Home > News > Security October 1, 2014 User: Visitor

Home
Shows
News
   Technology
Software
Security
Evil, Evil Spam
Music
Links
Feedback
The Host
Technology FAQ
Site Map
Rules & Policies

Be A Guest on Tech Talk

My Account


Must-read articles on computer security, including virus alerts and much more!

Security News Headlines - Yahoo! News

  • ARM expands software to manage security for Internet of Things - By Eric Auchard FRANKFURT (Reuters) - ARM Holdings Plc said on Wednesday it was introducing software to make the proliferating number of Internet-connected devices many consumers surround themselves with more manageable and secure. The Cambridge-based chip designer said it was looking to expand dramatically the lifespan and manageability of the many network-connected products running its embedded microprocessors -- from home appliances to car features to wearable devices. ...
  • McAfee names Kimmel its 'most dangerous celebrity' - LOS ANGELES (AP) — If you're about to Google Jimmy Kimmel, beware.
  • Exclusive: U.S. to pay $300 million to end Brazil cotton trade dispute - officials - By Alonso Soto and Krista Hughes BRASILIA/WASHINGTON (Reuters) - The United States will pay Brazilian cotton producers $300 million to settle a decade-old dispute over cotton subsidies, two officials familiar with the settlement said on Tuesday, the first concrete step to repair ties hurt by an espionage scandal. The agreement will be formally signed on Wednesday morning in Washington after Brazilian Agriculture Minister Neri Geller and Foreign Minister Luiz Alberto Figueiredo traveled to the U.S. capital to finalize details. ...
  • Advanced iOS virus targeting Hong Kong protesters: security firm - BOSTON (Reuters) - Cybersecurity researchers have uncovered a computer virus that spies on Apple Inc's iOS operating system for the iPhone and iPad, and they believe it is targeting pro-democracy protesters in Hong Kong. The malicious software, known as Xsser, is capable of stealing text messages, photos, call logs, passwords and other data from Apple mobile devices, researchers with Lacoon Mobile Security said on Tuesday. They uncovered the spyware while investigating similar malware for Google Inc's Android operating system last week that also targeted Hong Kong protesters. ...
  • This social network wants to kill Facebook by putting your privacy first - Ever since MySpace fell off and Facebook took control of social media, people have waited for the next big social media empire to rise and give them a new reason to keep their eyes glued to their gadgets. That day may have finally arrived with a new social network called Ello. According to BBC News, it started as a small network for a group of friends. Now it has exploded and is getting at least 31,000 requests an hour from people looking to join. Starting a new social network doesn’t come without start-up problems. “We’re learning as we go but we have a very strong tech crew and back-end,” Ellofounder Paul Budnitz told the BBC. “It’s in beta and it’s buggy and it does weird stuff – and it’s
  • U.S. charges four with stealing $100 million in software, data - By Aruna Viswanatha WASHINGTON (Reuters) - Four members of an alleged international computer hacking ring were charged with stealing more than $100 million worth of software and data - some of it used to train military pilots and some related to Microsoft Corp's Xbox gaming console - the U.S. Justice Department said Tuesday. Two of the four - a 28-year-old New Jersey man and a 22-year-old Canadian man - pleaded guilty to charges contained in an indictment unsealed earlier in the day, the agency said. ...
  • Feds say hackers targeted Microsoft, game makers - WILMINGTON, Del. (AP) — Two members of an international hacking ring that gained access to a U.S. Army computer network while targeting computer giant Microsoft and several video game developers pleaded guilty to conspiracy charges Tuesday in federal court in Delaware.
  • China approves iPhone 6 after security assurances - BEIJING (AP) — China's phone regulator said Tuesday it has approved Apple Inc.'s iPhone 6 for use on Chinese networks after the company promised never to install "backdoors" to give other governments access to users' information. Apple said sales start Oct. 17.
  • Online abuse of women in Pakistan turns into real-world violence - By Katharine Houreld ISLAMABAD (Reuters) - Internet abuse of women in Pakistan is triggering real world violence against them, but large social media companies, such as Facebook and Twitter, are moving too slowly to stop it, internet rights group Bytes for All said. Women face online threats globally, but they run a unique risk in conservative Muslim Pakistan, where there is a tradition of men killing women seen as having injured a family's honor, besides punitive laws against blasphemy. ...
  • HK protests' 'Umbrella Revolution' tag escapes China's censors - so far - By Sui-Lee Wee BEIJING (Reuters) - China's censors, who have barred most online discussion of the pro-democracy protests in Hong Kong, have so far not blocked searches for the movement's "Umbrella Revolution" nickname, although it may not survive much longer. Chinese Internet users were still able to post under the hashtag "Umbrella Revolution" in Chinese and English on Sina Weibo, China's popular Twitter-like microblogging service, on Monday and Tuesday. ...
  • Another card system hack at Supervalu, Albertsons - Card data of Supervalu and Albertsons shoppers may be at risk in another hack, the two supermarket companies said Monday. The companies said that in late August or early September, malicious software was ...
  • Supervalu says malware affects four stores in Minnesota - (Reuters) - Supermarket chain Supervalu Inc reported on Monday a second attack against its payment systems barely two months after it said it was investigating a potential data breach. The company said it found malicious software on a part of its network that might have affected payment cards used at four of its Cub Foods franchise stores in Hastings, Shakopee, Roseville and White Bear Lake, Minnesota. ...
  • Europe's police need data law changes to fight cybercrime: Europol - By Eric Auchard LONDON (Reuters) - Law enforcers in Europe need greater powers to retain data for longer in order to catch cybercriminals selling discrete services that police cannot trace under existing regulations, according to a Europol report published on Monday. Cybercrime is increasingly conducted by a highly specialized chain of software break-in experts, underground market-makers and buy-side fraudsters who convert stolen passwords and identities into financial gains. Criminals can keep data for months or even years before using it to defraud victims. ...
  • This is the most secure way to keep your private data safe on Android - When it comes to mobile security, you can never be too safe. As the recent leak of hundreds of nude photos of female celebrities has reminded us, hackers are always working on new and unexpected ways to steal our private data, and a simple PIN on a smartphone just isn’t enough to ensure that our private files are kept secure. There are several options when it comes to mobile device security, and their effectiveness ranges pretty dramatically. For Android users, however, there is one app in particular that likely keeps files safer than anything we’ve seen before. DON’T MISS: Here’s how to give your Android phone a huge speed boost, just like Apple sped up iOS Some apps hide your private photos and other data
  • Phoning 'home': what your mobile may be giving away - By Jeremy Wagstaff SINGAPORE (Reuters) - When popular Chinese handset maker Xiaomi Inc admitted that its devices were sending users' personal information back to a server in China, it prompted howls of protest and an investigation by Taiwan's government. The affair has also drawn attention to just how little we know about what happens between our smartphone and the outside world. In short: it might be in your pocket, but you don't call the shots. ...
  • Poll: Confused by issues of the day? Join the club - WASHINGTON (AP) — Confused by President Barack Obama's health care law? How about the debate over government surveillance? The way the Federal Reserve affects interest rates?
  • iPhone 6 Could Lock Out NSA, Law Enforcement - The intelligence community and American law enforcement officials are none too happy with Apple, The New York Times reports.
  • Palo Alto Networks unexpectedly gets low score on firewall test - By Jim Finkle BOSTON (Reuters) - Palo Alto Networks Inc's flagship next-generation security firewall ranks as the least effective in a new test of such equipment by NSS Labs, results that surprised some analysts because the product is widely considered an industry leader. NSS, which reviews technology products for Fortune 500 companies, gave Palo Alto's firewall a "caution" rating in a survey released to clients Tuesday. It had rated the product "recommended" in its last survey, released in February 2013. ...
  • Apple says 'Shellshock' no risk to vast majority of Mac users - BOSTON (Reuters) - Apple Inc said the vast majority of Mac computer users are not at risk from the recently identified "Shellshock" computer bug, which security experts have warned affect operating systems, including Mac's OS X. "The vast majority of OS X users are not at risk," Apple spokesman Bill Evans said late Thursday evening. "Shellshock" is a vulnerability in Bash, a piece of software packaged with Mac OS X, which is based on the Unix operating system. ...
