Welcome Guest | Sign In
900 Million Androids Could Be Easy Prey for QuadRooter Exploits
August 9, 2016
Four newly identified vulnerabilities could affect 900 million Android devices, Check Point researchers disclosed. The vulnerabilities, which the researchers dubbed "QuadRooter," affect Android devices that use Qualcomm chipsets. They exist in the chipset software drivers. The drivers, which control communications between chipset components, are incorporated into Android builds.
Apple to Enlist the Aid of a Few Good Hackers
August 6, 2016
Apple has introduced its first bug bounty program, set to launch in September. Ivan Krstic, head of Apple security engineering and architecture, announced the program at the Black Hat security conference in Las Vegas. The focus reportedly is on an exceptionally high level of service, and on quality over quantity. Participation in the program initially will be by invitation only.
Alexa Takes On Smart Home Security Responsibilities
August 5, 2016
Millions of customers using Amazon's Alexa voice assistant technology now can add locks that can be controlled remotely to the growing ecosystem of smart home capabilities. August Home last week announced that Amazon's line of voice-assisted products, including the Echo, now support its smart products, allowing users to lock and unlock their doors using voice commands.
Samsung Hones Galaxy Note7 to a Fine Point
August 4, 2016
Samsung on Tuesday unveiled its latest flagship smartphone, the Galaxy Note7. It has an iris-scanning feature that combines with Samsung Knox for security, as well as a fingerprint scanner. The Galaxy Note7 has a water resistant body, a 5.7-inch QHD Super Amoled screen with a front-to-back symmetrical dual-edged curve, HDR video-streaming capabilities for immersive entertainment.
Windows 10 Is About to Get More Secure, Easier to Use
August 1, 2016
Microsoft is poised to roll out its Windows 10 Anniversary Update on Tuesday. The free update includes two security innovations for individual customers: Windows Hello for apps and websites; and Windows Defender. Enterprises will get Windows Defender Advanced Threat Protection, which detects, investigates and responds to advanced malicious attacks on networks; and Windows Information Protection.
KeySniffer Follows the Scent of Cheap Wireless Keyboards
July 29, 2016
A vulnerability in inexpensive wireless keyboards lets hackers steal private data, Bastille reported this week. The vulnerability lets hackers use a new attack the firm dubbed "KeySniffer" to eavesdrop on and capture every keystroke typed from up to 250 feet away. The stolen data is rendered in clear text. It lets hackers search for victims' credit card information, passwords and more.
The Wonderful, Worrisome World of Self-Driving Cars
July 29, 2016
There seem to be warning stickers for everything. There may soon be a new sticker for the autonomous car era: "Warning: Self-Driving Cars Get Hacked." Despite all the positive news about self-driving cars, there is a darker side to this story that's very important. It's one that can be particularly frightening if you happen to be riding in an autonomous car when it gets hacked.
Public-Private Team Leads Assault on Ransomware
July 28, 2016
Ransomware has become a scourge on the Internet -- but two information security companies, along with a pair of law enforcement agencies, this week launched an initiative to do something about it. No More Ransom is the centerpiece of a collaborative effort involving Kapersky Lab, Intel Security, the Dutch National Police and Europol. The new portal aims to educate the public about ransomware.
BlackBerry Offers Android Users a Secure New Smartphone
July 27, 2016
BlackBerry on Tuesday made a play for security-conscious Android users with the announcement of its new DTEK50. Running Android 6.0 Marshmallow and BlackBerry security software, the new unit is the "most secure Android smartphone" in the world, the company claimed. Many Android users have concerns about the their phone's security, according to a recent survey.
New Office 365 Features Help Build a Better Research Paper
July 27, 2016
Microsoft on Tuesday announced a slew of cloud-powered intelligent services in Office 365 apps that aim to assist research and writing efforts. Researcher lets users access the Bing Knowledge Graph to find and incorporate sources and content for research papers without leaving Word. Editor uses machine learning and national language processing, combined with input from Microsoft's linguists.
Civil Rights Office Issues Ransomware Guidance
July 22, 2016
Ransomware infections are on the rise, and healthcare organizations are ripe targets, which may be why the federal government addressed the subject last week. Ransomware attacks have risen from about 1,000 a day last year to 4,000 a day this year, Symantec has reported. Many of those attacks are for small change, but some of the larger ones have been directed at healthcare providers.
Snowden Puts His Mind to Designing Spy-Proof Smartphone Cases
July 21, 2016
NSA whistle-blower Edward Snowden and noted hacker Andrew "Bunnie" Huang on Thursday published a paper on their collaboration to design a smartphone case that will protect user privacy. The pair developed a prototype compatible with the 4.7-inch iPhone 6, as it's "driven primarily by what we understand to be the current preferences and tastes of reporters," the paper states.
Twitter Lets Anyone and Everyone Apply for a Blue Badge
July 20, 2016
Twitter on Tuesday announced it has opened up the application process for verified account status, which previously was reserved for celebrities and other high-profile users. Any user may now file an online application to have an account verified. Twitter account verification, denoted by a blue badge icon, flags individuals and organizations as authentic, the company explained.
Google Transparency Report Shows Government Data Demands Rising
July 20, 2016
The number of government requests to Google for citizens' personal data rose in the second half of 2015, according to the company's latest Transparency Report, released Monday. The number has been trending upward for the past few years as the number of people connected to the Internet has increased. The growth also coincides with almost-daily reports of terrorist attacks.
The Internet of Medical Things, Part 3: Safety First
July 20, 2016
Though quick to capitalize on connected health devices and the coming Internet of Medical Things, hardware manufacturers may be moving too slowly when it comes to building the necessary protections into the back end. The National Security Agency last month told participants in a defense technology summit in Washington that it was looking into hacking connected medical devices.
Hackers Claim Credit for Pokemon Go No-Go
July 19, 2016
Pokemon Go, the augmented reality overnight sensation, experienced sluggish performance over the weekend, possibly from a hacker attack on its login servers. Shortly after Pokemon Go devs tweeted that the game was rolling out to 26 additional countries, this tweet appeared: "Trainers! We have been working to fix the server issues. ... We'll post an update soon."
Congressional Committee Report Finds Something Rotten at FDIC
July 18, 2016
Officials at the U.S. Federal Deposit Insurance Corporation, which insures deposits in U.S. banks, made false statements to Congress and failed to make timely notification of serious cybersecurity breaches, according to a U.S. House of Representatives Committee on Science, Space and Technology's interim staff report. FDIC CIO Lawrence Gross has created a toxic work environment, it also says.
Pokemon Go Devs Scramble to Fix Big Privacy Goof
July 14, 2016
Just days after Pokemon Go sent Nintendo shares soaring in Tokyo, the game's developers were scrambling to close a massive privacy hole. The iOS version of the mobile game -- which superimposes figures onto real-world environments through augmented reality technology -- apparently had a default setting that required users to grant broad permissions to access their Google accounts.
Facebook Lets Messenger Conversations Go Dark
July 13, 2016
Facebook last week said it would begin testing long anticipated end-to-end encryption capabilities in its Messenger app, enabling users to have secret conversations. The new level of security means that a message will be visible only to the sender and the recipient -- Facebook won't even be able to read it. Users can set a timer to limit the amount of time that a message remains visible.
Mobile Ransomware Has Mushroomed: Report
July 8, 2016
The number of mobile ransomware victims across the globe has increased fourfold compared to a year ago, suggests a Kaspersky Lab report. Kaspersky software protected 136,532 users targeted by ransomware from April 2015 to March 2016 -- up from 35,413. "The growth curve may be less than that seen for PC ransomware, but it is still significant enough to confirm a worrying trend," the report notes.
Feds Probe Philanderers' Site Ashley Madison: Report
July 6, 2016
The United States Federal Trade Commission reportedly has launched an investigation into philanderers' dating site Ashley Madison. The company, which suffered a massive data breach last year that resulted in extortion attempts and ruined lives, as well as class-action lawsuits, earlier this week announced that it hired a new CEO and a new president in April.
HummingBad Mucks Up Android's Works
July 6, 2016
More than 85 million Android devices worldwide have been taken over by the Yingmob, a group of China-based cybercriminals who created the HummingBad malware, according to Check Point. HummingBad establishes a persistent rootkit on Android devices, generates fraudulent ad revenue, and installs additional fraudulent apps. HummingBad reportedly has been generating revenue of $300,000 a month.
Pichai Account Trespassers Claim Their Hacking Heart's in the Right Place
June 29, 2016
Hackers late Sunday broke into CEO Sundar Pichai's Quora account and through it accessed his Twitter followers, according to reports. The group taking credit for the breach, OurMine Security, previously hit other prominent high-tech figures, including Facebook CEO Mark Zuckerberg, Spotify CEO Daniel Elk, Amazon CTO Werner Vogels and former Twitter CEO Dick Costolo.
Google Makes It Easier to Do the 2-Step
June 21, 2016
Google on Monday began rolling out a new two-step authentication feature, Google Prompt, targeting enterprise employees. The new option consists of a pop-up that displays a mobile user's name and profile image, and that specifies the location and device involved in the attempted sign-in. The device owner is asked whether to allow or deny the sign-in.
Crime Pays: Ransomware Bosses Make $90K Annually
June 14, 2016
If crime doesn't pay, Russian ransomware bosses wouldn't know it. The average Russian ransomware boss makes $90,000 a year -- or 13 times the average income for citizens in the country who stick to the "straight and narrow," according to a recent Flashpoint study. What does a ransomware honcho do for those rubles? Basically, the job calls for supporting and maintaining the malware.
Twitter Users Snared in Dark Web's Brisk Password Trade
June 10, 2016
Data stolen from more than 32 million Twitter users has been offered for sale on the dark web for 10 bitcoin, or around $5,800, LeakedSource reported Wednesday. LeakedSource has added the account and email information to its searchable repository of compromised credentials. The data set came from someone who has been connected to other large collections of compromised data.
Hacks Highlight Zuckerberg's Cavalier Attitude Toward Security
June 7, 2016
Facebook top dog Mark Zuckerberg had several of his social media accounts breached and defaced, according to reports that surfaced Sunday. Zuckerberg's Twitter, LinkedIn and Pinterest memberships were hacked, but evidence of the attacks quickly disappeared. In addition to requiring passwords, Twitter and LinkedIn protect their accounts with optional two-factor authentication.
Banking Trojans Take Backseat to Ransomware
June 4, 2016
The banking trojan -- a type of malware used to steal credentials for bank accounts -- has been a staple of cyberthieves for years. However, ransomware, which has proven both easy to use and highly successful, has started eroding its popularity. In a typical banking trojan attack, a robber mounts a phishing campaign to entice a target to open an attachment or click on a link.
Myspace Crowned King of Mega Breaches, With More Likely to Come
June 1, 2016
Myspace and Tumblr this week emerged as the latest in a string of mega breaches that resulted in the theft of millions of user IDs -- not just recently but years ago. "Over the period of this month, we've seen an interesting trend of data breaches," wrote security researcher Troy Hunt, operator of the Have I Been Pwned website. "To see a cluster of them appear together is quite intriguing."
Google's Abacus May Count Out Passwords
May 24, 2016
By the end of the year, Android devs will be able to use a trust API from Google's Project Abacus in their apps, Google ATAP Director Dan Kaufman suggested at last week's I/O conference. The API, which will run in the background continually, is aimed at doing away with passwords. It will use a smartphone's sensors to create a cumulative trust score that will authenticate users.
See More Articles in Consumer Security Section >>
Facebook Twitter LinkedIn Google+ RSS
What's your alarm level over cyberattacks on the Internet's infrastructure?
Red: A deadly cyberwar will occur -- It's when, not if.
Orange: A big one could be costly and threaten public safety.
Yellow: We need to improve cybersecurity at a faster pace.
Blue: Regional outages will become more frequent and more annoying.
Green: There's no way anyone could take out the entire Internet.