlined a major push to incorporate AI and bots into the Messenger platform. "Messenger is going to be the next big platform for sharing privately," he said.
CFPB Asserts Jurisdiction Over E-Commerce Privacy Regulation
April 12, 2016
Another federal agency has entered the arena for regulating e-commerce companies regarding the protection of consumer data. The federal Consumer Financial Protection Bureau has closed its first and so far only privacy case with a consent agreement between itself and an online payments processor. The CFPB charged that Dwolla misled consumers that its information was encrypted and stored securely.
Adobe Issues Emergency Patch to Head Off Flash Ransomware Attacks
April 11, 2016
Adobe last week issued an emergency security patch to fix a vulnerability in Flash that could leave users vulnerable to a ransomware attack. The vulnerability exists in Adobe Flash Player 21.0.0.197 and earlier versions for Windows, Macintosh, Linux and Chrome operating systems. It can cause a crash and leave the computer vulnerable to attackers, the company said.
White House Takes a Pass on Encryption Debate
April 7, 2016
It appears that the Obama administration will refrain from giving its outspoken support to any legislation that aims to compel high-tech companies to help law enforcement agencies crack mobile phone encryption. On the other hand, it won't level any outspoken opposition either. Introduction of such a bill -- sponsored by Sens. Dianne Feinstein and Richard Burr -- is expected soon.
Vivaldi Flaunts Its Plus-Size Browser Attributes
April 7, 2016
Vivaldi on Wednesday launched the first release of its eponymously named browser. Vivaldi is the brainchild of CEO Jon von Tetzchner, a cofounder of Opera Software. Aimed at the power user, Vivaldi 1.0 packs in features that were stripped out of Opera 12. However, "Vivaldi is not about a single feature," von Tetzchner said. "Vivaldi is more about a philosophy."
Apple, FBI Tussle Puts Bull's-Eye on iPhone
April 7, 2016
The battle between the FBI and Apple over access to the iPhone of Syed Farook came to an abrupt end last week when the agency announced it no longer needed the company's assistance. Since the Department of Justice delayed a hearing on an order to force Apple to assist the FBI in brute-forcing the password, speculation has spread about how the agency planned to access the data.
WhatsApp Encryption Ups Privacy Ante
April 6, 2016
WhatsApp on Tuesday told its 1 billion users that their communications would be better protected from prying eyes with end-to-end encryption. The company always has made data and communication security a priority, according to Jan Koum and Brian Acton, the founders of WhatsApp, which Facebook bought for $19 billion in 2014. End-to-end encryption is accomplished through use of the Signal Protocol.
FBI May Help Local Law Enforcement Agencies Crack Encrypted iPhones
April 4, 2016
Weeks after backing down from its litigation demanding Apple's help to access encrypted data on the San Bernardino terrorist's iPhone, the FBI appears to be taking full advantage of its newly discovered forensic prowess by offering assistance to law enforcement agencies across the country. The agency has sent out letters letting local officials know that it has gained access to the encrypted data.
ACLU Finds Widespread Use of All Writs Act to Compel Cooperation
April 1, 2016
The American Civil Liberties Union on Wednesday announced that it had identified dozens of criminal cases in which the government has made requests for cooperation in unlocking encrypted phones -- both of Apple and of Google. The government has used the All Writs Act to compel a phone manufacturer to hand over data to law enforcement in a total of 63 cases, the ACLU report shows.
CNBC's Password Security Lesson Fails Spectacularly
March 31, 2016
CNBC earlier this week published a piece with the goal of helping users strengthen their password security, but the attempt backfired badly. An interactive tool provided to help readers detect the strength of their passwords was to blame. Readers were asked to enter potential passwords into a field, and see how long it would take the system to crack them.
Firm Wins Patent for Novel Way to Detect Spearphishing
March 31, 2016
Hackers in recent weeks have stepped up their efforts to steal employee tax information from companies in all kinds of industries. Typically, the information contained on IRS form W-2 is used to file false tax returns or steal someone's identity. The situation has become so bad that the IRS earlier this month issued an alert to human resources and payroll professionals about the subject.
The Calm Before the Next US vs. Apple Storm
March 31, 2016
Apple got a last-minute reprieve last week. The U.S. government no longer is going after the company to break into the San Bernardino terrorist's iPhone, for now. It found another way. So Apple dodged a bullet, this time. However, as terrorism rises, this sticky question will rise again -- count on it. Now, when things are quiet, is the best time to debate this issue and come up with a solution.
Feds Crack iPhone, Warn Apple to Keep One Eye Open
March 29, 2016
After a bitter legal battle over encryption and privacy rights, the Department of Justice on Monday announced it would back out of its case against Apple because the FBI was able to crack the code of the iPhone used by one of the San Bernardino, California, shooters. The department had asked a federal magistrate judge to force Apple to help the FBI crack open the encrypted smartphone.
Ransomware's Aftermath Can Be More Costly Than Ransom
March 24, 2016
Downtime caused by a ransomware attack can cost a company more than paying a ransom to recover data encrypted by the malware, according to a report released last week by Intermedia. Nearly three-quarters (72 percent) of companies infected with ransomware could not access their data for at least two days because of the incident, and 32 percent couldn't access their data for five days or more.
Hopkins Boffins Break iMessage Encryption
March 22, 2016
A team of researchers at Johns Hopkins University has found a way to crack open files sent as encrypted instant messages in Apple's iMessage app, according to news reports published Monday. Although it took months to do, the researchers, led by Professor Matthew Green, were able to brute force a 64-bit encryption key, allowing them to unscramble an image file stored in Apple's iCloud.
Car Computers Are Vehicles for Hacking, Warns FBI
March 22, 2016
The FBI, the U.S. Department of Transportation and the National Highway Traffic Safety Administration last week issued a warning about the threat of automobile hacking. Computers that control steering, braking, acceleration and lights, as well as wireless technologies used in keyless entry, ignition control and navigation systems, provide portals for cyberattack, the agencies said.
Malware Exploits Apple DRM to Infect iPhones
March 19, 2016
Security researchers at Palo Alto Networks Unit 42 on Wednesday announced they had discovered in the wild a method of infecting nonjailbroken iPhones with malware by exploiting design flaws in Apple's digital rights management technology. The flaw has been exploited since 2013 largely as a means to pirate iOS software, but this is the first time it's been used to infect iPhones with malware.
See More Articles in Consumer Security Section >>
Facebook Twitter LinkedIn Google+ RSS
How do you feel about technology and security?
Very insecure -- I would gladly pay extra for better security.
Very insecure -- I'm using technology less as a result.
Very insecure -- but I'm willing to make the trade-off.
Secure enough -- I take reasonable precautions.
Secure enough -- I'm not a likely target.
Very secure -- I trust tech companies to protect me.