Attention Marketers: Access 30 Million IT Decision Makers with ECT News Network's INSTA-LEADS Click to Learn More!
Welcome Guest | Sign In
TechNewsWorld.com
Feds Wielded Baseball Bat to Win Yahoo's NSA Cooperation
September 12, 2014
The Obama administration threatened Yahoo with fines of $250,000 daily if it wouldn't comply with demands to hand over user information to the NSA, Yahoo has disclosed. Yahoo had filed suit against the demands in 2007, citing the Fourth Amendment. "They basically said you must do this thing that you don't want to do or we'll put you out of business," said ITIF's Daniel Castro.
DoD Ramps Up Security as It Drifts Toward Cloud
September 12, 2014
DoD is committed to pursuing cloud-based services and steadily has been improving its capabilities to utilize the technology. The latest evidence of its embracing the cloud is approval of a protocol that will facilitate the use of the technology at higher security levels. DISA has granted provisional authorization for the use of cloud services to levels 3 to 5 of its Cloud Security Model.
Apple Pay Could Slam Door on Data Thieves
September 11, 2014
Despite the efforts of some big name tech players, consumers have been reluctant to turn their smartphones into wallets. That could be about to change with Apple Pay. Apple Pay is the new mobile payment system Apple introduced with its iPhone 6 and 6 Plus earlier this week. "Apple being Apple is going to change the game," said Christopher Budd, threat communications manager at Trend Micro.
If Google Were French
September 11, 2014
Europeans are relentlessly attacking Google: A German official called for its breakup, a French minister charged it was a threat to sovereignty, and a publisher compared it to a dragon, according to a report. Really? I would have thought the euro and the draconian austerity program needed to keep it functioning threatened sovereignty more than Google.
Millions of Gmail Users Victims of Latest Password Heist
September 11, 2014
About 5 million Gmail usernames and passwords have been published on a Russian bitcoin security forum as a text file. Sixty percent of the 4.93 million credentials in the file were valid, claimed the poster, who used the online handle "tvskit." The information reportedly was dumped on several Russian cybercrime forums and shared through a variety of peer-to-peer services.
IBM Enlists Intel to Shore Up Hybrid Cloud
September 10, 2014
Despite the growing momentum behind cloud computing in recent times, security concerns have been a drag on adoption. IBM sought to reduce that resistance by announcing on Monday that it would start using Intel chip technology to better secure its SoftLayer cloud platform. The Intel technology can be especially reassuring to enterprises running hybrid clouds.
Salesforce Issues Dyre Warning
September 10, 2014
Salesforce.com this week notified its customers that the Dyre malware, which typically targets customers of large financial institutions, might have been tweaked to target some Salesforce users as well. There was no evidence that any Salesforce customers had been impacted, the company said, but if any customer should be affected, it would provide guidance.
Comcast Ad Tinkering Could Muck Up WiFi Security
September 10, 2014
Comcast has begun using JavaScript injection to serve ads for its services to devices connected to its publicly accessible Xfinity WiFi hotspots across the U.S. The ads are fleeting, but they can appear roughly every seven minutes. The program reportedly began months ago. "This practice is definitely concerning for multiple reasons," said the Electronic Freedom Foundation's Jeremy Gillula.
Botnet Twists the Knife in iCloud Security
September 10, 2014
Hot on the heels of hackers stealing celebrities' nude photos from their iCloud accounts and posting them on the Web comes news that iCloud users are being targeted again. The Kelihos botnet is sending emails purporting to be from Apple, informing targets they have purchased a film through their iTunes account using a PC or other device not previously linked to their Apple ID.
The Dark Side of BYOD
September 09, 2014
The BYOD trend offers pluses for both employers and employees, but sometimes there's a hitch. Under certain circumstances, the owner of a device suddenly might lose all of the data stored on it. Clients of Fiberlink remotely wiped 81,000 mobile devices between January and June. About 30,000 of them, or 37 percent, were cleaned of everything -- including personal data.
Couples Can't Keep Their Hands Off Each Other's Phones
September 08, 2014
Worried about the NSA spying on you? How about online hackers? Truth be told, the greatest threat to your confidential information is a lot closer to you -- namely, your partner. That's what a recent survey of more than 13,000 people in the United States revealed. Avast last week reported its findings. Among them: The majority of women snoop on their men's phones just because they're curious.
Can Cook Stir Up That Old Black Magic?
September 08, 2014
Excitement is mounting as the countdown to Apple's mysterious Tuesday event ticks away. Apple is widely expected to unveil two new iPhones -- one in the usual smartphone form factor and the other a phablet. There's also a good deal of anticipation for an iWatch or other stylish wearable that will kick the sector into high gear. Some expect Apple to go full blast into the healthcare industry.
