Boost Your International Sales on eBay and Amazon. Click to learn more.
Welcome Guest | Sign In
TechNewsWorld.com
Turkey PM, Prez Go Round and Round About Social Media
March 10, 2014
Turkey's prime minister and president are spewing conflicting talking points on the nation's stance toward social media. It turns out the one who's getting nailed on social media is the one who wants more restrictions. Prime Minister Recep Tayyip Erdogan last week vowed to restrict social media after this month's local elections, but President Abdullah Gul said that was "out of the question."
Beijing to Officials: Please, No Smartphones During Session
March 05, 2014
Officials partaking in China's National People's Congress, which began Wednesday, have been asked to please not mess around on their mobile devices during the session. A state-owned newspaper published a list of rules for attendees, including this one: "Do not use your phones to send text messages or make phone calls during meeting; do not use your computer or phone to play games."
Mt. Gox Scrambles for Chap. 11 Cover
February 28, 2014
Mt. Gox, the largest Bitcoin exchange, filed for Chapter 11 bankruptcy proceedings in Tokyo, Just days after going offline following the publication on Scribd of an internal memo that alleged hackers had stolen nearly 745,000 Bitcoins from its servers over the years. Blaming a weakness in the company's systems, CEO Mark Karpeles apologized publicly but said the Bitcoin industry was healthy.
Target Reels From Customer Data Breach
February 26, 2014
Target reported financial results for the quarter during which it suffered a high-profile data breach, revealing how badly the company was stung by the security lapses. In the three months ending Feb. 1, net earnings dropped by 46 percent compared with the year-ago fourth quarter, from $961 million to $520 million. Profit dropped by more than 40 percent from the same period a year earlier.
The Rise of the Ethical Hacktivist
February 25, 2014
When Saul Alinsky wrote Rules for Radicals more than four decades ago, the world was a very different place than it is today. Protests and demonstrations were among the most common tactics for bringing about social change, and they were used on such a broad scale that they helped define the Vietnam War era and counterculture movement of the 1960s and 1970s.
Security Firms Scour Mobile Apps
February 24, 2014
Security pros weren't very kind to mobile applications last week. A number of firms knocked apps produced for the smartphone market for all kinds of risky behaviors that could lead to trouble not only for mobile device owners, but also for their employers. While Android has been a poster child for misbehaving apps in the past, competitor Apple's apps aren't as pristine as is commonly believed.
Hackers Perfectly Time Largest DDoS Attack Ever
February 12, 2014
"Very big NTP reflection attack hitting us right now. Appears to be bigger than the #Spamhaus attack from last year. Mitigating." That Monday evening tweet from Matthew Prince, CEO of CloudFlare, signaled what's being touted as the largest distributed denial of service attack ever launched on the Internet. The attackers leveraged a known vulnerability in the Internet's infrastructure.
Internet of Things, Part 1: God's Gift to the NSA
February 12, 2014
The NSA's salivary glands no doubt started working overtime when it became apparent that technological advances were moving the world toward an Internet of Things -- a world where everything would be connected to everything else wirelessly or over the Web. Almost two years ago, David Petraeus, then director of the CIA, enthused that the IoT would transform surveillance techniques.
Defense Contractors Shore Up Security Post-Snowden
February 10, 2014
Defense contractors have begun to bolster their cybersecurity practices in the wake of the massive leaking of government data by former NSA contractor Edward Snowden. Seventy-five percent of defense contractors said the Snowden Affair had changed security procedures for their employees in a recent survey. "I'm surprised that number isn't higher," said security researcher Dodi Glenn.
Careless, Reckless Staff Are Corporate Security's Biggest Threat
February 07, 2014
We have met the enemy and he is us. Pogo's philosophical observation perfectly describes the way IT and security professionals view their end users' attitude toward data security. An overwhelming 80 percent of corporate security professionals and IT administrators indicated in a recent survey that "end user carelessness" constituted the biggest security threat to their organizations.
Google's Long European Antitrust Nightmare May Be Over
February 06, 2014
It looks like Google and European regulators have, at long last, reached a settlement to allay antitrust concerns. Google has struck a deal with EC competition regulators, which now awaits formal approval. Under the terms laid out, Google would have to swallow its stiffest-ever antitrust penalties, but it would nonetheless avoid a finding of wrongdoing and a potentially massive fine.
