OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
TechNewsWorld.com
PENN STATE ONLINE Information Technology Degrees and Certificates
USPS Employees, Retirees, Customers Exposed in Hack Attack
November 11, 2014
Hackers siphoned off data from United States Postal Service servers for more than eight months before being detected, the USPS said. The personal data -- including names, dates of birth, Social Security numbers, addresses, beginning and end dates of employment and emergency contact information -- of more than 800,000 employees and some retirees has been exposed.
New Tool Alerts Etailers to Suspicious Characters
November 11, 2014
As thoughtful as mobile phone makers are when they design their products, there are always punters who want something that isn't there and are willing to hack a device to get it. In the Android world such a hack is called "rooting" a phone; in the iOS world, it's called "jailbreaking." Regardless of what it's called, it can turn a phone into a can of worms for retailers.
Phishers' Attacks Pay Off Nicely: Report
November 10, 2014
The most successful phishing attacks manage to dupe their victims a full 45 percent of the time, according to a study released last week by Google. On average, phishing's success rate is about 14 percent, but even the most obvious scams still manage to lure 3 percent of the people targeted to a fake website and convince them to turn over personal information, the report found.
The Law Scores a Victory Against Dark Net Denizens
November 07, 2014
Europol on Friday announced that agents from ICE, the FBI and Eurojust have taken down more than 400 cybercrime services accessible via the Tor browser. They include the dark market Silk Road 2.0. Its operator, Blake Benthall, was arrested, along with six Britons. Europol coordinated the effort. "Almost all crime now has an international nexus," noted ICE Special Agent Gary Hartwig.
Apple-Pestering WireLurker Banished for Now
November 07, 2014
Palo Alto Networks on Wednesday reported that more than 400 apps infected with a malicious program it calls "WireLurker" have been downloaded 356,104 times by Chinese Mac owners from Maiyadi, an online app store unaffiliated with Apple. The malware does no harm to the Macs it infects but when the computer connects via USB to an iOS device -- an iPhone or iPad -- it delivers its malicious payload.
Russian Cyberspies Caught With Mittens in Cyber Cookie Jar
November 06, 2014
Russian cyberspies -- unlike their Chinese counterparts -- have a reputation for stealth, so it's unusual when two digital espionage operations linked to the Kremlin come to light in a week. FireEye early last week released a report detailing how hackers working for the Russian government have been using sophisticated techniques over a seven-year period to penetrate computer systems.
The Trouble With Facebook's Tor Link
November 05, 2014
Facebook recently announced that it was providing access directly over the Tor network. Its purpose was to let users access Facebook without losing the cryptographic protections provided by the Tor cloud. Facebook is providing an SSL certificate which cites its onion address. It will add onion address support for its mobile site later. The Tor link will work only in Tor-enabled browsers.
Gallup Poll: Credit Card Hacking Could Happen to Me
November 03, 2014
Over the 4th of July weekend, 82 people were shot in Chicago -- at least 14 died from their wounds. For the year, there were 63 homicides in Oakland as of late October. Philadelphians logged 47 homicides in the first 64 days of this year, two more than were killed in New York City during the same period. Yet results of a recent Gallup poll suggest the threat of credit card theft looms largest.
Cyberattacks Could Wreak Widespread Havoc by 2025
November 03, 2014
The Pew Research Center last week released a report suggesting that cyberattacks in the next 10 years might cause major destruction of human lives and tens of billions of dollars in property damage. However, the situation might not be as overwhelming as the raw numbers indicate, said report author Janna Quitney Anderson, director of the Imagining the Internet Center at Elon University.
Mobile Malware Takes Victims by Surprise
October 28, 2014
Malware writers behind Koler, a bad app that attacks Android devices, have upped their game with a new variant of the pernicious program. In its original version, Koler hijacked phones it landed on and wouldn't set them free until a ransom was paid. This latest strain of the malapp also does the ransomware thing, but it takes its malignancy a step further.
Toll Fraud Can Take a Big Toll on SMBs
October 22, 2014
Toll fraud -- the hijacking of a phone system to dial out to premium numbers in distant countries at several dollars a minute -- costs companies more than $4.7 billion a year, up nearly $1 billion from 2011. Major carriers, such as the companies that make up the CFCA, have sophisticated fraud systems in place to catch hackers, and they can afford to credit customers for fraudulent charges.
Staples May Be Next to Wear Data Breach Scarlet Letter
October 21, 2014
Yet another major retailer -- this time, office supply chain Staples -- reportedly has fallen victim to a data breach. More than half a dozen banks operating on the East Coast have seen fraudulent charges made at non-Staples businesses, such as supermarkets and other big-box retailers, by people using Staples cards. Those cards apparently were used previously at three Staples stores in the area.
FBI's Comey Argues Against Encryption: Trust Us
October 20, 2014
FBI director James Comey, in a speech last week at the Brookings Institute, reiterated his concerns about encryption built into iOS 8 and Android stymieing law enforcement. "I'm a huge believer in the rule of law, but I also believe that no one in this country should be beyond the law," he said. However, the law has not kept pace with technology, Comey pointed out.
Microsoft Patch Blocks Sandworm Tunnels
October 17, 2014
iSight Partners this week revealed that a cybergang it dubbed "Sandworm" has been exploiting a zero-day vulnerability that impacts all supported versions of Microsoft Windows, including Windows Server 2008 and 2012. The announcement was held off until Microsoft issued its patch earlier this week. If exploited, the flaw will let attackers remotely execute code on target systems.
Tide Starts to Turn Against Gamergate's Women-Hating Campaign
October 17, 2014
Backlash against the #Gamergate movement escalated several notches this week, thanks to high-profile newspaper reports and a public statement from the Entertainment Software Association. "Threats of violence and harassment are wrong," the ESA said. "They have to stop. There is no place in the video game community -- or our society -- for personal attacks and threats."
Spam Still Packs a Punch
October 15, 2014
The days of in-boxes flooded with spam messages on an assortment of sordid subjects are a faint memory to most email users, but what spam has lost in volume it's gained in power. More than two-thirds of some 200 IT decision makers in companies with five to 1,000 employees said a spam incident in the last year had severely disrupted their business operations -- or halted them entirely.
Snapchat Hackers Could Be Prosecuted for Child Porn Offenses
October 13, 2014
Private videos and pictures shared between tens of thousands of Snapchat users -- possibly as many as 200,000 -- were posted online by hackers over the weekend in an episode dubbed the "Snappening." Much of the content is sexual, including many nude photos -- some possibly of minors. The hackers appear to have gone for maximum embarrassment and humiliation with this particular breach.
Kaspersky Probes ATM Malware Mystery
October 10, 2014
Kaspersky Lab this week reported that criminals have been emptying ATMs and infecting them with malware dubbed "Tyupkin." About 50 machines have been infected in eastern Europe, and the attacks have spread to the United States, India and China, based on statistics culled from VirusTotal, Kaspersky said. The attackers target ATMs running Windows 32-bit operating systems.
DEA Lifts Woman's Identity, Creates Fake Facebook Page
October 08, 2014
The U.S. Drug Enforcement Agency reportedly co-opted a woman's identity to create a fake Facebook page as a ruse to investigate suspects. The agency posted racy pictures of the woman, then known as "Sondra Prince," as well as a photo of her young son and niece, to the sham page. The photos were taken from her cellphone, which DEA had seized when Prince was arrested in connection with a drug ring.
Consumers Fed Up With Data Breaches
September 30, 2014
Consumers are beginning to lose their patience with the custodians of their personal information. Survey results from 2,000 consumers released last week by HyTrust, suggest that 51 percent of those polled would bolt from any business involved in a data breach that compromised personal information such as address, Social Security number or credit card details.
Banks, Businesses Scramble to Smash Bash Shellshock Bug
September 29, 2014
Banks and businesses toiled over the weekend to crush a bug in a widely used open source operating system. The flaw has been in Unix for some 25 years, but it was revealed just last week. If exploited, the vulnerability could be used to inject malicious code or take command of a system or device. Dubbed "Shellshock," it requires patching systems and devices running Apple's OS X, Linux and Unix.
Bash Shellshock Bug Patched but Not Pummeled
September 25, 2014
Researchers on Thursday discovered proof-of-concept code that could take advantage of unpatched computer systems, and found evidence of attacks exploiting the BASH Shellshock bug in the wild. Shellshock, which came to light on Wednesday, could become a major threat to Linux/Unix and Apple operating systems if published patches to BASH are not applied before an attacker cashes in.
Self-Driving Car Security: No Room for Error
September 25, 2014
Walk into any electronics store and you will find antivirus software from companies like Norton, ESET, McAfee and Kaspersky. In the last few years, the risk has spread from our computers to our smartphones and our tablets. The next thing we will have to protect may be our cars -- and our lives could depend on it. We used to think the computer was the only device that needed virus protection.
Banking Trojan Targets Petrochemical Outfits
September 23, 2014
The pernicious program Citadel has been around for awhile, but it's using some new tricks on new targets. From its humble origins as a "man in the browser" thief of banking credentials, Citadel has become a knave of all trades. Once it lands on a computer, it can be configured in a number of ways with a file from a server operated by Web predators.

See More Articles in Cybercrime Section >>
Facebook Twitter LinkedIn Google+ RSS
Are you looking forward to self-driving cars?
You bet -- I'd love to have a built-in chauffeur.
Yes -- self-driving cars will save lives.
Kind of -- I'd like some self-driving features, like parking.
No -- self-driving cars are too dangerous.
No -- I don't want to give up another freedom.
Absolutely not -- I saw Terminator and I'm not letting some robot take me for a ride!
Salsify 30-day free trial