  • China's communist party expels senior internet regulator for graft - BEIJING (Reuters) - A senior Chinese internet regulator has been expelled from the ruling Communist Party on graft charges, China's top anti-graft body said on Friday, as it works to crack down on corruption in media and the internet. Gao Jianyun, an official of the International Communication Office of the party's Central Committee, which is charged with regulating the Internet, including censorship, was placed under investigation in April, state media reported. ...
  • Hackers exploit 'Shellshock' bug with worms in early attacks - By Jim Finkle BOSTON (Reuters) - Hackers have begun exploiting the newly identified "Shellshock" computer bug, using fast-moving worm viruses to scan for vulnerable systems and then infect them, researchers warned on Thursday. "Shellshock" is the first major Internet threat to emerge since the discovery in April of "Heartbleed," which affected encryption software used in about two-thirds of all web servers, along with hundreds of technology products. ...
  • FBI chief: Apple, Google phone encryption perilous - WASHINGTON (AP) — The FBI director on Thursday criticized the decision by Apple and Google to encrypt smartphones data so it can be inaccessible to law enforcement, even with a court order.
  • Q&A: Experts warn of Bash Bug, what are the risks? - NEW YORK (AP) — Internet security experts are warning that a new programming flaw known as the "Bash Bug" may pose a serious threat to computers and other devices such as home Internet routers. Even the systems used to run factory floors and power plants could be affected.
  • Hacking suspect's lawyers: no conflict of interest - SEATTLE (AP) — Lawyers for a Russian man charged with hacking into businesses across the U.S. filed new motions in federal court insisting that they don't have a conflict of interest and should remain on the job.
  • Lawyer for hacking suspect say no disqualification - SEATTLE (AP) — Lawyers for a Russian man charged with hacking into business across the U.S. filed new motions in federal court insisting that they don't have a conflict of interest and should remain on the job.
  • Motorola boss says people will stop buying devices like the iPhone 6 soon - When you look at the iPhone 6 and 6 Plus sales figures, it’s hard to believe that the high-end smartphone business is drying up, but that’s exactly what Motorola President Rick Osterloh argued in an interview with Re/code earlier this month. “The days of the $600-$700 smartphone are numbered,” Osterloh told Re/code. “People are realizing they don’t need to pay that much money.” Osterloh’s confidence is due in part to Motorola’s momentous success with the Moto G, which quickly became the company’s best-selling smartphone of all time. In developing markets, affordable devices are gaining a nearly immeasurable amount of traction as low-end first-party vendors begin to pull the rug out from under the biggest names in the industry. Rather than attempt to beat Huawei, ZTE
  • Hands on: Samsung’s iPhone 5 is absolutely beautiful - Some hailed Samsung’s new Galaxy Alpha smartphone as an “iPhone killer” ahead of its debut last month. Since Samsung’s smartphones had all been made out of somewhat flimsy feeling plastics prior to the Alpha’s unveiling, it was understandable that some fans would get overly enthusiastic about what, at the time, was rumored to be the first Samsung smartphone to feature a beautiful aluminum housing. Of course, now that the phone has been made official, we know that it’s most certainly not an iPhone killer. Instead, it’s a three-year-old iPhone. While chatter has died down over the past year or so, Samsung had a huge image problem to overcome as it rose to the top of the smartphone market. The South Korea-based
  • Huawei to invest $4 billion in fixed broadband R&D in next three years - BEIJING (Reuters) - Huawei Technologies Co Ltd , the world's largest telecommunications equipment maker, said it would invest more than $4 billion in fixed broadband technology research and development (R&D) in the next three years. Huawei, which has shifted its focus to the mobile device market in recent years, said in a statement on Thursday that fixed broadband - the pipes connecting homes and offices - remained a "key direction for strategic investment. ...
  • New 'Bash' software bug may pose bigger threat than 'Heartbleed' - A newly discovered security bug in a widely used piece of Linux software, known as "Bash," could pose a bigger threat to computer users than the "Heartbleed" bug that surfaced in April, cyber experts warned on Wednesday. Bash is the software used to control the command prompt on many Unix computers. Hackers can exploit a bug in Bash to take complete control of a targeted system, security experts said. ...
  • Some banks reissuing cards over Home Depot breach - Some lenders are preparing to reissue credit or debit cards to customers to head off possible losses following the breach of customer data at Home Depot. Capital One Financial and JPMorgan Chase & Co. ...