Google Offers Higher Bounties for Security Bugs
February 05, 2014
Google is taking the fight to hackers by increasing the rewards it hands out to researchers who flag vulnerabilities in the company's products. Its security reward program now covers additional services including Chrome browser apps and extensions that the company has developed and branded as "by Google." Researchers who report vulnerabilities can now grab between $500 and $10,000.
Target Fiasco Shines Light on Supply Chain Attacks
February 03, 2014
The holiday data breach at Target was opened up with stolen credentials from a vendor in the company's supply chain, according to reports that surfaced last week. That kind of attack is getting more and more common these days. "About 80 percent of data breaches originate in the supply chain," said Torsten George, vice president of marketing for Agiliance.
IT Weaknesses Paved the Way for Target Hackers
January 30, 2014
The Target data breach exposed more than 100 million customers, riled up U.S. intelligence agencies, sparked a Justice Department investigation, involved the U.S. Department of Homeland Security and the FBI, triggered congressional hearings, and led several banks to re-issue their credit cards. The hacker has variously been identified as a 17-year-old Russian or one or more other cybercriminals.
US, British Intelligence Scoop Data From Smartphone Apps
January 28, 2014
Don't get angry, but... U.S. and British intelligence agencies have long been mining data from smartphone apps such as the wildly popular Angry Birds. The National Security Agency and its British brethren at the Government Communications Headquarters reportedly have targeted the swell of data moving to and fro on mobile apps, based on previously secret documents leaked by Edward Snowden.
Biz Brass Kept in Dark About Breaches
January 27, 2014
With breaking news about data breaches a common occurrence, you'd think security threats to an organization's data would be something CEOs and their management teams were kept in the know about. Apparently not. Some 80 percent of IT pros in the U.S. and UK said they did not frequently communicate with executive management about potential cyberattacks to their organizations in a recent survey.
SEA Hackers Muck Up CNN Sites
January 24, 2014
CNN on Thursday became the latest media outlet to fall victim to hacking by the Syrian Electronic Army. The SEA hacked into and defaced various CNN social media accounts and blogs, the network's Catherine Shoichet reported. "Tonight, the #SEA decided to retaliate against #CNN's viciously lying reporting aimed at prolonging the suffering in #Syria," the SEA tweeted Thursday.
Neiman Marcus Alerts Customers to Hack Attack
January 24, 2014
Neiman Marcus has announced that some 1.1-million customer credit and debit cards may have been exposed in a hack attack. The retailer was first alerted to the intrusion at the beginning of the year. It appears that "sophisticated, self-concealing malware" able to obtain payment card information was active in the company's systems between July 16 and Oct. 30, 2013, CEO Karen Katz said.
Syrian Electronic Army Takes Another Poke at Microsoft
January 22, 2014
The Syrian Electronic Army, which is notorious for launching cyberattacks against the media, on Monday defaced the Microsoft Office blog site. The hack occurred after Microsoft redesigned the blog site following an SEA attack earlier this month. "A targeted cyberattack temporarily affected the Microsoft Office blog and the account was reset," said exec Dustin Childs.
Bitcoin's Popularity Attracts Malware Writers
January 22, 2014
Most folks know the value of money, but few know the latest value of a Bitcoin, a virtual currency prone to wide price swings. Those swings haven't deterred those on the digital leading edge from speculating in the currency -- or bad app writers from plotting ways to steal it. "Bitcoins -- and indeed any digital property of any value -- will be a theft target," said Bitcoin developer Jeff Garzik.
Crowdfunders Send Jamaican Bobsled Team to Sochi
January 21, 2014
The Jamaican bobsled team, which qualified for the Olympics for the first time since 2002, is heading to the Sochi Olympics, thanks in large part to a group of supporters who raised more than $25,000 worth of "Dogecoins," an Internet currency. The team needed about $40,000 total, and after the Internet came through with $25K, Jamaica's Olympic committee picked up the difference.
Internet Crimes Led to Long Jail Sentences in 2013
January 11, 2014
With all the headlines about Internet cybersecurity breaches, there seem to be few headlines about the consequences for cybercriminals. That is because not all cybercriminals are caught, and when they are it often takes months, if not years, before trials. Even when the cybercriminals plead guilty, the sentencing phase often occurs months after the trial.

See More Articles in Hacking Section >>
Facebook Twitter LinkedIn Google+ RSS