OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
LinuxInsider.com
Super-Scary Android Flaw Found
July 28, 2015
Zimperium on Monday revealed a stunning discovery by researcher Joshua Drake -- a flaw in Android's Stagefright media playback engine that could expose millions of mobile device users to attack without their having done anything. Stagefright, which processes several popular media formats, is implemented in native code -- C++ -- which is more prone to memory corruption than some other languages.
Hackers Take Hijacked Jeep Cherokee for Joyride
July 23, 2015
White-hat hackers Charlie Miller and Chris Valasek remotely took over a Jeep Cherokee, ran its controls, then cut the transmission as it sped at 70 mph along Interstate 64 in an experiment conducted with Wired. They turned on the air conditioning, switched radio channels, turned on the windshield wipers, activated the windshield washer fluid pump, and transmitted a photo of themselves.
Philanderers, Scarlet Women Cower After Ashley Madison Hack
July 21, 2015
About 40 million swingers and sexual sophisticates have been whimpering in fear since hearing Sunday's news that hackers broke into the servers of Avid Life Media, the parent company of online cheating site Ashley Madison. The hackers reportedly stole large caches of personal data after breaking into the servers hosting Ashley Madison and related sites Cougar Life and Established Men.
Swipes, Taps and Cursor Movements Can Foil Cyberthieves
July 16, 2015
Swipes, taps, cursor movements and other ways of interacting with electronic devices can be used to protect online merchants from Net fraudsters. Many people are familiar with biometric authenticators like irises, fingerprints and voices, but it turns out that how we behave with our machines, including typing speed and the use of keyboard shortcuts, can authenticate our identities, too.
Flash Furor Grows Despite Adobe's Latest Fix
July 15, 2015
Three new vulnerabilities in Adobe Flash Player have been reported over the past two weeks, triggering a storm of protest and leading Mozilla and Google to ban the plug-in from their Firefox and Chrome browsers. "It is time for Adobe to announce the end-of-life date for Flash and to ask the browsers to set killbits on the same day," Facebook CSO Alex Stamos tweeted Sunday.
Apple Gives Fans a Taste of New OSes
July 10, 2015
Apple on Thursday released to consumers a preview of the latest versions of its mobile and desktop operating systems -- iOS 9 and OS X El Capitan -- which contain a number of new features, including a revamped two-factor authentication scheme. The latest release of iOS also contains two new smart folders. One collects selfies, and the other aggregates screen shots.
Gunpoder Malware Masquerades as Lesser Evil
July 9, 2015
Palo Alto Networks' Unit 42 team on Tuesday published a report on Gunpoder, a family of Android malware that can evade detection scans by pretending to be adware. Cong Zheng and Zhi Xu authored the report. The team discovered the new Android malware last November. Its new report aims to spur cooperation within the security community to mount defenses against the threat.
New Android Malware Sprouting Like Weeds
July 1, 2015
Information stored on an Android smartphone or tablet is vulnerable to almost 4,900 new malware files each day, according to a report G Data SecurityLabs released Wednesday. Cybercriminals' interest in the Android operating system has grown, the firm's Q1 2015 Mobile Malware Report revealed. The number of new malware samples in the first quarter increased 6.4 percent.
The Encryption Software Scuffle
June 29, 2015
In the face of encryption that could block brute force attempts for years, law enforcement agencies at every level have been calling for keys that allow investigators to crack open smartphones and court cases alike. Some of the world's leading tech companies and privacy advocates have called for the White House to stand against any proposal to weaken the security software on consumer products.
Samsung Jams Up Windows Security Updates
June 25, 2015
Samsung has been disabling Windows updates by means of an executable file, Disable_Winduwsupdate.exe, that is part of its SW Update software. The issue came to light on Tuesday, when Microsoft MVP Patrick Barker published a blog post about his discovery when helping a user who was having problems. It seemed that Windows Update kept getting disabled.
Will LastPass Breach Poison Trust in Password Managers?
June 25, 2015
A data breach is no picnic for any organization, but for a company that makes its potato salad by protecting other people's passwords, it's the mother of all nightmares. Yet, that has happened to LastPass twice. In 2011, the service found anomalies in its network traffic that forced it to reset all its users' master passwords. Recently, it came under attack again.
AT&T, Verizon and WhatsApp Flunk Privacy
June 22, 2015
An Electronic Frontier Foundation survey published last week gave AT&T, Verizon and WhatsApp the thumbs down when it comes to protecting user privacy. Google and Twitter also got a black eye. The five were among 24 companies the EFF evaluated on criteria worked out over the past four years. WhatsApp, now owned by Facebook, also took criticism in the EFF's fifth annual report, "Who Has Your Back?"
