Attention Marketers: Access 30 Million IT Decision Makers with ECT News Network's INSTA-LEADS Click to Learn More!
Welcome Guest | Sign In
TechNewsWorld.com
Russian Hackers Sack US Banks: Report
August 29, 2014
Hackers appear to have stolen data from JPMorgan Chase and at least one other U.S. bank in retaliation for economic sanctions against Russia. The raid on the banks' computer systems reportedly resulted in the theft of gigabytes of sensitive data. JPMorgan did not confirm the incident. However, the FBI is conducting an investigation into reports of cyberattacks on U.S. banks.
Hacker Attacks on Healthcare Providers Jump 600 Percent
August 28, 2014
The recent data breach at Community Health Systems, in which Chinese hackers stole the personal information of 4.3 million patients, was another sign of a disturbing trend: Healthcare providers are coming under cyberattack at an alarming rate. "We've seen a 600 percent increase in attacks on the healthcare sector in the last 10 months," said Carl Leonard, senior manager at Websense Security Labs.
California Lays Down the Kill-Switch Law
August 27, 2014
Gov. Jerry Brown on Monday signed into law a bill requiring that anti-theft measures be incorporated into all smartphones sold within California. It doesn't specify the particular technologies used to enable that capability, but it does require that the feature, also known as a "kill switch," give smartphone users the ability to remotely disable their devices in the event they're lost or stolen.
NSA Shares Its Data Wealth
August 26, 2014
The United States National Security Agency secretly shares the communications data it has amassed over the years with nearly 24 U.S. government agencies using a search engine resembling Google Search, according to documents released by Edward Snowden. That's more than 850 billion records of phone calls, emails, cellphone locations and Internet chats.
Sony DDoS Attack May Have Been Smokescreen
August 25, 2014
Sony's PlayStation and Sony Entertainment networks were taken down over the weekend by a distributed denial of service attack. The hackers, who call themselves the "Lizard Squad," also forced authorities to divert a plane Sony Entertainment president was on by tweeting that there might be a bomb on board. A hacker with the handle "FamedGod" later claimed responsibility for the DDoS attack.
Twitter Tromps on Spammers
August 25, 2014
Twitter has reported success with its BotMaker spam-prevention system. Because Twitter operates in real time, BotMaker is designed to work fast to eliminate spammers. Its main goals are to bar spam accounts from being created, to reduce the time they spend on Twitter if they do show up, and to reduce Twitter's reaction time in responding to spammer workarounds that bypass its protection systems.
Security Researchers Lay Bare TSA Body Scanner Flaws
August 22, 2014
The U.S. Transportation Security Administration, part of the Department of Homeland Security, has spent more than a billion dollars on full-body scanners designed to strengthen airport security. It turns out that at least one model of scanner in use for four years -- the Rapiscan Secure 1000 full-body scanner -- easily could have been foiled by a savvy bad actor.
It's Time Companies Put Mobile First
August 21, 2014
A growing number of consumers are becoming mobile-first or even mobile-only, so why not businesses? Granted, it is hard to image the company whose computing power and data could be accessed and manipulated only through a mobile device. However, a company that gives mobile the same status and resources as its other IT initiatives? That is a little easier to envision.
Google Gets in a Trusted Stores Encryption Tangle
August 21, 2014
A conflict between Google's push to make the Web more secure and its Trusted Store program may be costing at least one business money. Pegasus Auto Racing Supplies, which encrypts all the pages on its website, reportedly has had its application for Google's Trusted Stores program turned down. Think of the badge as the equivalent of the Good Housekeeping Seal.
Is Open Source an Open Invitation to Hack Webmail Encryption?
August 21, 2014
In a move influenced by Edward Snowden's revelations about the NSA's email snooping, Yahoo and Google last week announced that they were cooperating on end-to-end encrypting their webmail products. While the open source approach has proven its value over and over again, the idea of opening up the code for security features to anyone with eyeballs still creates anxiety in some circles.
The Connected Car, Part 3: No Shortcuts to Security
August 19, 2014
The connected car is becoming a reality, but the gadget-filled roadways it travels will be paved with several options for in-car technologies. These choices pose challenges for carmakers. Whichever technology wins the race, one of the biggest concerns for OEMs is their electronic security. The Linux Foundation wants an open source platform in the pole position.
Mobile App Attacks: No Malware, No Problem
August 19, 2014
Traditional attack methods, like those used with the recent mobile online banking Trojan Svpeng, involve the installation of malware on the device to steal information and commit fraud. However, new techniques are emerging that would enable an attacker to compromise a device and steal private information from the owner -- for example, the typical copycat app on a third-party app store.
Twitter to Review Toothless Policies on Cyberharrassment
August 15, 2014
A deluge of hateful tweets after the suicide of actor Robin Williams earlier this week forced his daughter Zelda to publicly quit Twitter and Instagram. "We will not tolerate abuse of this nature on Twitter," Del Harvey, the company's vice president of trust and safety, said in a prepared statement. Twitter has suspended "a number of accounts related to this issue for violating our rules."
Freedom Act Leaves IT Sector at Risk for Spy Program Costs
August 14, 2014
A recent U.S. Senate proposal to curb the impact of electronic surveillance conducted by the NSA could enhance privacy for citizens and benefit businesses as well. However, major information technology companies that help the government collect telecom and Internet data still will be vulnerable to the substantial costs of working with the NSA, even if the proposed bill becomes law.
Snowden Blows NSA's MonsterMind
August 13, 2014
The NSA is working on a new program codenamed "MonsterMind" that will automate the monitoring of traffic patterns on the Internet to look for attacks, whistleblower Edward Snowden revealed. When it detects an attack, MonsterMind will automatically block it from entering the U.S. cyberinfrastructure. It also will automatically fire back at the server from which the attack was launched.
The Bitcoins Are Coming, the Bitcoins Are Coming
August 13, 2014
The United States Consumer Financial Protection Bureau has issued an advisory warning consumers about the risks of bitcoin and other virtual currencies. The bureau "is working to identify and understand potential consumer protection concerns raised by these emerging technologies to determine what action, if any, may be necessary to protect consumers," said spokesperson Moira Vahey.
Yahoo, Google Team Up to Fight Email Snoops
August 13, 2014
Yahoo and Google last week announced they'd be teaming up to secure their Web mail systems with encryption by the end of next year. "Our goal is to make end-to-end encryption fully available in 2015," said Yahoo Vice President of Information Security Alex Stamos. Yahoo will be releasing the code for its encryption solution to the open source community.
Smartphone Kill Switch Law Reaches California Governor's Desk
August 12, 2014
California is poised to enact a consumer-friendly law requiring smartphone manufacturers to install "kill switches" -- that is, antitheft technology that would be activated by the carrier when a consumer alerts it that a device has been stolen or lost. The technology not only wipes the device of personal data but also renders it inoperable. The state legislature passed the bill on Monday.
The Cavalry Rides Into Auto Industry With Security Proposal
August 12, 2014
A grassroots group calling itself "I Am The Cavalry" has published an open letter to the automotive industry offering its services in ensuring security and safety. "Modern vehicles are computers on wheels and are increasingly connected and controlled by software and embedded devices," the letter reads. New technology "introduces new classes of accidents and adversaries," the group pointed out.
Russian Gang's Credentials Theft Exposes Web's Wild, Wild West Side
August 12, 2014
News that a Russian gang has stockpiled more than a billion purloined user name and password combinations has revved up the Internet's reputation as a post industrial Wild, Wild West. Just how much havoc will be raised by the gang remains to be seen. The data thieves so far appear content to use their ill-gotten trove for spamming, according to Hold Security, which discovered the credential cache.
Taking the Temperature of Java App Security
August 11, 2014
Current approaches to Java application protection place security at the application or the network layer, both of which are problematic. The first approach has proven to be too complex, too time consuming and too risky -- in other words, "too hot." Meanwhile, network level security that consists of perimeter devices lacks the intelligence to know what's going on inside the application.
Carrier Software Flaws Imperil Smartphones: Report
August 08, 2014
Wireless carriers pose a threat to mobile phone security, researchers have disclosed. Mathew Solnik and Marc Blanchou of Accuvant this week told an audience at the Black Hat security conference in Las Vegas that Android, BlackBerry and some iOS devices are vulnerable. The problem lies in a device management tool using the OMA Device Management Standard, which carriers embed into mobile devices.

See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS