INSTA-LEADS: Our Full-Service B2B Marketing Program Delivers Sales-Ready Leads Click to Learn More!
Welcome Guest | Sign In
ECommerceTimes.com
Hackers Back to Their Old Tricks
July 30, 2014
Old tricks that have helped hackers penetrate computers for months or longer worked again last week at Goodwill and Stubhub. Taking a page from the gang that pillaged payment card and personal information from Target last year, hackers clipped payment card information from an undisclosed number of Goodwill Industries International customers. It's believed point-of-sale systems were compromised.
Leahy Bill Aims to Rein In Government Snooping
July 30, 2014
Government snooping on Americans would be curtailed under a bill introduced Tuesday in the U.S. Senate. The measure, sponsored by Senate Judiciary Chairman Patrick Leahy, D-Vt., would ban bulk collection of domestic information, limit the scope of searches by government agencies, and add transparency and reporting requirements. Further, it would reform procedures of the FISA Court.
Android's Fake ID Could Put Millions in Jeopardy
July 30, 2014
An Android vulnerability that exists in every version from v2.1 Eclair to v. 4.3 Jelly Bean could expose millions of users, Bluebox Security has warned. The flaw lets attackers fake the certificates of specially privileged parties, such as Adobe and Google Wallet, and serve them up with malware that bypasses detection by Android. Attackers then can take over every app running on an Android device.
OkCupid's Confessed Hijinks Get Thumbs-Down
July 29, 2014
OkCupid has admitted carrying out psychological experiments on its users. Because OkCupid doesn't really know what it's doing, it needs to experiment to see what works and what doesn't, according to cofounder Christian Rudder. Every Internet company needs to test different things with users, and website visitors are subjected to "hundreds of experiments," he argued. "That's how websites work."
BlackBerry Picks Secusmart to Tighten Mobile Security
July 29, 2014
BlackBerry on Tuesday announced plans to acquire Secusmart, a developer of high-security voice and data encryption and anti-eavesdropping technologies. Mobile devices increasingly are being used for more critical tasks and to store more critical information, noted CEO John Chen. "The acquisition of Secusmart underscores our focus on addressing growing security costs and threats."
Chinese Turn the Screws on Microsoft
July 28, 2014
China is ramping up its campaign against Microsoft, following its ban in May on the installation of Windows 8 on government computers. Officials of China's State Administration for Industry & Commerce reportedly have made unannounced visits to Microsoft offices in Beijing, Shanghai, Guangzhou and Chengdu. They apparently questioned staff in at least one office.
Do Facebook Searches to Show Disability Fraud Violate the Constitution?
July 28, 2014
Looking for evidence of disability fraud, the district attorney for Manhattan last year obtained 381 search warrants and served them on Facebook as part of a long-term investigation into a massive scheme. The search warrants were "sealed," which means they were not made public. Ultimately, 106 former New York police and firefighters were arrested.
Google to Search for the Meaning of Health
July 25, 2014
Google is seeking 175 volunteers from whom it will collect bodily samples in an effort to create their biochemical fingerprints and establish the baseline for a healthy body. The Baseline study, to be run by Google X labs, will seek to connect traditional clinical observations of health, such as diet -- or habits, such as smoking -- with molecular-level changes.
Failure to Communicate Hamstrings Cyberdefenders
July 23, 2014
A failure to communicate between security pros and company brass may be contributing to the inability of a significant number of organizations to reduce the risk of cyberattacks on their systems. Thirty-one percent of the nearly 5,000 respondents surveyed for a recent study said their cybersecurity team never met with the executive team about cybersecurity.
Black Hat Tor-Busting Talk Nixed
July 22, 2014
The Tor Project is working to remedy a vulnerability in its anonymity software following the sudden cancellation of a talk at next month's Black Hat security conference in Las Vegas that would have revealed it. The planned talk would have demonstrated a way to unmask users of Tor, the privacy-minded Web browsing software. CMU researcher Alexander Volynkin was to deliver the briefing.
iOS Insecurity - Designed by Apple?
July 22, 2014
The long-held belief that Android is the least secure of mobile OSes was shattered by security researcher and expert iOS hacker Jonathan Zdziarski over the weekend. Zdziarski unveiled a host of iOS vulnerabilities, the scope of which was staggering. They include undocumented services that bypass backup encryption and can be accessed both via USB and wirelessly.
Judge Rules Police Can Stuff Entire Email Accounts Into Evidence Lockers
July 21, 2014
Concerns about overly broad searches of digital data by law enforcement once again have emerged after a federal judge issued an opinion stating officials armed with a warrant can seize and hold a suspect's entire email account. Such an action would not violate the suspect's rights under the Fourth Amendment of the Constitution, said U.S. Magistrate Judge Gabriel Gorenstein.
Cloud App Security: Foggy With Low Visibility
July 21, 2014
While the cloud promises faster time to market and reduced costs, it also presents a new landscape for hackers to attack and achieve their goals -- namely, to find and gain unauthorized access to data and information. Attackers follow the data they are after, and if that data is residing in the cloud, then they are going to start operating in the cloud as well.
'Buy' Button Could Turn Facebook Into Impulse-Shopping-Ville
July 18, 2014
Facebook is testing a function that would allow users to buy products without leaving the site or app. Small and medium-sized businesses in the U.S. that are taking part in the trial can add the Buy button to ads displayed in users' News Feeds or in posts on their pages. Users will see the Buy button in relevant ads whether they're on the Facebook website or using their mobile device.
Down the EU's Right-to-Be-Forgotten Rabbit Hole
July 17, 2014
Telecom regulators from each EU member state, together with the Article 29 Working Party -- a group comprised of a data protection authority representative from each state, the European Data Protection Supervisor, and the European Commission -- reportedly have invited search engines to a meeting next week. Microsoft, which just started fielding link removal requests to Bing, plans to attend.
Gameover Zombies on the March Again
July 17, 2014
The Gameover botnet is back, more or less, only six weeks or so after the Justice Department announced that an FBI-led multinational effort had disrupted it. Still, the botnet's downtime was longer than expected -- the UK's National Crime Agency had warned that the people running it would regain control within two weeks. Sophos this week spotted a new version of the malware.
Windows XP Hacked, Supply Chain Poisoned
July 16, 2014
A supply chain compromise is a security pro's worst nightmare. The thought of malware being planted on computer devices before they leave the factory sends shivers down a cyberdefender's spine. A disturbing case of such poisoning was reported last week by researchers at TrapX. The researchers found an APT was being used to infect a version of Windows XP embedded on devices.
Google's Project Zero Cybersecurity Watch: No Excuses
July 15, 2014
Google on Tuesday announced Project Zero, an effort to speed up the security bug-fixing process. A team of cybersecurity experts will go after vulnerabilities in any and all software, notify the vendors, and then file bug reports in a public database so users can track the issuance of patches. The Project Zero team has promised to send bug reports to vendors in as close to real-time as possible.
What's Eating Internet Security?
July 15, 2014
It's a given that hackers can and do penetrate websites with laughable ease, ranging from those of retailers to those of the United States government. It certainly doesn't help the security-minded to know that the U.S. National Security Agency and other countries' spy agencies, including the UK's GCHQ and the West German intelligence agency, are tapping into online communications at will.
Critical Infrastructure Companies Lack Cyberdefenses
July 11, 2014
Companies providing the world's critical infrastructure are woefully unprepared for cyberattacks despite the increasing threat level, evidenced by the release of the Stuxnet worm and the Shamoon virus in recent years, found a survey conducted by the Ponemon Institute and Unisys. Nearly 70 percent of the 599 surveyed companies in the past 12 months have reported at least one security breach.

See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS