Welcome Guest | Sign In
TechNewsWorld.com
Hack of Half a Billion Records Takes Shine Off Yahoo's Data Trove
September 23, 2016
Yahoo on Thursday disclosed that a data breach in late 2014 resulted in the theft of information from at least 500 million customer accounts. It appears that state-sponsored hackers carried out the attack, the company said. Account information compromised includes names, email addresses, telephone numbers, dates of birth, hashed passwords, and security questions and answers.
Opera's Free VPN Takes On Internet Privacy Challenge
September 22, 2016
Opera earlier this week released a new version of its browser, Opera 40, which comes with a free virtual private network service built in. The official rollout follows five months of user experimentation with a beta version. After evaluating beta users' feedback, the company brought on additional servers, added options for global or private browsing, and created iOS and Android versions.
Oracle Snags Palerra to Beef Up Cloud Security
September 20, 2016
Oracle has agreed to buy cloud access security broker Palerra, whose LORIC software manages security and compliance for applications, workloads, and sensitive data stored across cloud services. Palerra "offers a unique combination of visibility into cloud usage, data security, user behavior analytics and security configurations, with automated incident responses," wrote Oracle SVP Peter Barker.
Congress to Bureaucrats: Trust No One
September 20, 2016
Congress earlier this month lowered the hammer on the U.S. Office of Personnel Management in a report on the massive data breach that resulted in the theft of 4.2 million former and current government employees' personnel files, as well as 21.5 million individuals' security clearance information, including fingerprints associated with 5.6 million of them.
Cyberattacks on Athletes May Be Russian Distraction Tactic
September 16, 2016
Confidential information about international athletes surfaced on the Internet Wednesday -- the second such exposure this week. Russian hackers allegedly stole the information from the World Anti-Doping Agency. It includes confidential data on medical drug exemptions given to 25 athletes from eight countries. Information about four athletes appeared online earlier in the week.
Sony Kicks The Last Guardian Down the Road Again
September 16, 2016
The first wave of previews for SIE's long-in-development video game epic The Last Guardian appeared following a demo at the Tokyo Game Show earlier this week, and reactions were mixed. Much of the coverage of this PS4 game, first announced at E3 in 2007, has focused on its long development process and delays. It originally was to be a follow-up to Fumito Ueda's Shadow of the Colossus.
Nation States May Be Plotting Internet Takedown, Warns Cybersec Pro
September 14, 2016
Unknown attackers have been testing the defenses of companies that run critical parts of the Internet, possibly to figure out how to take them down, cybersecurity expert Bruce Schneier warned. Large nation states -- perhaps China or Russia -- are the likely culprits, he suggested. "Nation state actors are going to probe to find weaknesses in all of our technologies," said Tripwire's Travis Smith.
Alphabet Think Tank Spearheads Online Counterterrorism Campaign
September 14, 2016
Alphabet think tank Jigsaw and startup Moonshot CVE last week demonstrated a new counterterrorism technology tool. The groups have been collaborating to steer social media users away from terrorist propaganda. They have developed sophisticated algorithms to target potential ISIS sympathizers with counter narratives when they search for certain terms online or through social media.
Attack-for-Hire Teens Collared in Israel
September 14, 2016
At the FBI's request, Israeli authorities last week arrested two teens for operating vDOS, a DDoS-for-hire service that raked in more than half a million dollars in two years. DDoS attacks flood websites with garbage data in order to disrupt their operation and deny users access. The pair were questioned and released after posting bond of about $10,000 each.
How China Could Take Over the World's Tech and Automotive Markets
September 12, 2016
Nvidia and Baidu recently made an announcement with regard to self-driving cars that deserves closer attention. China currently is behind the U.S. in automotive technology, but it has passed the U.S. and Japan in automobile production -- I actually thought Japan was still ahead. China is producing twice the number of cars the U.S. is producing right now.