Celebrities Are Fools to Use Apple Products
September 08, 2014
"Celebrities are stupid" seems to be the message Apple delivered last week as it attempted to recover from the release of an impressive number of nude pictures of celebrities on the Web. Fans of BlackBerry, which used to be the preferred platform for celebrities, had a field day over this. Apple has the most loyal customer base, but without Jobs, it seems clear it has no clue how to protect it.
Apple's Cook Promises Feeble iCloud Security Upgrades
September 05, 2014
Apple is taking steps to improve security in the wake of the furor generated by hackers' posting nude photos of celebs on the Internet, CEO Tim Cook said. Apple will alert users via email and push notifications when someone tries to restore iCloud data to a new device. It already does this when someone tries to change an account password or when a device first logs in to an account.
Bad News Hounds Apple Days Before iPhone Gala
September 05, 2014
Apple has been forced to do some serious damage control when it no doubt would rather be rallying fans for its big iPhone launch next week. The company on Tuesday learned that a number of celebrity accounts on its iCloud service had been cracked and some embarrassing photos posted. Then two activist groups on Thursday released a report critical of work conditions at an Apple supplier in China.
We Can Fly to the Moon, but We Can't Secure the Cloud?
September 04, 2014
The entire freaking tech industry is falling down on the job, and Apple, my favorite company in the world, is stumbling around too. What's worse is that it doesn't seem to care. Apple is the most profitable consumer tech company in the world, with billions of dollars in the bank. Yet the company can't seem to be bothered to imagine how easily iCloud user accounts could be compromised.
Sizing Up the Cloud's Risks
September 04, 2014
The iCloud security issue that's been in the headlines all week should be a great big wake-up call to everyone. The cloud is coming; however, we are still in the very early days. Security threats keep growing, so it is important for both individuals and companies to be prepared. The news this week suggested an iCloud security flaw allowed private nude photos to be stolen.
Home Depot All But Confirms Doozy of a Data Breach
September 03, 2014
Home Depot may have experienced a massive security breach -- possibly on a greater scale than last year's Target breach, which affected an estimated 110 million people. Home Depot said it was investigating the possibility, following security researcher Brian Krebs' Tuesday alert. It appears the perpetrators are the same hackers responsible for the data breaches at Target and elsewhere.
Admins Grapple With Shadow Tech
September 03, 2014
If you want to see an IT pro twitch, bring up Shadow IT in a conversation. "Shadow IT" is a term applied to technology deployed by an organization's users outside the purview of the IT department. It's bothersome to system shepherds because it can open up an organization to data leakages. It's also growing. Many Shadow IT programs run in the cloud, but all clouds are not created equal.
Other Shoe Drops in CyberVor Hack Attack
September 02, 2014
Domain name registrar Namecheap on Monday reported that it was besieged Sunday night by cyberattackers who employed username and password data possibly stolen by the so-called CyberVor hacker gang. "CyberVor" is the name Hold Security used last month when it reported the theft of 1.2 billion online credentials. However, the "vast majority" of the malicious login attempts were unsuccessful.
Victimized Celebs Blamed for Their Indecent Exposure
September 02, 2014
Apple on Tuesday issued a statement blaming the posting online of more than 100 celebrities' photos in various stages of dishabille on a highly targeted hack attack to gain access to their usernames, passwords and answers to security questions. None of the cases investigated resulted from any breach in the company's systems, including iCloud or Find my iPhone, Apple maintained.
Russian Hackers Sack US Banks: Report
August 29, 2014
Hackers appear to have stolen data from JPMorgan Chase and at least one other U.S. bank in retaliation for economic sanctions against Russia. The raid on the banks' computer systems reportedly resulted in the theft of gigabytes of sensitive data. JPMorgan did not confirm the incident. However, the FBI is conducting an investigation into reports of cyberattacks on U.S. banks.
Hacker Attacks on Healthcare Providers Jump 600 Percent
August 28, 2014
The recent data breach at Community Health Systems, in which Chinese hackers stole the personal information of 4.3 million patients, was another sign of a disturbing trend: Healthcare providers are coming under cyberattack at an alarming rate. "We've seen a 600 percent increase in attacks on the healthcare sector in the last 10 months," said Carl Leonard, senior manager at Websense Security Labs.
California Lays Down the Kill-Switch Law
August 27, 2014
Gov. Jerry Brown on Monday signed into law a bill requiring that anti-theft measures be incorporated into all smartphones sold within California. It doesn't specify the particular technologies used to enable that capability, but it does require that the feature, also known as a "kill switch," give smartphone users the ability to remotely disable their devices in the event they're lost or stolen.

See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS