Attention Marketers: Access 30 Million IT Decision Makers with ECT News Network's INSTA-LEADS · Click to Learn More!
Welcome Guest | Sign In
TechNewsWorld.com
Flaws in Ancient Standard Enable Wireless Eavesdropping, Spying
December 23, 2014
Vulnerabilities in Signaling System 7, telephony signaling protocols used by carriers worldwide, allow third parties to listen to people's cellphone calls and intercept text messages despite encryption, The Washington Post reported last week. German cybersecurity researchers Tobias Engel of Sternraute and Karsten Nohl of Security Research Labs separately discovered these vulnerabilities.
The Untold Stories of 2014
December 22, 2014
It is time to look back at 2014, so I'll focus here on a series of stories I thought were interesting but didn't seem to catch much or any real air. Some, like what is really behind Sony's decision to pull The Interview still might take off. Hadoop analytics is one of the most powerful platforms to come to market, and one vendor stands out above all others: Cloudera.
Google Calls In Legal Eagles in MPAA Piracy Skirmish
December 19, 2014
Google has filed a lawsuit against Mississippi Attorney General Jim Hood, the latest salvo in its piracy battle with the Motion Picture Association of America. Hood targeted Google with an "unreasonable, retaliatory and burdensome" subpoena, the complaint says. The referenced subpoena likely is part of a coordinated campaign against Google known as "Project Goliath."
US Mulls Response to Sony Hack
December 19, 2014
Department of Homeland Security Secretary Jeh Johnson on Thursday said the United States "is actively considering a range of options" to take in response to the Sony hack. The hack is "very serious," Johnson said, though he refused to label it as a terrorist attack. There has been widespread suspicion that North Korea engineered the hack. The FBI is investigating.
Terrorist Threats May Blow Up 'The Interview's' Box Office
December 17, 2014
The now-notoriously controversial action comedy The Interview, which was expected to deliver profits of $90-$95 million for Sony, may have become a financial black hole. The movie's Thursday premiere in New York has been cancelled, and several movie theater chains have scrapped plans to screen it, following a hacker message referencing 9/11 and threatening physical attacks on theaters.
Sony Sends News Outlets a Stern but Toothless Warning
December 16, 2014
On behalf of Sony Pictures Entertainment, high-powered attorney David Boies has sent a letter to several news outlets demanding that they refrain from publishing stories based on material hackers recently stole from the company and that they destroy the pilfered data. The letter to the news organizations claims the stolen information is "protected under U.S. and foreign legal doctrines."
Sony May Have Succumbed to DDoS Temptation
December 15, 2014
Sony reportedly has used Amazon Web Services to launch distributed denial of service attacks on sites carrying files stolen from its network. Those attacks apparently involved "hundreds of computers" in Tokyo and Singapore. Amazon reportedly issued a statement denying the claim, but the language it used was vague: "The activity being reported is not currently happening on AWS."
No Respite for Sony
December 12, 2014
Since the hacker group calling itself "Guardians of Peace" announced its attack on Sony Pictures Entertainment late last month, things have gone downhill for the company. After confidential documents were leaked to the Internet over several days, a denouement of sorts was reached last week, when a security company examining the stolen data discovered nearly 50,000 Social Security numbers.
NSA's Auroragold Mining Operation
December 10, 2014
The United States National Security Agency, which is known for monitoring landline, Web and cellphone communications worldwide, reportedly also targets wireless carriers. Documents released by whistle-blower Edward Snowden show the NSA has monitored more than 1,200 email accounts associated with major cellphone network operators worldwide since 2010.
Hackers Derail Sony's PlayStation Network
December 9, 2014
Still reeling from a cyberintrusion that exposed massive amounts of personnel data from its entertainment division on the Internet, Sony was attacked again over the weekend. This time, hackers disrupted the company's PlayStation Network. However, unlike the foray against Sony Pictures Entertainment, which is still under investigation, the company quickly recovered.
Sony's Cyber-Whodunit Is a Page-Turner
December 5, 2014
Who breached Sony Pictures' network and why continues to be a puzzle a week after news of the hack first emerged. Some speculate it was an inside job. A few have pointed fingers at North Korea, which returned its own one-finger salute in response. Others discount that possibility. In the meantime, the FBI has issued a warning stating destructive malware is on the loose.
Iran Raises Its Cyberfist to the World
December 4, 2014
Iran, which for decades has locked horns with the United States, is emerging as a cyberwarfare power that's threatening the world, Cylance warned in its Operation Cleaver report, released Tuesday. Cylance has been tracking one team of roughly 20 hackers called "Tarh Andishan," which means "thinkers" or "innovators" in Farsi. The group is suspected to be Iranian.
Cybersecurity Threats 2015: More Espionage, More Apple Malware
December 3, 2014
Cyberspies will flourish and hackers will target Apple devices more often in 2015. Until now, Russia, China and the United States have dominated the cyberespionage scene, but their success will start to attract new players to the practice. "We can expect some of the developing economies ... to engage in these activities to protect their growth status," said Websense's Carl Leonard.
Did North Korea Get the Last Laugh Against Sony?
December 2, 2014
Upwards of 1.2 million people reportedly have used pirate sites to download Brad Pitt's unreleased World War II drama Fury. That was one of five films hackers leaked onto the Web following an attack on Sony Pictures' network last week. Sony has called in the FBI and other law enforcement agencies. It's rumored that the hack was launched by North Korea.
Wristband Heads Off Password Headaches
November 25, 2014
Has software glut got you down? Do you reuse passwords because creating unique ones for all your online accounts would cause a memory overload? If so, you may be interested in a bit of jewelry called the "Everykey," by a startup with the same name. Everykey is a wristband that removes the need to remember the countless log-in credentials we use every day.
EFF Spearheads Safer Web Initiative
November 24, 2014
The Electronic Frontier Foundation has announced a nonprofit organization that will aim to secure the entire Web. Let's Encrypt, starting in summer 2015, will offer free server certificates to help websites transition from HTTP to the more secure HTTPS protocol. EFF is partnering with Akamai, Mozilla, Cisco, iDenTrust and University of Michigan researchers.
NotCompatible Mobile Malware Gets Badder
November 21, 2014
A new version of the NotCompatible malware, which first appeared in 2012, is bigger, badder and pretty much indestructible, Lookout Security reported. And it can compromise corporate networks, thanks to the BYOD trend. The malware, called "NotCompatible C," focuses on Android devices. The NotCompatible Trojan is used to spread spam campaigns, among other nefarious activities.
Citadel Trojan Adds Keylogging to Arsenal
November 21, 2014
Cybercriminals are using a new version of the dangerous Citadel Trojan, which has been employed to attack the financial and petrochemical industries, to compromise password and authentication solutions, IBM Trusteer has reported. The new version begins capturing keystrokes, or keylogging, when some processes are running. It was discovered on a server that already had been infected.
Russian Site Exposes Thousands of Private Videocam Streams
November 20, 2014
A Russian website has been posting live video streams from unprotected webcams in homes and businesses around the globe, Britain's Information Commissioner's Office warned on Thursday. The website has gained access to the webcams using the cameras' default login credentials, which are freely available online but often don't get changed by their owners during the set-up process.
China Suspected in Attacks on USPS, NOAA
November 19, 2014
The U.S. Postal Service and National Oceanic and Atmospheric Administration last week confirmed that their computer systems were targeted in months-long cyberattacks that appear to have originated in China. The attack on USPS compromised information of an estimated 800,000 employees. Data at risk includes names, date of birth, Social Security numbers, addresses and dates of employment.
Researchers Shine Spotlight on OS X/iOS Masque Attack
November 12, 2014
Researchers at FireEye on Monday made public the existence of the Masque Attack, which threatens iOS and Mac OS X operating systems. Masque Attack exploits a flaw in Apple's OSes that allows the replacement of one app by another so long as both apps use the same bundle identifier. All apps, except those preinstalled on iOS, such as Mobile Safari, can be replaced.
USPS Employees, Retirees, Customers Exposed in Hack Attack
November 11, 2014
Hackers siphoned off data from United States Postal Service servers for more than eight months before being detected, the USPS said. The personal data -- including names, dates of birth, Social Security numbers, addresses, beginning and end dates of employment and emergency contact information -- of more than 800,000 employees and some retirees has been exposed.
New Tool Alerts Etailers to Suspicious Characters
November 11, 2014
As thoughtful as mobile phone makers are when they design their products, there are always punters who want something that isn't there and are willing to hack a device to get it. In the Android world such a hack is called "rooting" a phone; in the iOS world, it's called "jailbreaking." Regardless of what it's called, it can turn a phone into a can of worms for retailers.
Russian Cyberspies Caught With Mittens in Cyber Cookie Jar
November 6, 2014
Russian cyberspies -- unlike their Chinese counterparts -- have a reputation for stealth, so it's unusual when two digital espionage operations linked to the Kremlin come to light in a week. FireEye early last week released a report detailing how hackers working for the Russian government have been using sophisticated techniques over a seven-year period to penetrate computer systems.

See More Articles in Hacking Section >>
Facebook Twitter LinkedIn Google+ RSS
Is native advertising good for journalism?
Yes -- It's a reasonable source of additional revenue for media outlets to support their traditional editorial efforts.
Yes -- Paid-for articles can contain useful information, but readers might bypass them if they look too much like ads.
Maybe -- But only if it's clearly labeled as paid-for content.
No -- I don't trust any information from media outlets that cloak paid-for content as objective journalism.
No -- Native advertising is confusing and devious, and it threatens the fabric of traditional journalism.
I Don't Know -- I don't understand what native advertising is.