Dropbox Drops Other Shoe in Years-Old Data Breach
September 8, 2016
Dropbox has confirmed that more than 68 million emails and passwords have been compromised from a hack that originally was disclosed in 2012. Exposure from the breach was limited to email addresses, Dropbox originally claimed. However, the hackers actually stole hashed and salted passwords. Even so, there have been no indications that they succeeded in accessing user accounts, the company said.
Obama Warns Against Cyber Cold War
September 6, 2016
President Obama on Monday urged de-escalation of a potential arms race involving cyberweapons. The president's remarks followed his meeting with world leaders, including Russian President Vladimir Putin, at the G20 Summit in Hangzhou, China. The U.S. has more offensive and defensive capability than any other country on Earth, Obama noted. The president urged adoption of new cybersecurity norms.
Feds Warn States to Batten Down Hatches Following Election System Attacks
September 2, 2016
The FBI has launched investigations into malicious cyberattacks on the electronic election infrastructures in Illinois and Arizona, and federal officials last month warned states to take steps to protect their systems as the presidential campaign heats up, according to reports. The attacks, dating back to June, led to the illegal download of information on more than 200,000 Illinois voters.
FairWare Hackers May Take Ransoms, Keep Stolen Files
September 2, 2016
The latest ransomware intrusion that targets Linux servers, dubbed "FairWare," may be a classic server hack designed to bilk money from victims with no intent to return stolen files after payment in bitcoins is made. The attack reportedly targets a Linux server, deletes the Web folder, and then demands a ransom payment of two bitcoins for return of the stolen files.
Massive Data Breach Puts French Sub Maker in Crosshairs
September 1, 2016
Officials in France and India are investigating a massive data breach involving thousands of documents belonging to defense industry contractor DCNS, which was scheduled to deliver six Scorpene-class submarines to the Indian navy later this year. Hackers stole more than 22,000 pages of documents that included detailed technical information on the vessels, some of which was published online.
Election Season Spawns Scams With Political Twist
August 30, 2016
Dirty tricks during political campaigns are nothing new, but the Internet and the proliferation of mobile devices have allowed tricksters to up their games a notch. It came to light last week, for example, that Donald Trump's campaign app was hoovering the address books on his supporters' phones. Trump's app wasn't doing anything illegal. It wasn't even trying to hide what it was doing.
Innocents Exposed as WikiLeaks Gushes Information
August 27, 2016
WikiLeaks reportedly has leaked sensitive personal information belonging to hundreds of innocent individuals worldwide, including some residing in several highly repressive countries. The organization has revealed private credit card data, medical information, personal addresses and other data of various individuals, including the identification as gay of a Saudi Arabian who had been arrested.
Apple Speeds iOS Patch to Bring Down Pegasus
August 26, 2016
Apple on Thursday issued a patch that addresses three recently discovered critical iOS zero-day vulnerabilities, and advised users to update their systems immediately. State-sponsored actors exploited the flaws to target United Arab Emirates human rights defender Ahmed Mansoor, and a Mexican journalist who reported on government corruption. Researchers have dubbed the flaws "Trident."
US Government's Social Media Vetting Idea Draws Fire
August 26, 2016
A coalition headed by the Center for Democracy & Technology, the Internet Association, and the American Civil Liberties Union this week filed objections to a Department of Homeland Security proposal to collect social media information from visitors entering the United States. The proposal, published in June, calls for the addition of a request to the I-94W form required for aliens seeking entry.
WhatsApp Shaves Off a Little More Privacy
August 25, 2016
WhatsApp on Thursday announced an update to its terms and privacy policy -- the first in four years. Among other things, the changes will affect the ways users can communicate with businesses while continuing to avoid third-party banner ads or spam messages, according to the company. However, WhatsApp will begin to share some personal details about its 1 billion users with Facebook.
25 Years of Linux: What a Long, Strange Trip It's Been
August 25, 2016
Happy Birthday Linux! You're 25! When Linux was born on Aug. 25, 1991, it was little more than a hobby for 21-year old Linus Torvald. Today the Linux community is estimated to be upwards of 86 million users strong. It has become the backbone of large enterprises, and it is installed in government systems and embedded in devices worldwide. It has grown into a major mainstream computing platform.
To Protect Enterprise Data, Secure the Code
August 20, 2016
Responsibility for securing enterprise applications has been moving down the development lifecycle, and for good reason. It not only makes the enterprise more secure, but also saves companies time and money. For example, the average time to fix a vulnerability in IBM's application security solution has dropped from 20 hours to 30 minutes, according to Forrester Consulting.
Russian Gang Suspected of Hacking Oracle's POS System
August 20, 2016
Oracle has been investigating a point-of-sale system breach that may be the work of Russian cyberthieves. Hackers compromised at least 700 computers on the MICROS POS system, used by hundreds of thousands of hotels, restaurants and retail outlets worldwide to process credit card transactions, Krebs on Security reported earlier this month. More than 330,000 cash registers worldwide use MICROS.
Edward Snowden Sheds Light on Shadow Brokers
August 18, 2016
Edward Snowden has injected himself into an escalating cyberstruggle that could affect the U.S. presidential election. The reported hack of The Equation Group might have been a warning shot from Russia, Snowden claimed. The group, which is widely believed to be a front operation for the NSA, apparently was hacked over the weekend by a previously unknown outfit called the "Shadow Brokers."
The Growing Scourge of Cyberbullying, Part 2
August 17, 2016
The digitization of everything has decreased the degrees of separation between everyone. While that interconnectedness has solved many problems, old and new, digitization has worsened one age-old problem: bullying. An online bullying epidemic is now pushing parents, teens, teachers and technology companies to try even harder to mitigate the misery inflicted on its victims.
Super-Sophisticated Spyware Spotted After 5-Year Run
August 16, 2016
Symantec and Kaspersky Lab last week separately announced the discovery of a highly sophisticated APT that had eluded security researchers for at least five years. A previously unknown group called "Strider" has been using Remsec, an advanced tool that seems to be designed primarily for spying. Its code contains a reference to Sauron, the main villain in The Lord of the Rings.
Hackability of Volkswagen's Keyless Entry System Exposed
August 12, 2016
Hackers using cheap wireless devices pose a threat to millions of cars equipped with Volkswagen's keyless entry system, according to a study from the University of Birmingham. Scheduled for presentation Friday at the USENIX security conference in Austin, Texas, the study shows that thieves can use a simple wireless device to unlock the doors of millions of cars remotely.
TCP Flaw Opens Linux Systems to Hijackers
August 11, 2016
A flaw in the RFC 5961 specification the Internet Engineering Task Force developed to protect TCP against blind in-window attacks could threaten Android smartphones, as well as every Linux computer on the planet. The flaw is described in a paper a team of researchers presented at the 25th Usenix Security Symposium, ongoing in Austin, Texas, through Friday.
The Growing Scourge of Cyberbullying, Part 1
August 10, 2016
Smartphones are proliferating among adolescents, and so is cyberbullying. That's particularly worrisome due to its potential contribution to the No. 2 cause of teen death: suicide. About 26.3 percent of the middle- and high-school students who responded to a nine-school survey indicated that they'd been bullied in each of the eight years the poll was taken, researchers found.
900 Million Androids Could Be Easy Prey for QuadRooter Exploits
August 9, 2016
Four newly identified vulnerabilities could affect 900 million Android devices, Check Point researchers disclosed. The vulnerabilities, which the researchers dubbed "QuadRooter," affect Android devices that use Qualcomm chipsets. They exist in the chipset software drivers. The drivers, which control communications between chipset components, are incorporated into Android builds.
See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS
What do you think of politically inspired Internet memes?
They tend to be brutally honest about their targets.
They're usually cheap shots based on lies.
They're often stupid but amusing.
They can have a dangerous influence on uninformed people.
They don't impress me one way or the other.