  • Your medical record is worth more to hackers than your credit card - By Caroline Humer and Jim Finkle NEW YORK/BOSTON (Reuters) - Your medical information is worth 10 times more than your credit card number on the black market. Last month, the FBI warned healthcare providers to guard against cyber attacks after one of the largest U.S. hospital operators, Community Health Systems Inc, said Chinese hackers had broken into its computer network and stolen the personal information of 4.5 million patients. Security experts say cyber criminals are increasingly targeting the $3 trillion U.S. ...
  • Government hackers try to crack HealthCare.gov - WASHINGTON (AP) — The government's own watchdogs tried to hack into HealthCare.gov earlier this year and found what they termed a critical vulnerability — but also came away with respect for some of the health insurance site's security features.
  • Head of Serb church denounces gay pride march - BELGRADE, Serbia (AP) — The head of Serbia's influential Christian Orthodox church on Tuesday denounced a gay pride march planned for the weekend, adding to tensions over the event, which has faced threats from extremists.
  • 10 Things to Know for Today - Your daily look at late-breaking news, upcoming events and the stories that will be talked about today:
  • Don’t expect the iPhone 6 and iPhone 6 Plus to win any battery life contests - Now that the iPhone 6 and iPhone 6 Plus are in the hands of millions of buyers, people are putting them through all sorts of experiences including accidental or intentional drop tests and detailed teardowns, but also battery life tests. In fact, Phone Arena has put both devices through its regular battery measurements that use “a custom web-script, designed to replicate the power consumption of typical real-life usage,” publishing its findings and updating its battery life smartphone rankings to accommodate the new arrivals. FROM EARLIER: iPhone 6 and 6 Plus crush rivals in performance tests despite dual-core CPU During the iPhone 6 event, Apple’s battery estimates for both devices revealed that they should offer more usage time than the iPhone 5s
  • European banks team up with Europol in cybercrime fightback - LONDON (Reuters) - Europe's banks have joined forces with Europol's cybercrime unit to try to combat the rising and increasingly sophisticated threat being posed by cyber criminals to financial firms. The European Banking Federation (EBF), which represents about 4,500 banks, and Europol’s European Cybercrime Centre - known as EC3 - said on Monday they had signed a memorandum of understanding to intensify cooperation between law enforcement and the financial sector. Banks are facing frequent attacks from sophisticated hackers. Wall Street bank JP Morgan said last month it was working with U.S. ...
  • Home Depot didn’t take data security seriously, report reveals - Home Depot recently confirmed that it has been the victim of the largest credit card breach in history, with 56 million payment cards having been stolen by clever hackers, who managed to access the giant retailer’s systems for more than four months. A report from The New York Times further reveals that while the recent hack was possible thanks to advanced malware programs that went undetected by existing security measures, Home Depot apparently has a history of ignoring the security of its customers’ payment data. FROM EARLIER: Confirmed: Home Depot credit card hack significantly bigger than Target’s Former employees have revealed the company has been ignoring proper security procedures for years, dismissing security concerns that may have arisen. The company
  • Apple’s iCloud security nightmare gets worse as more nude celebrity pics leak - If you thought that the hugely successful iPhone 6 launch would help Apple move past the controversy surrounding nude celerity photos that were stolen from hacked iCloud accounts, think again. TMZ reported on Saturday that a fresh round of stolen celebrity photos popped up on 4Chan and included pictures of Kim Kardashian, Vanessa Hudgens, Hope Solo and Jennifer Lawrence. This marks the second major cache of nude celebrity photos that have hit the Internet following an earlier hack that included pictures of Ariana Grande, Victoria Justice, Jenny McCarthy, Kate Upton, Mary E. Winstead and many others. How did all this happen? We’re still not exactly sure, although earlier this month a man claiming to be the hacker behind the leaks said that it was
  • Spanish judge indicts 9 persons for cyber fraud - MADRID (AP) — A Spanish judge charged nine people with fraud Sunday for allegedly participating in the theft of $45 million after a massive hacking of a bank's card payments system.
  • 5 ways to protect yourself from data breaches - NEW YORK (AP) — Data breaches at retailers aren't going away but there are ways consumers can protect themselves from future heists of their payment card information.