Routers Becoming Juicy Targets for Hackers
June 18, 2015
Most consumers pay as much attention to routers as they do to doorknobs. That's not the case with Net marauders. They're finding the devices ripe targets for mischief. "We've seen a big increase in malware designed for home routers," said Incapsula researcher Ofer Gayer. "Every week, we see a new vulnerability in a vendor's routers," he said. "They're low-hanging fruit if you're a hacker."
Swiftkey Security Slipup Exposes Samsung Smartphones
June 17, 2015
At least 600 million Samsung smartphones are vulnerable to remote attacks because of the way the company implemented the SwiftKey keyboard, NowSecure researcher Ryan Welton warned Tuesday. A phone can be attacked if it's connected to a compromised or malicious WiFi network and the SwiftKey app is updating existing languages or adding a new language pack.
San Jose to Dabble With Smart City Tech
June 16, 2015
The city of San Jose, California, recently decided to undertake an Internet of Things pilot project. Under a deal finalized last month, anyCOMM, will deploy WiFi sensors on 166 streetlights, to collect data on traffic, sense movement on the streets, turn off streetlights when sidewalks and roads are empty, detect ground shifts and send earthquake warnings, and act as WiFi hotspots.
Patch Tuesday Sunset Will Be a Mixed Bag for Windows Security
June 11, 2015
Microsoft will phase out Patch Tuesday -- its monthly potpourri of software product fixes -- when it rolls out Windows 10, which could be a mixed bag for the operating system's security. Patches will be applied automatically as they're ready. That means users no longer will have to wait until the second Tuesday in the month to secure their systems from potentially troublesome vulnerabilities.
US CIO Orders Federal Websites to Get More Secure
June 10, 2015
U.S. federal CIO Tony Scott on Monday sent a memo to the heads of executive departments and agencies requiring that all publicly accessible federal websites and Web services use HTTPS -- "the strongest privacy and integrity protection currently available for public Web connections." Some federal websites currently use HTTPS, but there has not been a consistent policy across the federal government.
Pega Healthcare CRM Promises 360-Degree View
June 9, 2015
Pega last week announced enhancements to Pegasystems Customer Service for Healthcare, an application that integrates customer service and care management to provide a 360-degree view of all customer interactions. The application provides call center agents with data across administrative, health and care management interactions with the goal of enabling them to provide better service.
OPM Security Was a Data Breach Waiting to Happen
June 9, 2015
Things could get worse before they get better as the FBI, US-CERT and Office of Personnel Management investigate a data breach that may have compromised the personal information of some 4 million current and past federal employees. Additional exposures of personal identifying information could be discovered, officials have warned. The OPM made the breach public last week.
BitTorrent's Bleep Hides Messages From Prying Eyes
June 4, 2015
BitTorrent's Bleep, a secure peer-to-peer messaging service, last month reached the end of its third trimester in alpha testing, and an official version became available for iOS, Android, OS X and PC. The official release is the first to reach iOS. Bleep's Whisper feature enables ephemeral messaging, along with the service's cloudless, end-to-end encrypted calling function.
Google's Android Permissions Get Granular
June 4, 2015
Google appears to be heeding warnings of security experts who say Android users need better control over what apps do with information from their phones. At I/O, its worldwide shindig for developers held last week, the company announced that the next version of its mobile operating system, Android M, would take a more granular approach to permissions for data requested by apps.
Google Creates One-Stop Privacy and Security Shop
June 2, 2015
Google has rolled out "My Account," a hub that lets users manage their Google settings, along with a new site that answers questions about its privacy and security practices. In addition to letting users manage their password and account-access settings, My Account allows them to review their security settings and activity. My Account also lets users manage personal information about themselves.
Feds' Photobucket Strategy Could Hobble White Hats
June 2, 2015
There's a new twist in the way feds are seeking to penalize bad actors for making and distributing software used in crimes, suggest recent arrests by Justice Department and FBI officials. "There's a more concerted campaign to go after go after those folks who are distributing in the underground," said Tom Kellermann, chief cybersecurity officer at Trend Micro.
FBI to Dig Into IRS Data Breach Debacle
May 29, 2015
The United States Federal Bureau of Investigation is looking into a hack of the U.S. Internal Revenue Service that led to personal data being stolen from at least 100,000 taxpayers' accounts of the 200,000 that were hit. The hackers got the data by accessing the Get Transcript application, which lets taxpayers download data they filed with the service, the IRS announced Tuesday.

See More Articles in Consumer Security Section >>
Facebook Twitter LinkedIn Google+ RSS
Do video cameras make the world safer?
Yes - People exercise more restraint because of them.
No - We just get to see more horrible things happen.
Maybe - They might deter some kinds of crime.
Tech News Alerts from ECT News Network