Attention Marketers: Access 30 Million IT Decision Makers with ECT News Network's INSTA-LEADS Click to Learn More!
Welcome Guest | Sign In
TechNewsWorld.com
USPS Employees, Retirees, Customers Exposed in Hack Attack
November 11, 2014
Hackers siphoned off data from United States Postal Service servers for more than eight months before being detected, the USPS said. The personal data -- including names, dates of birth, Social Security numbers, addresses, beginning and end dates of employment and emergency contact information -- of more than 800,000 employees and some retirees has been exposed.
New Tool Alerts Etailers to Suspicious Characters
November 11, 2014
As thoughtful as mobile phone makers are when they design their products, there are always punters who want something that isn't there and are willing to hack a device to get it. In the Android world such a hack is called "rooting" a phone; in the iOS world, it's called "jailbreaking." Regardless of what it's called, it can turn a phone into a can of worms for retailers.
Phishers' Attacks Pay Off Nicely: Report
November 10, 2014
The most successful phishing attacks manage to dupe their victims a full 45 percent of the time, according to a study released last week by Google. On average, phishing's success rate is about 14 percent, but even the most obvious scams still manage to lure 3 percent of the people targeted to a fake website and convince them to turn over personal information, the report found.
Apple-Pestering WireLurker Banished for Now
November 07, 2014
Palo Alto Networks on Wednesday reported that more than 400 apps infected with a malicious program it calls "WireLurker" have been downloaded 356,104 times by Chinese Mac owners from Maiyadi, an online app store unaffiliated with Apple. The malware does no harm to the Macs it infects but when the computer connects via USB to an iOS device -- an iPhone or iPad -- it delivers its malicious payload.
Russian Cyberspies Caught With Mittens in Cyber Cookie Jar
November 06, 2014
Russian cyberspies -- unlike their Chinese counterparts -- have a reputation for stealth, so it's unusual when two digital espionage operations linked to the Kremlin come to light in a week. FireEye early last week released a report detailing how hackers working for the Russian government have been using sophisticated techniques over a seven-year period to penetrate computer systems.
The Trouble With Facebook's Tor Link
November 05, 2014
Facebook recently announced that it was providing access directly over the Tor network. Its purpose was to let users access Facebook without losing the cryptographic protections provided by the Tor cloud. Facebook is providing an SSL certificate which cites its onion address. It will add onion address support for its mobile site later. The Tor link will work only in Tor-enabled browsers.
Gallup Poll: Credit Card Hacking Could Happen to Me
November 03, 2014
Over the 4th of July weekend, 82 people were shot in Chicago -- at least 14 died from their wounds. For the year, there were 63 homicides in Oakland as of late October. Philadelphians logged 47 homicides in the first 64 days of this year, two more than were killed in New York City during the same period. Yet results of a recent Gallup poll suggest the threat of credit card theft looms largest.
Cyberattacks Could Wreak Widespread Havoc by 2025
November 03, 2014
The Pew Research Center last week released a report suggesting that cyberattacks in the next 10 years might cause major destruction of human lives and tens of billions of dollars in property damage. However, the situation might not be as overwhelming as the raw numbers indicate, said report author Janna Quitney Anderson, director of the Imagining the Internet Center at Elon University.
The Long and Winding Road to Shellshock Recovery
October 29, 2014
Four days after Shellshock was disclosed, Incapsula's Web application firewall deflected more than 217,000 attempted exploits on more than 4,100 domains. The company recorded upwards of 1,970 attacks per hour, from more than 890 IPs around the world. Shellshock was expected to be far worse than the Heartbleed flaw, which was expected to impact about 17 percent of the secure Web servers worldwide.
Mobile Malware Takes Victims by Surprise
October 28, 2014
Malware writers behind Koler, a bad app that attacks Android devices, have upped their game with a new variant of the pernicious program. In its original version, Koler hijacked phones it landed on and wouldn't set them free until a ransom was paid. This latest strain of the malapp also does the ransomware thing, but it takes its malignancy a step further.
Toll Fraud Can Take a Big Toll on SMBs
October 22, 2014
Toll fraud -- the hijacking of a phone system to dial out to premium numbers in distant countries at several dollars a minute -- costs companies more than $4.7 billion a year, up nearly $1 billion from 2011. Major carriers, such as the companies that make up the CFCA, have sophisticated fraud systems in place to catch hackers, and they can afford to credit customers for fraudulent charges.
Staples May Be Next to Wear Data Breach Scarlet Letter
October 21, 2014
Yet another major retailer -- this time, office supply chain Staples -- reportedly has fallen victim to a data breach. More than half a dozen banks operating on the East Coast have seen fraudulent charges made at non-Staples businesses, such as supermarkets and other big-box retailers, by people using Staples cards. Those cards apparently were used previously at three Staples stores in the area.
Chinese Officials Kick In Apple, MS Cloud Doors
October 21, 2014
Chinese authorities have launched man-in-the-middle attacks on Apple's iCloud.com and Microsoft's Login.live.co that are ongoing, according to Greatfire.org. Qihoo 360 browser users' local connections to iCloud.com are being rerouted to a dummy site that's identical to Apple's login page. Users of Firefox or Chrome land on a warning page instead. The attack on iCloud reportedly is nationwide.
Black Box Keeps Cybersnoops in Dark
October 21, 2014
Following Edward Snowden's revelations about indiscriminate government snooping on U.S. citizens, many Net surfers would like to find a way to lower their visibility on the Internet. There are a number of tools in cyberspace that can help a soul do that, but they can take time and savvy to set up. That's why Kerry Cox launched the Sierra Project, which he hopes to fund through Kickstarter.
FBI's Comey Argues Against Encryption: Trust Us
October 20, 2014
FBI director James Comey, in a speech last week at the Brookings Institute, reiterated his concerns about encryption built into iOS 8 and Android stymieing law enforcement. "I'm a huge believer in the rule of law, but I also believe that no one in this country should be beyond the law," he said. However, the law has not kept pace with technology, Comey pointed out.
Microsoft Patch Blocks Sandworm Tunnels
October 17, 2014
iSight Partners this week revealed that a cybergang it dubbed "Sandworm" has been exploiting a zero-day vulnerability that impacts all supported versions of Microsoft Windows, including Windows Server 2008 and 2012. The announcement was held off until Microsoft issued its patch earlier this week. If exploited, the flaw will let attackers remotely execute code on target systems.
Kaspersky Probes ATM Malware Mystery
October 10, 2014
Kaspersky Lab this week reported that criminals have been emptying ATMs and infecting them with malware dubbed "Tyupkin." About 50 machines have been infected in eastern Europe, and the attacks have spread to the United States, India and China, based on statistics culled from VirusTotal, Kaspersky said. The attackers target ATMs running Windows 32-bit operating systems.
Tech Execs Issue Dire Warnings on Impact of NSA Surveillance
October 10, 2014
The NSA's wide-ranging surveillance of people's communications worldwide is hitting America's high-tech industry hard, said panelists on Wednesday at a roundtable held by Senate Finance Committee Chairman Ron Wyden in Palo Alto, California. Wyden set the tone from the start: "This is going to cost America jobs." Several foreign governments are planning to build domestic Internets.
Phishers Find Apple Most Tasty Target
October 07, 2014
"Follow the money" isn't just the war cry of journalistic bloodhounds hot on the trail of political corruption. It's the mantra of Web predators, too. That's why PayPal consistently has been the top brand targeted by phishers -- although that appears to have changed. Apple now has the dubious distinction of most-phished brand, according to the latest report from the Anti-Phishing Work Group.
FDA Aims to Shore Up Medical Device Cybersecurity
October 06, 2014
The Food and Drug Administration last week released long-awaited recommendations aimed at better managing cybersecurity risks to protect patient health and information. The new standards recommend manufacturers take into account cybersecurity risks as part of the design and development of a medical device. They require device makers to submit documentation to the FDA about identified risks.
'Data Divination: Big Data Strategies' Is a Great Hip-Pocket Tool
October 02, 2014
Most of today's books about Big Data delve into highly technical tools, cloud technology, and high-level computer-assisted math calculations and algorithms. For most people in the business world, this is far from motivating readers to appreciate just what Big Data does and how to let it get you there. However, that's not so with Data Divination: Big Data Strategies by Pam Baker.
Consumers Fed Up With Data Breaches
September 30, 2014
Consumers are beginning to lose their patience with the custodians of their personal information. Survey results from 2,000 consumers released last week by HyTrust, suggest that 51 percent of those polled would bolt from any business involved in a data breach that compromised personal information such as address, Social Security number or credit card details.
Banks, Businesses Scramble to Smash Bash Shellshock Bug
September 29, 2014
Banks and businesses toiled over the weekend to crush a bug in a widely used open source operating system. The flaw has been in Unix for some 25 years, but it was revealed just last week. If exploited, the vulnerability could be used to inject malicious code or take command of a system or device. Dubbed "Shellshock," it requires patching systems and devices running Apple's OS X, Linux and Unix.
FBI Director Comey Gives Apple and Google a Tongue-Lashing
September 26, 2014
FBI Director James Comey on Thursday strongly criticized Apple and Google for hardening information stored in smartphones by encrypting data, making it inaccessible to law enforcement even with a court order. The FBI has had conversations with both Apple and Google over the encryption features, Comey said, although he personally was not involved in those talks.

See More Articles in Cybersecurity Section >>
Facebook Twitter LinkedIn Google+ RSS