Four Tips for Retailers on How to Prevent Shopping Cart Abandonment
Welcome Guest | Sign In
TechNewsWorld.com
Ransomware Fighters Get New Free Tool
December 7, 2016
Ransomware has become a gold mine for digital criminals. In the first three months of this year, electronic extortionists squeezed $209 million from victims desperate to recover their data after it was scrambled by the malicious software, based on FBI estimates. At that rate, ransomware could funnel as much as $1 billion into criminal coffers this year.
Multinational Effort Halts Malware Avalanche
December 6, 2016
The DoJ on Monday released new details about the multinational takedown of Avalanche, a multimillion-dollar malware and money-laundering network, following a four-year probe led by German police and prosecutors. Assistant Attorney General Leslie R. Caldwell, Acting U.S. Attorney Soo C. Song and Assistant Director Scott S. Smith of the FBI's Cyber Division made the announcement in Pittsburgh.
Gooligan Ransacks More Than 1M Android Accounts
December 2, 2016
More than 1 million Google accounts have been breached by Android malware dubbed "Gooligan," Check Point reported Wednesday. The malware roots infected devices and steals authentication tokens that can be used to access data from various Google apps including Gmail, Google Docs, G Suite and Google Drive. It potentially affects devices running Android 4 and 5.
China's Business-Unfriendly Cybersecurity Stance
November 30, 2016
China's parliament earlier this month passed a law aimed at addressing the country's concerns about hacking and terrorism, which has spiked concerns among foreign businesses and human rights advocates. One interpretation of the new law is that it only codifies China's existing cybersecurity practices. However, 46 global business groups across a variety of industries didn't see it that way.
Facebook Denies Ransomware Infiltration
November 29, 2016
Facebook has denied that its network and Messenger app were being used to spread ransomware to its users, contradicting the claims of a security firm. Two Check Point researchers last week reported they had discovered a new method for delivering malicious code to machines, which they dubbed "ImageGate." Threat actors had found a way to embed malicious code into an image, they said.
Feds Need to Bolster Cyberprotection Speed and Range
November 29, 2016
Providing cybersecurity adequate to meet increasing threats is a perpetual catch-up process. Public sector agencies are particularly sensitive targets, with high visibility not only to the citizens they serve, but also to cyberattackers. A recent survey uncovered both a lack of speed in detecting and responding to attacks, and weak defenses of the full range of possible attack channels.
SF Muni Hack a Wake-Up Call for Public Systems
November 28, 2016
The San Francisco Municipal Transportation Authority, or SF MTA, was hacked on Friday. "You Hacked, All Data Encrypted," was the message reportedly displayed on computer screens at the authority's stations throughout the city. "Contact for Key (cryptom27@yandex.com)ID:681 , Enter." Fare payment machines at underground stations were out of order, resulting in free rides.
$5 PoisonTap Tool Easily Breaks Into Locked PCs
November 25, 2016
Proving once again that you can do a lot of damage with a little investment and a lot of ingenuity, security researcher Samy Kamkar recently managed to take down a locked, password-protected computer using a $5 Raspberry Pi. The low-tech cookie-siphoning intrusion is one of Kamkar's simplest hacks ever. He previously has unlocked car doors, garages, wireless remote cameras and other devices.
Cyber Grinches Could Disrupt Holidays' Biggest Shopping Weekend
November 23, 2016
Recent high-profile distributed denial of service attacks on the Internet's infrastructure and an investigative journalist's website have spiked concerns over possible disruptions of traffic during the biggest online shopping weekend of the year. Online spending last year exceeded $5.8 billion on Black Friday and Cyber Monday, according to Adobe, and that figure is expected to go up this year.
Friend Finder Data Breach Exposes 400M Swingers
November 19, 2016
Hackers have stolen information of more than 400 million users of Friend Finder Networks, which runs several adult dating and pornography websites, LeakedSource reported. This is Friend Finders' second breach in two years. Last year, hackers accessed 4 million accounts, exposing information on users' sexual preferences and extramarital affairs. More than 412 million users were compromised.
iPhone Call Logs Easy Pickings on iCloud, Says Russian Security Firm
November 17, 2016
Russian digital forensics firm ElcomSoft on Thursday reported that Apple automatically uploads iPhone call logs to iCloud remote servers, and that users have no official way to disable this feature other than to completely switch off the iCloud drive. The data uploaded could include a list of all calls made and received on an iOS device, as well as phone numbers, dates and times, and duration.
Google Clamps Down on Sneaky Malicious Sites
November 16, 2016
Sites that repeatedly violate Google's safe browsing policies will be classified as repeat offenders, the company said. A small number of websites take corrective actions after Google displays alerts on their landing pages warning visitors that they're harmful. However, they typically revert to violating the policies after Google verifies that they're safe and removes the warnings.
Conspiracy Theories in the Information Age, Part 2
November 15, 2016
In the past, heightened rhetoric and propaganda were the tools of choice for those looking to convince an electorate to vote them into office, and conspiracy theories were their bane. This election season has seen the rise of a new form of persuasion, one that's unique to the Information Age. For months, WikiLeaks creator Julian Assange had promised to rain bombshells.
Why Trump May Be the Better Technology President
November 14, 2016
Years ago, I worked as one of Rev. Robert Schuller's body guards (it was something to do on Sundays, I wasn't particularly religious) and one of his sayings was "when given lemons, make lemonade." Personally, I wasn't excited about either presidential candidate, but I actually think Trump could be a better technology candidate than Clinton would have been.
Defeating Malware With Its Own DNA
November 11, 2016
It's widely known that human DNA evidence has had a major impact in the criminal justice system. Now another kind of DNA may have a similar impact in the fight to eradicate malicious software. Malware DNA, also known as "malware provenance," is the art and science of attributing elements of one object to another object. The technique has applications outside information security -- for example, in genetics, or to test the authorship of student papers.
Election Day Cybershenanigans Highlight Need to Shore Up Security
November 10, 2016
Hackers last week launched DDoS attacks against both presidential candidates' campaign websites. The attacks were routed through HTTP Layer 7 of the OSI protocol. There were at least four 30-second attacks reported. "The websites were not penetrated by a cyberintrusion," said John Costello, a senior analyst at Flashpoint. The attackers were unsophisticated hackers and not a nation-state.
Russia's Fancy Bear Attacks Microsoft, Adobe as Election Nears
November 4, 2016
Microsoft earlier this week said it had fallen victim to "Strontium," its code name for the Russian hacking group also known as "Fancy Bear," which has been linked to recent attacks on Democratic Party systems. The group launched a spear phishing attack that targeted vulnerabilities in both the Windows operating system and Adobe Flash, according to Microsoft EVP Terry Myerson.
Microsoft: Google's Policy Endangers Windows Users
November 1, 2016
Google on Monday posted to the Internet a previously unpublicized flaw that could pose a security threat to users of the Microsoft Windows operating system. Google notified both Microsoft and Adobe of zero day vulnerabilities in their software on Oct. 21, wrote Neel Mehta and Billy Leonard, members of Google's Threat Analysis Group, in an online post.
Bot Armies Boost Candidates' Popularity on Twitter
October 29, 2016
Internet bots have many useful online purposes, but they have a dark side, too, as three researchers demonstrated in their analysis of Twitter traffic during the first presidential debate between Hillary Clinton and Donald Trump. Bots are used to automate functions on the Net. For example, if you belong to several social networks, you could use a bot to post a photo to all of them at once.
Tech on TV: A Little Realism Goes a Long Way
October 27, 2016
Watching TV shows often requires the suspension of disbelief -- that is, a willingness to press pause on one's critical faculties in order to believe the unbelievable. Realism often must be secondary to story, in other words. This very often is necessary when computers are used to advance plot lines, when programmers and hackers alike can produce tremendous results in seconds.
Social Media Analytics, Meet Big Brother
October 26, 2016
The ACLU recently uncovered evidence that led Twitter, Facebook and its Instagram subsidiary to stop sharing data with Geofeedia, a firm accused of improperly collecting social media data on protest groups, and sharing that information with numerous law enforcement agencies. Geofeedia, a developer of location-based analytics, had been marketing its technology to law enforcement agencies.
Antique Kernel Flaw Opens Door to New Dirty Cow Exploit
October 25, 2016
A Linux security vulnerability first discovered more than a decade ago once again poses a threat, Red Hat warned last week, as an exploit that could allow attackers to gain enhanced privileges on affected computers has turned up in the wild. Users need to take steps to patch their systems to prevent the exploit, known as "Dirty Cow," from granting access to unprivileged attackers.
DDoS Attack Causes Waves of Internet Outages
October 22, 2016
Hundreds of websites -- including those of biggies such as Netflix, Twitter and Spotify -- on Friday fell prey to massive DDoS attacks that cut off access to Internet users on the East Coast and elsewhere in the U.S. Three attacks were launched over a period of hours against Internet performance management company Dyn. The first attack started at about 7:10 a.m. EDT.
Assange Lives to Leak Another Day
October 19, 2016
The status of WikiLeaks founder Julian Assange grew a bit murky on Tuesday after the group accused the U.S. State Department of pressuring Ecuadorian officials to block him from posting additional emails linked to presidential candidate Hillary Clinton. The Ecuadorian foreign ministry on Tuesday acknowledged restricting Assange's access, saying it did not wish to interfere in a foreign election.
This Election May Be Scarier Than You Think
October 17, 2016
Not that it isn't scary enough -- but if you look at both candidates, who have had their images destroyed largely by technology, i.e., tapes and emails -- there is a huge warning inherent in the process. Email really wasn't a big thing until the late 1990s and even having your own email server wouldn't have been likely before 2005, let alone thinking through the security aspects.
What Should be on the Next President's Cyberagenda?
October 14, 2016
When the new president takes up residence at 1600 Pennsylvania Ave., cybersecurity will be on the shortlist for action. TechNewsWorld asked more than a dozen experts what should be at the top of the new leader of the free world's cyberagenda. Following are some of their responses. "The president has to set the tone early on cybersecurity within the first 100 days," said Cybereason's Sam Curry.
US Considers 'Proportional Response' to Russia's Election Tampering
October 13, 2016
The Obama administration on Tuesday indicated it was considering a proportional response to retaliate against Russia for its efforts to influence the U.S. election process. The administration has officially linked Russian operatives to a series of cyberattacks against the Democratic National Committee and other organizations, apparently in an effort to influence the November presidential race.
Odinaff Trojan Targets Banks, Financial Firms Worldwide
October 12, 2016
Symantec on Tuesday reported on a malware campaign that has targeted financial organizations worldwide for the past 10 months. Dubbed "Trojan.Odinaff," it has infiltrated the banking, securities, trading and payroll sectors, as well as organizations that provide them with support services. Odinaff is used in the first stage of an attack, to get a foothold into a network.
Yahoo Makes It Harder for Email Users to Jump Ship
October 11, 2016
Yahoo in recent days disabled autoforwarding for Yahoo Mail -- and in at least one corporate client's case, it disabled the webmail deletion feature. The autoforwarding feature "is under development," reads a statement on the Yahoo site. "While we work to improve it, we've temporarily disabled the ability to turn on Mail Forwarding for new forwarding addresses."
Insulin Pump Susceptible to Hacking
October 7, 2016
Medical device manufacturer Animas on Tuesday warned that its OneTouch Ping insulin pump system was susceptible to hacking. "We have been notified of a cybersecurity issue with the OneTouch Ping, specifically that a person could potentially gain unauthorized access to the pump through its unencrypted radio frequency communication system," reads the company's letter to users of the device.
See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS
Is fake news a major problem?
Yes -- people don't know which news to trust.
No -- it's very easy to spot.
Yes -- it's propaganda warfare, and the U.S. is losing.
No -- people have always believed what suited them.
Yes -- but only temporarily, as people are catching on.
No -- much of it actually isn't fake.