Retailers: Provide More E-Commerce Payment Options to Help Reduce Shopping Cart Abandonment
Welcome Guest | Sign In
TechNewsWorld.com
Hacker Hawks 2-Year-Old Cache of 117M LinkedIn User IDs
May 23, 2016
A hacker reportedly has offered to sell the account information of 117 million LinkedIn users, which was stolen in a 2012 hack. The data includes users' email addresses and passwords.The hacker, who goes by the handle "Peace," reportedly offered the data on The Real Deal -- a site on the dark web -- for 5 bitcoins -- about $2,200. LeakedSource last week announced it had more than 167 million stolen records.
Gang Surrenders Key to TeslaCrypt Ransomware Kingdom
May 20, 2016
Eset on Wednesday announced that it has fashioned a free tool that victims of all variants of the TeslaCrypt ransomware can use to unlock affected files. After the criminal gang behind TeslaCrypt recently abandoned support of the malicious software, an Eset analyst contacted the group anonymously, using the channel offered to ransomware victims, and asked for the universal master decryption key.
Flaw Puts a Billion Wireless Mice at Risk
May 20, 2016
Wireless mice and keyboards are the perfect accessories for a world in which devices increasingly are shuffling off their connection coils, but those accessories -- especially untethered rodents -- also can create new threats for those who use them. One such threat is Mousejack. The attack exploits a vulnerability found in 80 percent of wireless mice.
Google to Dim Flash Player in Chrome Browser
May 17, 2016
Google last week announced that it would minimize use of Adobe's Flash Player in its Chrome Web browser by the end of the year by turning off its default status. When Chrome encounters a Web page, it will report the presence of Flash Player only if a user has indicated that the domain should execute Flash or if the site is in one of the top 10 domains using Flash, ‎Google's Anthony LaForge said.
ISIS Cyberthreat: Puny but Gaining Power
May 5, 2016
The Islamic State group's cyberwar capabilities are unsophisticated, but they won't be that way for long. That was the conclusion of a 25-page report released last week by Flashpoint. The report, "Hacking for ISIS: The Emergent Cyber Threat Landscape," found that the Islamic State's "overall capabilities are neither advanced nor do they demonstrate sophisticated targeting."
Russian 'Collector' Sells Stolen Email Credentials for a Song
May 5, 2016
A hacker dubbed "The Collector" turned over 272 million stolen email credentials in his possession, Hold Security announced Wednesday. The hacker bragged online about the stash, which included usernames and passwords, the firm said. It got a copy of the data -- which the hacker was peddling for 50 rubles, or less than US$1 -- after giving him a shout-out in the forum.
Researchers Hijack Samsung's SmartThings IoT System
May 4, 2016
Researchers at the University of Michigan on Monday announced they had uncovered a series of vulnerabilities in the Samsung SmartThings home automation system that essentially could have allowed hackers to take control of various functions and break into a user's home. The researchers, working with Microsoft, were able to perform four proof-of-concept attacks.
Supreme Court Grants Federal Agents Broader Surveillance Authority
May 3, 2016
The U.S. Supreme Court has approved a series of amendments to the federal rules of criminal procedure that would let judges issue search warrants for computers located outside their jurisdiction. Chief Justice John Roberts announced the changes in the Court's interpretation of the rules. They would allow a judge to issue warrants to search for electronic evidence at remote sites, for example.
BlockIQ Escalates War on Ad Blockers
April 28, 2016
As consumers turn to ad blockers to avoid advertising on their mobile and computer screens, marketers and content providers who depend on pitches to pay the bills are searching frantically for ways to counter the pesky programs. BlockIQ offers them one. BlockIQ, owned by AdSupply, which recently merged with Adaptive Medias, has launched BlockBypass.
New Attack Technique Hides Spread of RATs in Asia
April 27, 2016
SentinelOne last week announced that it has detected a technique being used in Asia to infect systems with remote access Trojans that ensures that the payload remains in memory throughout its execution and doesn't touch the victim's computer disk in an unencrypted state. Attackers remain hidden from antivirus and next-generation technologies that focus only on file-based threats.
Insurance Industry Buzzes Over Data Breach Ruling
April 21, 2016
If the rash of data breaches in recent months has done anything for businesses, it's raised their awareness of cyber liability insurance. The market for cyber liability insurance is expected to increase dramatically as businesses become more aware that their current policies don't adequately cover cyber-risks, according to the National Association of Insurance Commissioners.
Apple to Lawmakers: We'll Help but No Backdoors
April 21, 2016
Apple's top legal official on Tuesday appeared before the U.S. House Energy and Commerce Committee and reiterated the company's willingness to help law enforcement on active cases and cooperate on long-term solutions, despite its contentious legal battle with the FBI over the encrypted iPhone used in the San Bernardino terrorist attack. Apple works daily with law enforcement on a number of cases.
Journalist Gets 2-Years in Prison for Aiding Anonymous Prank
April 19, 2016
A U.S. District Court judge last week sentenced Matthew Keys to two years in prison after he was found guilty of conspiring with the hacker group Anonymous to break into the Los Angeles Times' website and modify a news story. Keys had been site administrator for KTXL Fox 40, which was owned by Tribune, the same company that owned the Times.
Feds Prep for Cybersecurity Buying Spree
April 18, 2016
The U.S. government's objectives for improving cybersecurity are taking shape in updated contracting procedures, contracts and projected increases in spending. Recent developments have underscored the federal commitment to IT security. The GSA has asked vendors to respond by Wednesday to a research survey on what it should do to expedite federal acquisition of cybersecurity products and services.
Microsoft Sues DoJ Over Spying Gag Orders
April 15, 2016
Microsoft on Thursday filed suit against the U.S. Department of Justice challenging the gag orders that accompany requests to access customers' private emails and other data. The orders prevent the company from notifying affected customers about the government's demands. The case is the fourth public lawsuit it has filed against the Justice Department in three years.
FBI Paid Hackers to Defeat Security of Shooter's iPhone
April 14, 2016
The FBI paid hackers to break onto the iPhone of the San Bernardino, California, shooter, according to a news report published Tuesday. The bureau obtained the services of gray hats, insiders said, and apparently did not get help from Cellebrite, as earlier reports had suggested. Gray hats are hackers who sell flaws to governments or companies that make surveillance tools.
Adobe Issues Emergency Patch to Head Off Flash Ransomware Attacks
April 11, 2016
Adobe last week issued an emergency security patch to fix a vulnerability in Flash that could leave users vulnerable to a ransomware attack. The vulnerability exists in Adobe Flash Player 21.0.0.197 and earlier versions for Windows, Macintosh, Linux and Chrome operating systems. It can cause a crash and leave the computer vulnerable to attackers, the company said.
Illicit Weapons Traders Flock to Facebook
April 8, 2016
Facebook has served as an online marketplace for armed militias in Libya and other war-torn countries, according to a news report published Wednesday. An array of light weapons bought and sold after the fall of Moammar Gadhafi unleashed a torrent of unregulated commerce in Libya, which previously had controlled online communications strictly, according to a study by Armament Research Services.
Apple, FBI Tussle Puts Bull's-Eye on iPhone
April 7, 2016
The battle between the FBI and Apple over access to the iPhone of Syed Farook came to an abrupt end last week when the agency announced it no longer needed the company's assistance. Since the Department of Justice delayed a hearing on an order to force Apple to assist the FBI in brute-forcing the password, speculation has spread about how the agency planned to access the data.
White House Opens More Doors for Open Source
April 6, 2016
The U.S. government is picking up the pace in its efforts to use open source software as much as possible. Federal CIO Tony Scott last month released details of a proposed policy designed to allow customized software created for one agency to be openly available to other government agencies as well. Industry and government professionals may comment on the proposal by Monday.
WhatsApp Encryption Ups Privacy Ante
April 6, 2016
WhatsApp on Tuesday told its 1 billion users that their communications would be better protected from prying eyes with end-to-end encryption. The company always has made data and communication security a priority, according to Jan Koum and Brian Acton, the founders of WhatsApp, which Facebook bought for $19 billion in 2014. End-to-end encryption is accomplished through use of the Signal Protocol.
Chinese National Cops Plea in Defense Secrets Case
March 29, 2016
A Chinese aviation and aerospace businessman last week pleaded guilty to participating in a conspiracy to steal sensitive military and export-controlled data from major U.S. defense contractors and send the information to China, according to the U.S. Department of Justice. Su Bin, also known as Stephen Su and Stephen Subin, entered the plea before Judge Christina A. Snyder.
Ransomware's Aftermath Can Be More Costly Than Ransom
March 24, 2016
Downtime caused by a ransomware attack can cost a company more than paying a ransom to recover data encrypted by the malware, according to a report released last week by Intermedia. Nearly three-quarters (72 percent) of companies infected with ransomware could not access their data for at least two days because of the incident, and 32 percent couldn't access their data for five days or more.
Car Computers Are Vehicles for Hacking, Warns FBI
March 22, 2016
The FBI, the U.S. Department of Transportation and the National Highway Traffic Safety Administration last week issued a warning about the threat of automobile hacking. Computers that control steering, braking, acceleration and lights, as well as wireless technologies used in keyless entry, ignition control and navigation systems, provide portals for cyberattack, the agencies said.
Malware Exploits Apple DRM to Infect iPhones
March 19, 2016
Security researchers at Palo Alto Networks Unit 42 on Wednesday announced they had discovered in the wild a method of infecting nonjailbroken iPhones with malware by exploiting design flaws in Apple's digital rights management technology. The flaw has been exploited since 2013 largely as a means to pirate iOS software, but this is the first time it's been used to infect iPhones with malware.
Google Reports Web Traffic Encryption Progress
March 18, 2016
Google this week launched a section of its transparency report to track the progress of efforts to encrypt the Web, by both the company and third-party sites estimated to account for about 25 percent of Web traffic. The report will be updated weekly with information about progress the company has made toward implementing HTTPS by default across its services.
Android, iOS on Opposite Sides of Encryption Divide
March 18, 2016
Consumers' understanding of what encryption does apparently doesn't determine whether they use the technology, as iPhone owners are much more likely to use encryption than Android users. Most Android phones are not encrypted, either by user choice or manufacturer design. About 95 percent of all iPhones reportedly are encrypted, compared with less than 10 percent of Android phones.
Apple Ransomware Reveals Cert Problem
March 17, 2016
Researchers last week discovered the first ransomware in the wild aimed at Apple's hardware platform. While the threat was subdued quickly, it exposed the weakness of digital certificates in authenticating software to devices. The ransomware appeared as a legitimate application because it contained a digital certificate stolen from a bona fide Mac developer in Turkey.
Apple Channels Founding Fathers in Legal Brief
March 17, 2016
Lawyers for Apple on Tuesday argued in a federal District Court filing that the founding fathers would be appalled by the demands the Department of Justice has made in seeking a backdoor to iPhone encryption. The DoJ and the FBI want "Apple to create exactly the kind of operating system that Congress has thus far refused to require," the lawyers wrote.
DoJ, Apple Butt Heads in Latest Encryption Go-Round
March 14, 2016
The legal battle between Apple and the Department of Justice over access to encrypted iPhone data got a little more personal last week after lawyers for Apple blasted a government filing that accused the company of collaborating with the Chinese government. The DOJ's filing was a smear campaign, Apple attorney Bruce Sewell argued in a conference call with reporters.
See More Articles in Cybercrime Section >>
Facebook Twitter LinkedIn Google+ RSS
Is fake news a major problem?
Yes -- people don't know which news to trust.
No -- it's very easy to spot.
Yes -- it's propaganda warfare, and the U.S. is losing.
No -- people have always believed what suited them.
Yes -- but only temporarily, as people are catching on.
No -- much of it actually isn't fake.