Welcome Guest | Sign In
Researchers Hijack Samsung's SmartThings IoT System
May 4, 2016
Researchers at the University of Michigan on Monday announced they had uncovered a series of vulnerabilities in the Samsung SmartThings home automation system that essentially could have allowed hackers to take control of various functions and break into a user's home. The researchers, working with Microsoft, were able to perform four proof-of-concept attacks.
Supreme Court Grants Federal Agents Broader Surveillance Authority
May 3, 2016
The U.S. Supreme Court has approved a series of amendments to the federal rules of criminal procedure that would let judges issue search warrants for computers located outside their jurisdiction. Chief Justice John Roberts announced the changes in the Court's interpretation of the rules. They would allow a judge to issue warrants to search for electronic evidence at remote sites, for example.
BlockIQ Escalates War on Ad Blockers
April 28, 2016
As consumers turn to ad blockers to avoid advertising on their mobile and computer screens, marketers and content providers who depend on pitches to pay the bills are searching frantically for ways to counter the pesky programs. BlockIQ offers them one. BlockIQ, owned by AdSupply, which recently merged with Adaptive Medias, has launched BlockBypass.
New Attack Technique Hides Spread of RATs in Asia
April 27, 2016
SentinelOne last week announced that it has detected a technique being used in Asia to infect systems with remote access Trojans that ensures that the payload remains in memory throughout its execution and doesn't touch the victim's computer disk in an unencrypted state. Attackers remain hidden from antivirus and next-generation technologies that focus only on file-based threats.
Insurance Industry Buzzes Over Data Breach Ruling
April 21, 2016
If the rash of data breaches in recent months has done anything for businesses, it's raised their awareness of cyber liability insurance. The market for cyber liability insurance is expected to increase dramatically as businesses become more aware that their current policies don't adequately cover cyber-risks, according to the National Association of Insurance Commissioners.
Apple to Lawmakers: We'll Help but No Backdoors
April 21, 2016
Apple's top legal official on Tuesday appeared before the U.S. House Energy and Commerce Committee and reiterated the company's willingness to help law enforcement on active cases and cooperate on long-term solutions, despite its contentious legal battle with the FBI over the encrypted iPhone used in the San Bernardino terrorist attack. Apple works daily with law enforcement on a number of cases.
Journalist Gets 2-Years in Prison for Aiding Anonymous Prank
April 19, 2016
A U.S. District Court judge last week sentenced Matthew Keys to two years in prison after he was found guilty of conspiring with the hacker group Anonymous to break into the Los Angeles Times' website and modify a news story. Keys had been site administrator for KTXL Fox 40, which was owned by Tribune, the same company that owned the Times.
Feds Prep for Cybersecurity Buying Spree
April 18, 2016
The U.S. government's objectives for improving cybersecurity are taking shape in updated contracting procedures, contracts and projected increases in spending. Recent developments have underscored the federal commitment to IT security. The GSA has asked vendors to respond by Wednesday to a research survey on what it should do to expedite federal acquisition of cybersecurity products and services.
Microsoft Sues DoJ Over Spying Gag Orders
April 15, 2016
Microsoft on Thursday filed suit against the U.S. Department of Justice challenging the gag orders that accompany requests to access customers' private emails and other data. The orders prevent the company from notifying affected customers about the government's demands. The case is the fourth public lawsuit it has filed against the Justice Department in three years.
FBI Paid Hackers to Defeat Security of Shooter's iPhone
April 14, 2016
The FBI paid hackers to break onto the iPhone of the San Bernardino, California, shooter, according to a news report published Tuesday. The bureau obtained the services of gray hats, insiders said, and apparently did not get help from Cellebrite, as earlier reports had suggested. Gray hats are hackers who sell flaws to governments or companies that make surveillance tools.
Adobe Issues Emergency Patch to Head Off Flash Ransomware Attacks
April 11, 2016
Adobe last week issued an emergency security patch to fix a vulnerability in Flash that could leave users vulnerable to a ransomware attack. The vulnerability exists in Adobe Flash Player and earlier versions for Windows, Macintosh, Linux and Chrome operating systems. It can cause a crash and leave the computer vulnerable to attackers, the company said.
Illicit Weapons Traders Flock to Facebook
April 8, 2016
Facebook has served as an online marketplace for armed militias in Libya and other war-torn countries, according to a news report published Wednesday. An array of light weapons bought and sold after the fall of Moammar Gadhafi unleashed a torrent of unregulated commerce in Libya, which previously had controlled online communications strictly, according to a study by Armament Research Services.
Apple, FBI Tussle Puts Bull's-Eye on iPhone
April 7, 2016
The battle between the FBI and Apple over access to the iPhone of Syed Farook came to an abrupt end last week when the agency announced it no longer needed the company's assistance. Since the Department of Justice delayed a hearing on an order to force Apple to assist the FBI in brute-forcing the password, speculation has spread about how the agency planned to access the data.
White House Opens More Doors for Open Source
April 6, 2016
The U.S. government is picking up the pace in its efforts to use open source software as much as possible. Federal CIO Tony Scott last month released details of a proposed policy designed to allow customized software created for one agency to be openly available to other government agencies as well. Industry and government professionals may comment on the proposal by Monday.
WhatsApp Encryption Ups Privacy Ante
April 6, 2016
WhatsApp on Tuesday told its 1 billion users that their communications would be better protected from prying eyes with end-to-end encryption. The company always has made data and communication security a priority, according to Jan Koum and Brian Acton, the founders of WhatsApp, which Facebook bought for $19 billion in 2014. End-to-end encryption is accomplished through use of the Signal Protocol.
Chinese National Cops Plea in Defense Secrets Case
March 29, 2016
A Chinese aviation and aerospace businessman last week pleaded guilty to participating in a conspiracy to steal sensitive military and export-controlled data from major U.S. defense contractors and send the information to China, according to the U.S. Department of Justice. Su Bin, also known as Stephen Su and Stephen Subin, entered the plea before Judge Christina A. Snyder.
Ransomware's Aftermath Can Be More Costly Than Ransom
March 24, 2016
Downtime caused by a ransomware attack can cost a company more than paying a ransom to recover data encrypted by the malware, according to a report released last week by Intermedia. Nearly three-quarters (72 percent) of companies infected with ransomware could not access their data for at least two days because of the incident, and 32 percent couldn't access their data for five days or more.
Car Computers Are Vehicles for Hacking, Warns FBI
March 22, 2016
The FBI, the U.S. Department of Transportation and the National Highway Traffic Safety Administration last week issued a warning about the threat of automobile hacking. Computers that control steering, braking, acceleration and lights, as well as wireless technologies used in keyless entry, ignition control and navigation systems, provide portals for cyberattack, the agencies said.
Malware Exploits Apple DRM to Infect iPhones
March 19, 2016
Security researchers at Palo Alto Networks Unit 42 on Wednesday announced they had discovered in the wild a method of infecting nonjailbroken iPhones with malware by exploiting design flaws in Apple's digital rights management technology. The flaw has been exploited since 2013 largely as a means to pirate iOS software, but this is the first time it's been used to infect iPhones with malware.
Google Reports Web Traffic Encryption Progress
March 18, 2016
Google this week launched a section of its transparency report to track the progress of efforts to encrypt the Web, by both the company and third-party sites estimated to account for about 25 percent of Web traffic. The report will be updated weekly with information about progress the company has made toward implementing HTTPS by default across its services.
Android, iOS on Opposite Sides of Encryption Divide
March 18, 2016
Consumers' understanding of what encryption does apparently doesn't determine whether they use the technology, as iPhone owners are much more likely to use encryption than Android users. Most Android phones are not encrypted, either by user choice or manufacturer design. About 95 percent of all iPhones reportedly are encrypted, compared with less than 10 percent of Android phones.
Apple Ransomware Reveals Cert Problem
March 17, 2016
Researchers last week discovered the first ransomware in the wild aimed at Apple's hardware platform. While the threat was subdued quickly, it exposed the weakness of digital certificates in authenticating software to devices. The ransomware appeared as a legitimate application because it contained a digital certificate stolen from a bona fide Mac developer in Turkey.
Apple Channels Founding Fathers in Legal Brief
March 17, 2016
Lawyers for Apple on Tuesday argued in a federal District Court filing that the founding fathers would be appalled by the demands the Department of Justice has made in seeking a backdoor to iPhone encryption. The DoJ and the FBI want "Apple to create exactly the kind of operating system that Congress has thus far refused to require," the lawyers wrote.
DoJ, Apple Butt Heads in Latest Encryption Go-Round
March 14, 2016
The legal battle between Apple and the Department of Justice over access to encrypted iPhone data got a little more personal last week after lawyers for Apple blasted a government filing that accused the company of collaborating with the Chinese government. The DOJ's filing was a smear campaign, Apple attorney Bruce Sewell argued in a conference call with reporters.
Senators Aim to Lay Down the Law on Encryption Cooperation
March 11, 2016
Lawmakers this week sent to the White House the draft version of a bill that would penalize technology companies if they failed to cooperate on encryption cases, according to Capitol Hill sources. The bill would open up tech companies to contempt orders and other penalties if they refused to comply with a law enforcement request involving encrypted communications.
Facebook Exec's Brazilian Misadventure Signals Bigger Problem
March 10, 2016
The jailing last week of Facebook Regional Vice President Diego Dzoda in Brazil may have been the tip of an iceberg. Frustrated police made the arrest after Facebook failed to produce WhatsApp messages connected to a drug trafficking case. The incident is one of a growing heap of examples that highlight the difficulties law enforcement agencies face when trying to collect digital evidence.
White House Proposes $3B IT Update Fund
March 10, 2016
The Obama administration is seeking $3.1 billion for a modernization fund to update federal IT resources that need to be replaced with more efficient systems. The fund would bolster the government's annual spending on IT, which is set for a modest increase to $89.8 billion in the administration's proposed budget for fiscal 2017. Upgrading older systems has been a concern for some time.
Tech Titans Tackle the Trump Problem
March 9, 2016
High-profile Silicon Valley executives last week attended a secret summit with GOP leaders at the American Enterprise Institute's World Forum in a bid to put the brakes on the political campaign of Donald Trump, according to a report published Monday. Trump has dominated the Republican presidential race with highly charged rhetoric and out-of-the-box campaign promises.
Ransomware Plague Spreads to Macs
March 8, 2016
Researchers at Palo Alto Networks last week announced that they had found the first ransomware in the wild aimed at Macintosh computers, but Apple and one of its developers quickly neutered it. The ransomware -- a malware program that scrambles data on a computer and won't unscramble it unless a ransom is paid -- was embedded in software for installing an OS X app for sharing files on BitTorrent.
FBI Would Hurtle Us Back to Encryption Jurassic, Apple Warns
March 8, 2016
The FBI's efforts to compel Apple to unlock an iPhone used by one of the slain San Bernardino terrorists could threaten national security, charged Craig Federighi, Apple's SVP of engineering, in an op-ed piece published Monday. Terrorists and criminals could launch attacks on vital infrastructure through access "to just one person's smartphone," he maintained.
See More Articles in Cybercrime Section >>
Facebook Twitter LinkedIn Google+ RSS
Genesys OEC Video
What's your alarm level over cyberattacks on the Internet's infrastructure?
Red: A deadly cyberwar will occur -- It's when, not if.
Orange: A big one could be costly and threaten public safety.
Yellow: We need to improve cybersecurity at a faster pace.
Blue: Regional outages will become more frequent and more annoying.
Green: There's no way anyone could take out the entire Internet.