Attention Marketers: Access 30 Million IT Decision Makers with ECT News Network's INSTA-LEADS ∑ Click to Learn More!
Welcome Guest | Sign In
Darkcoin Steps Out of the Shadows
October 01, 2014
Darkcoin has exited beta and is now ready for mainstream use. Also, the software's code is now open source. Darkcoin is the first fully open source cryptocurrency with financial privacy built directly into the software, its developers claimed. Open-sourcing financial software is vitally important, they said, because it instills confidence that users' financial privacy is protected.
Consumers Fed Up With Data Breaches
September 30, 2014
Consumers are beginning to lose their patience with the custodians of their personal information. Survey results from 2,000 consumers released last week by HyTrust, suggest that 51 percent of those polled would bolt from any business involved in a data breach that compromised personal information such as address, Social Security number or credit card details.
Banks, Businesses Scramble to Smash Bash Shellshock Bug
September 29, 2014
Banks and businesses toiled over the weekend to crush a bug in a widely used open source operating system. The flaw has been in Unix for some 25 years, but it was revealed just last week. If exploited, the vulnerability could be used to inject malicious code or take command of a system or device. Dubbed "Shellshock," it requires patching systems and devices running Apple's OS X, Linux and Unix.
FBI Director Comey Gives Apple and Google a Tongue-Lashing
September 26, 2014
FBI Director James Comey on Thursday strongly criticized Apple and Google for hardening information stored in smartphones by encrypting data, making it inaccessible to law enforcement even with a court order. The FBI has had conversations with both Apple and Google over the encryption features, Comey said, although he personally was not involved in those talks.
Bash Shellshock Bug Patched but Not Pummeled
September 25, 2014
Researchers on Thursday discovered proof-of-concept code that could take advantage of unpatched computer systems, and found evidence of attacks exploiting the BASH Shellshock bug in the wild. Shellshock, which came to light on Wednesday, could become a major threat to Linux/Unix and Apple operating systems if published patches to BASH are not applied before an attacker cashes in.
Researcher Foils iPhone 6 Touch ID
September 24, 2014
Apple's Touch ID fingerprint scanner is a step up from passcodes for protecting iPhones, but it's far from totally secure. Lookout Mobile Security's Marc Roger, fooled Touch ID on Apple's new iPhone 6 by crafting a false fingerprint from a DIY forgery kit that cost about $200 to assemble. Rogers performed similar experiments when Touch ID was introduced in the iPhone 5s last year.
Banking Trojan Targets Petrochemical Outfits
September 23, 2014
The pernicious program Citadel has been around for awhile, but it's using some new tricks on new targets. From its humble origins as a "man in the browser" thief of banking credentials, Citadel has become a knave of all trades. Once it lands on a computer, it can be configured in a number of ways with a file from a server operated by Web predators.
Phishing Scam Ensnares eBay Shoppers
September 23, 2014
Attackers for months have been using eBay listings to redirect visitors to password-harvesting scam sites. They use cross-site scripting to hijack shoppers and trick them into handing over personal data. Smartphones, televisions, hot tubs and clothing are among the items supposedly for sale in listings infected with malicious Javascript code. eBay reportedly has been slow to address the issue.
Home Depot Gives 56 Million Customers a Heads Up
September 19, 2014
Home Depot on Thursday said it had excised the malware demon from its computerized payment system after its recent discovery of a security breach in which thieves stole records of 56 million credit cards. Home Depot stopped short of admitting that an ongoing security upgrade may have contributed to the breach. Efforts to harden the system with enhanced encryption are under way.
Android L Will Keep Your Secrets Safer
September 19, 2014
Hard on the heels of increased security measures in Apple's newly released iOS 8, Google this week confirmed that encryption will be turned on by default in the next release of Android. Android has offered encryption for more than three years, and keys are not stored off the device, so they can't be shared with law enforcement, Google said. In Android L, encryption will be enabled by default.
Apple Fills iOS 8 Security Basket to Brim
September 19, 2014
With data thefts and cybersnooping making headlines daily, security has started to capture the attention of the disciples of the digital lifestyle -- and if the latest version of iOS is any indication, it's catching the attention of Apple, too. Along with nifty features like Hand Off and Family Sharing, iOS 8 contains a number of significant security and privacy enhancements.
Web-Surfing Adults More Infection-Prone Than Teens
September 16, 2014
American teens spend a lot more time online than older Web surfers, yet it doesn't seem to increase their vulnerability to malicious activity. Teens last year spent a little more than four hours a day on the Net, while adults in the 50-to-64 age bracket burned two hours, 41 minutes online daily, MarketingCharts found. Those numbers piqued the interest of Enigma Software.
XSS Flaw Burns a Hole in Kindle Security
September 16, 2014
Security consultant Benjamin Mussler last week warned that the Kindle e-book library had a cross-site scripting vulnerability. It appears Amazon previously had fixed the XSS flaw but two months ago reintroduced it in a new version of the "Manage Your Kindle" Web application, according to Mussler. People who download pirated e-books are at greatest risk, he said.
Feds Wielded Baseball Bat to Win Yahoo's NSA Cooperation
September 12, 2014
The Obama administration threatened Yahoo with fines of $250,000 daily if it wouldn't comply with demands to hand over user information to the NSA, Yahoo has disclosed. Yahoo had filed suit against the demands in 2007, citing the Fourth Amendment. "They basically said you must do this thing that you don't want to do or we'll put you out of business," said ITIF's Daniel Castro.
DoD Ramps Up Security as It Drifts Toward Cloud
September 12, 2014
DoD is committed to pursuing cloud-based services and steadily has been improving its capabilities to utilize the technology. The latest evidence of its embracing the cloud is approval of a protocol that will facilitate the use of the technology at higher security levels. DISA has granted provisional authorization for the use of cloud services to levels 3 to 5 of its Cloud Security Model.
If Google Were French
September 11, 2014
Europeans are relentlessly attacking Google: A German official called for its breakup, a French minister charged it was a threat to sovereignty, and a publisher compared it to a dragon, according to a report. Really? I would have thought the euro and the draconian austerity program needed to keep it functioning threatened sovereignty more than Google.
Millions of Gmail Users Victims of Latest Password Heist
September 11, 2014
About 5 million Gmail usernames and passwords have been published on a Russian bitcoin security forum as a text file. Sixty percent of the 4.93 million credentials in the file were valid, claimed the poster, who used the online handle "tvskit." The information reportedly was dumped on several Russian cybercrime forums and shared through a variety of peer-to-peer services.
IBM Enlists Intel to Shore Up Hybrid Cloud
September 10, 2014
Despite the growing momentum behind cloud computing in recent times, security concerns have been a drag on adoption. IBM sought to reduce that resistance by announcing on Monday that it would start using Intel chip technology to better secure its SoftLayer cloud platform. The Intel technology can be especially reassuring to enterprises running hybrid clouds.
Salesforce Issues Dyre Warning
September 10, 2014
Salesforce.com this week notified its customers that the Dyre malware, which typically targets customers of large financial institutions, might have been tweaked to target some Salesforce users as well. There was no evidence that any Salesforce customers had been impacted, the company said, but if any customer should be affected, it would provide guidance.
Comcast Ad Tinkering Could Muck Up WiFi Security
September 10, 2014
Comcast has begun using JavaScript injection to serve ads for its services to devices connected to its publicly accessible Xfinity WiFi hotspots across the U.S. The ads are fleeting, but they can appear roughly every seven minutes. The program reportedly began months ago. "This practice is definitely concerning for multiple reasons," said the Electronic Freedom Foundation's Jeremy Gillula.
Botnet Twists the Knife in iCloud Security
September 10, 2014
Hot on the heels of hackers stealing celebrities' nude photos from their iCloud accounts and posting them on the Web comes news that iCloud users are being targeted again. The Kelihos botnet is sending emails purporting to be from Apple, informing targets they have purchased a film through their iTunes account using a PC or other device not previously linked to their Apple ID.
The Dark Side of BYOD
September 09, 2014
The BYOD trend offers pluses for both employers and employees, but sometimes there's a hitch. Under certain circumstances, the owner of a device suddenly might lose all of the data stored on it. Clients of Fiberlink remotely wiped 81,000 mobile devices between January and June. About 30,000 of them, or 37 percent, were cleaned of everything -- including personal data.
Couples Can't Keep Their Hands Off Each Other's Phones
September 08, 2014
Worried about the NSA spying on you? How about online hackers? Truth be told, the greatest threat to your confidential information is a lot closer to you -- namely, your partner. That's what a recent survey of more than 13,000 people in the United States revealed. Avast last week reported its findings. Among them: The majority of women snoop on their men's phones just because they're curious.
Celebrities Are Fools to Use Apple Products
September 08, 2014
"Celebrities are stupid" seems to be the message Apple delivered last week as it attempted to recover from the release of an impressive number of nude pictures of celebrities on the Web. Fans of BlackBerry, which used to be the preferred platform for celebrities, had a field day over this. Apple has the most loyal customer base, but without Jobs, it seems clear it has no clue how to protect it.

See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS