DPA v10 delivers enterprise-grade monitoring and tuning for your MySQL® databases. Free trial.
Welcome Guest | Sign In
McDonald's Tips Android Pay Launch
August 24, 2015
An internal McDonald's memo labeled "proprietary and confidential" has been circulating, advising employees to get ready for a Wednesday launch of Android Pay -- the successor to Google Wallet, and Google's answer to Apple Pay. Google officially announced Android Pay this spring, during it's annual developers conference, saying only that Android Pay would launch with "Android M."
Intel: Putting Innovation Back in the Hands of the Innovators
August 24, 2015
We are living in an amazing time, but many of us seem to take it for granted. We have private spaceships. Self-driving cars are on the road, even though we can't buy them yet, and there are plans for a 12-mile-high inflatable building. Granted, a number of us are convinced it will end up looking like a giant version of the inflatable fan blown stick man often seen outside of car dealerships.
Spotify's 'Sorry' Fails to Cut Through Confusion
August 22, 2015
Spotify CEO Daniel Ek on Friday issued a public apology for poor communications regarding the company's new privacy policy. The new policy, which took effect Wednesday, immediately triggered alarm. Several tech publications railed against the terms, and Minecraft creator Markus Persson engaged Spotify CEO Daniel Ek in a Twitter debate that ended with Persson and others quitting the music service.
Ashley Madison Hackers: Catch Them if You Can
August 20, 2015
The Ashley Madison hacker gang will be tough to apprehend. The hackers this week dumped nearly 10 gigabytes of stolen personal data onto the Web -- details gleaned from accounts established on the site, which is dedicated to matching up people who want to engage in extramarital affairs. It's "nearly impossible" to track down attackers, noted Bit9 + Carbon Black's Ben Johnson.
Gear Up for a Flood of IoT Support Requests
August 20, 2015
Growth of the Internet of Things in broadband households extends the life, utility and functionality of all connected solutions in the home. It also puts new pressures on existing support solutions to meet consumers' expectations. Sixteen percent of U.S. broadband households owned a smart home device, and nearly 40 percent planned to buy one in the next 12 months, suggests recent research.
It's a Mad, Mad, Mad Ashley Madison World
August 19, 2015
Hackers have dumped personal data of about 37 million members of the Ashley Madison website onto the Dark Web. The data was stolen in an attack on the site, which aims to hook up people who want to cheat on their spouses. Parent company "Avid Life Media has failed to take down Ashley Madison and Established Men," the Impact Team wrote in a post online. ... Now everyone gets to see their data."
AT&T Went Above and Beyond for NSA, Say Snowden Docs
August 18, 2015
The National Security Agency considered its relationship with AT&T unique and particularly productive, accordingto a report published Saturday. The information about the company's close ties with the agency came from the trove of documents released by NSA whistleblower Edward Snowden. NSA lauded AT&T for its "extreme willingness to help," giving it access to billions of emails among other things.
Windows 10 FUD Fades Fast
August 14, 2015
Complaints about Windows 10 keep rolling in, but so far none appears to have stuck. The latest brouhaha is over certain privacy settings. Windows 10 gives users many options to disable certain data-gathering and reporting features, but it appears that some communications to Microsoft servers still slip through. So far, there doesn't seem to be anything shifty or harmful about those interactions.
Twitter Goes Long With Historic Tweet Access
August 13, 2015
Twitter on Tuesday announced a search API that will give business users instant and complete access to every historical public tweet about a subject of interest. Based on the Historical PowerTrack and 30-Day Search API tools developed by Gnip, which Twitter purchased last year, the API lets users search tweets back to March 2006, when the first one was posted.
Study: Chinese Hackers Are Savvy, Surgical
August 13, 2015
A clandestine group of sophisticated Chinese hackers have infected scores of sites on the Web and stolen documents from industrial and government organizations with surgical precision, according to a Dell SecureWorks study released last week. Dubbed "Threat Group 3390," the cybergang has used infected websites of some 100 organizations across the globe.
Feds Break Up Hacker-Powered Insider Trading Ring
August 12, 2015
In two indictments unsealed by the U.S. Department of Justice in Brooklyn, N.Y., and Newark, N.J., nine people were charged in federal court with carrying out an international scheme to hack into three business newswires, steal yet-to-be published press releases, and use them to make trades that generated approximately $30 million in illegal profits.
Chinese Hackers May Have Burrowed Into Airlines
August 11, 2015
The China-based hacking team that has been infiltrating U.S. government and business computer systems appears to be behind two newly discovered attacks -- this time on travel reservation processor Sabre and American Airlines. Sabre confirmed that its systems -- which contain sensitive records on as many as a billion travelers -- recently were breached. American Airlines is investigating.
Hacker Demos $30 Gizmo That Unlocks Keyless Car, Garage Doors
August 11, 2015
Infamous security researcher Sammy Kamkar last week demonstrated a gadget that can intercept wireless signals to unlock cars and garage doors. Kamkar showed off the device, which cost him just $32 to make, at the DefCon conference in Las Vegas. RollJam works with a wide array of motor vehicles -- including Nissan, Cadillac, Ford, Toyota, Lotus, Volkswagen and Chrysler, according to Kamkar.
Android on BlackBerry Is Looking More Real
August 10, 2015
BlackBerry's upcoming slider handset, aka "Venice," will run on Android and will be available in the coming months for AT&T as well as T-Mobile, according to rumors that picked up steam over the weekend. This is not the first time rumors of a BlackBerry device running on Android have made the rounds. The company earlier this year hinted at the possibility at the Mobile World Congress.
Mozilla Plugs Dangerous Firefox Zero-Day Hole
August 10, 2015
Mozilla on Friday released security updates to fix a zero-day flaw in the Firefox browser. An exploit that searches for sensitive files and uploads them to a server -- possibly somewhere in Ukraine -- has surfaced in an ad on a Russian news site, Mozilla reported last week. The exploit impacts Windows and Linux users. Mac users could be hit by a modified version.
Google on Universal Right to Be Forgotten: Fuhgeddaboudit
August 7, 2015
Google last week asked French regulators to withdraw a demand to universally delist from search results links to information about French citizens who wish to be forgotten on the Internet. Any European can ask to have certain links about them removed from search results that appear in Europe, and Google will grant those requests if they meet specific criteria.
Windows 10 Raises Some Hackles
August 7, 2015
"Tablet view is showing saved porn images," wrote Reddit user "FalloutBos." "Woke up to wife asking why I set it to rotate all my porn images right on the desktop view. I have no idea [how] to shut that feature off and that computer is staying shut down until I do." That incident raised howls of laughter, but it points to one of the problems early users of Microsoft's new OS have reported.
Cyberwarrior Demand Outpaces Supply
August 6, 2015
Demand for cybersecurity professionals continues to far outpace supply, according to a Burning Glass Technologies report released last week. Cybersecurity hiring remains concentrated in government agencies and among defense contractors, the third annual cybersecurity job market report notes, but hiring has started to boom in industries handling consumer data.
OS X Zero-Day Exploit Threatens Massive Mac Attack
August 4, 2015
Mac users, beware -- the ads you see on the Web could let hackers hijack your device. Malwarebytes has discovered a new zero-day exploit in OS X that lets apps bypass passwords during installation to get root permission through a Unix shell. A new adware installer downloaded by a Malwarebytes researcher modified his sudoers file -- a hidden Unix file that controls access to root permissions.
Malvertisers Poison Yahoo's Ad Network
August 4, 2015
Yahoo's ad network suffered an attack that lasted for almost a week, Malwarebytes reported mid-day Monday. Malwarebytes earlier notified Yahoo of the attacks, which began July 28. Yahoo had stopped them by the time the report was published. The attackers used the Angler Exploit Kit, described as highly sophisticated, to redirect visitors to ad sites on two Microsoft Azure domains.
Consumers Fret Over Health Wearables Security
July 29, 2015
Collecting health and fitness data through wearable devices is raising concerns among consumers about the security of that information. Twenty-five percent of more than 3,500 consumers who participated in a recent survey did not believe their personal health data was safe on fitness trackers or in health-tracking apps, reported Healthline -- and that number could be low.
Super-Scary Android Flaw Found
July 28, 2015
Zimperium on Monday revealed a stunning discovery by researcher Joshua Drake -- a flaw in Android's Stagefright media playback engine that could expose millions of mobile device users to attack without their having done anything. Stagefright, which processes several popular media formats, is implemented in native code -- C++ -- which is more prone to memory corruption than some other languages.
Mobile Device Hijacking Costs Advertisers $1B a Year
July 24, 2015
A type of fraud spreading through the mobile universe could cost advertisers more than $1 billion globally this year, according to a July 2015 study released by Forensiq. The fraud, called "mobile device hijacking," uses installed apps to rapidly load ads that no one sees -- but the fraudsters collect money for the ads as if they had been viewed.
Hackers Take Hijacked Jeep Cherokee for Joyride
July 23, 2015
White-hat hackers Charlie Miller and Chris Valasek remotely took over a Jeep Cherokee, ran its controls, then cut the transmission as it sped at 70 mph along Interstate 64 in an experiment conducted with Wired. They turned on the air conditioning, switched radio channels, turned on the windshield wipers, activated the windshield washer fluid pump, and transmitted a photo of themselves.
OPM Director's Resignation Draws Mixed Reactions
July 23, 2015
The resignation of U.S. Office of Personnel Management Director Katherine Archuleta is drawing mixed reactions from the cybersecurity community. Archuleta's departure on July 10, in the wake of a massive data breach resulting in the theft of the personal information of more than 22 million people, is being characterized by security pros as everything from "necessary" to "unfair."
Leverage Big Data to Get Rid of Network Attackers
July 21, 2015
Up to 30 percent of their firms' security incidents this year should have been detected by perimeter security measures -- but weren't -- said 55 percent of respondents to a SANS Institute survey. The truth is that today's attackers have become skilled at bypassing conventional defenses, which no longer can be counted on to protect enterprise networks on their own.
Philanderers, Scarlet Women Cower After Ashley Madison Hack
July 21, 2015
About 40 million swingers and sexual sophisticates have been whimpering in fear since hearing Sunday's news that hackers broke into the servers of Avid Life Media, the parent company of online cheating site Ashley Madison. The hackers reportedly stole large caches of personal data after breaking into the servers hosting Ashley Madison and related sites Cougar Life and Established Men.
DoJ: Firms Should Hire Cyber-Savvy Lawyers
July 20, 2015
Hardly a day goes by without a headline about a cyberintrusion. No entity is immune -- international retailers, airlines, hotels, mom and pop stores, cloud providers -- even the U.S. government. However, it seems that few businesses contemplate how important it is for their attorney to know and understand cybersecurity, as well as know what to do when a cyberintrusion occurs.
Swipes, Taps and Cursor Movements Can Foil Cyberthieves
July 16, 2015
Swipes, taps, cursor movements and other ways of interacting with electronic devices can be used to protect online merchants from Net fraudsters. Many people are familiar with biometric authenticators like irises, fingerprints and voices, but it turns out that how we behave with our machines, including typing speed and the use of keyboard shortcuts, can authenticate our identities, too.
Feds Deliver Darkode's Doomsday
July 16, 2015
United States law enforcement agencies and their counterparts in 19 countries on Wednesday announced they had dismantled the Darkode hackers' forum. Charges, arrests and searches were launched against 70 Darkode members and associates around the world, and 12 people associated with the forum were indicted in the U.S. The agencies also served several search warrants in the U.S.
See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS
Will fitness bands fade away?
Yes -- smartwatches will take over their functionality.
Yes -- they're like diets -- people tire of them.
No -- it's smartwatches that will fade away.
No -- people are getting more health-conscious.
Not sure -- but I'd like to try one.
Not sure -- not interested.