INSTA-LEADS: Our Full-Service B2B Marketing Program Delivers Sales-Ready Leads Click to Learn More!
Welcome Guest | Sign In
ECommerceTimes.com
Government Spies Came Up Dry, Says Gemalto
February 26, 2015
SIM card maker Gemalto, whose networks reportedly were breached by hackers from the United States National Security Agency and the UK's GCHQ, on Wednesday said the spies got nothing. The hackers stole cryptokeys for millions of SIM cards, according to The Intercept, which cited documents released by NSA whistle-blower Edward Snowden. Gemalto denied any SIM cryptokeys had been stolen.
Malicious Emailers Find Healthcare Firms Juicy Prey
February 26, 2015
Healthcare providers have garnered growing interest from hackers in recent months. More evidence of that trend appeared last week in a report on email trust. An email that appeared to come from a healthcare company was four times more likely to be fraudulent than an email purportedly from a social media company like Facebook, one of the largest creators of email on the Internet, Agari found.
Yahoo CISO, NSA Chief Slug It Out Over Security Backdoors
February 25, 2015
Yahoo CISO Alex Stamos on Monday confronted NSA Director Adm. Mike Rogers over the United States government's plan to require built-in backdoors in hardware and software made by American companies. The exchange took place at the New America Foundation's cybersecurity conference. Building backdoors into cryptography is "like drilling a hole in the windshield," Stamos said.
FTC, Private Sector Lock Horns Over Consumer Data Protection
February 25, 2015
The major headline hacking event of 2014 involved data theft at a highly visible enterprise: Sony Pictures. Perhaps just as significant in e-commerce security was a 2014 federal court ruling which allows the FTC to continue penalizing commercial firms for failure to protect consumer data from hackers. That decision has been challenged, and in early March the FTC and its opponent will square off in court.
Government Spies Steal SIM Card Cryptokeys
February 23, 2015
The United States' National Security Agency and British spy agency GCHQ have hacked into the internal computer network of Gemalto, the world's largest maker of SIM cards, and stolen the cards' encryption keys, according to information in files leaked by whistle-blower Edward Snowden. Gemalto makes about 2 billion SIM cards a year, and sells them to 450 major wireless network carriers worldwide.
AT&T Puts a Price on Privacy
February 23, 2015
Users who want to sign on to GigaPower by AT&T, the carrier's 1-gigabit-per-second Internet service that just become available in Kansas City, Missouri, have an interesting choice. They can pay $70 with the understanding that their online movements will be tracked for commercial purposes -- or they can pay an additional $29 a month to avoid the monitoring.
Google Rails Against Proposal to Give Feds Remote Hacking Authority
February 20, 2015
Google is fighting a proposed amendment to Rule 41 of the U.S. Criminal Code that might allow authorities to hack into computers abroad. The amendment seeks to empower a magistrate in a district where activities related to a crime may have occurred to issue a warrant for remote search of computers, as well as seizure or copying of their files, under certain circumstances.
Lenovo Rapped for Preinstalling Spyware
February 19, 2015
Lenovo has come under fire for preinstalling spyware on some of its laptops. The software, Superfish, uses the same techniques cybercriminals often employ to crack encrypted traffic. "Superfish is purposely designed to bypass the security of HTTPS websites in a manner that would allow malware and attackers to also bypass the security provided by HTTPS," said Bluebox cofounder Adam Ely.
Cyberthieves Bag a Billion in Snail-Speed Bank Heists
February 18, 2015
Criminals using Carbanak malware have stolen up to $1 billion from 100 financial institutions in Russia, China, Germany and the United States, Kaspersky Lab has revealed. The gang is expanding operations to other countries. Kaspersky has advised financial institutions to scan their networks for intrusion by Carbanak. "These are advanced threat actors," said Lancope CTO TK Keanini.
NSA Suspected of Spreading Super-Resistant Malware
February 17, 2015
Kaspersky Lab on Tuesday announced the discovery of what may be the most sophisticated malware ever. The malware's creators, whom Kaspersky has dubbed "The Equation Group," use a never-seen-before tactic to infect hard drives' firmware. The technique "makes traditional antivirus and antimalware software practically useless," said Protegrity VP of Products Yigal Rozenberg.
It's Time to Investigate Cyber Insurance
February 17, 2015
Almost every day there are reports of cyberintrusions, attacks and related security breaches. If your company does not have the right insurance, it could be even more of a disaster. What company can afford not to have insurance for a potential cyberdisaster? Let's look at some protective measures that can be taken to safeguard your business.
Encryption Can Create Stormy Weather in the Cloud
February 17, 2015
Encryption has received a lot of attention lately as a solution to the growing data breach problem, but one of the hang-ups dogging the technology has been its ability to play nice in the cloud. That's especially true if an organization wants to control the keys by which its data is scrambled and use services offered by a cloud provider beyond simple storage.
Facebook Launches ThreatExchange to Stymie Cybercrime
February 13, 2015
"Threat researchers do already share this data manually," Jeremy Demar, director of threat research at Damballa, told TechNewsWorld. "The value in systems like this isn't the ability to share raw intelligence [it's the] structured data that allows for the information to be accessed quickly and easily by the users." ThreatExchange is based on Facebook's ThreatData threat analysis framework.
How Eroding Trust Hurts Companies
February 12, 2015
I love all the innovation and trends in the wireless, telecom, television, Internet and tech space. However there is also a big warning light flashing ahead that no one is paying attention to...trust is eroding. Trust is a delicate thing and is being ignored. Innovation is great, but if we don't protect the privacy and personal information of users, they will lose trust and that will bite us in the end.
Obama's Cyberthreat Intel Aggregator Plan Divides Security Experts
February 12, 2015
The Obama Administration on Tuesday announced plans to set up a national Cyber Threat Intelligence Integration Center to integrate all data from government agencies and the private sector, and disseminate it appropriately. The intelligence integration center will initially have a staff of 50 and a budget of US$35 million. Reactions from cybersecurity experts were mixed.
Box to Let Enterprises Bring Their Own Keys to the Cloud
February 11, 2015
Box on Tuesday raised the curtain on a new offering that allows its enterprise customers to control the digital keys used to encrypt their data stored in the storage provider's cloud. Box is working with Amazon Web Services and Gemalto to bring to market "Box Enterprise Key Management," and give its most security-minded customers total control over the keys used to encrypt data they store on Box.
Bug Bounties Entice Researchers to Don White Hats
February 10, 2015
Bug bounty programs are used by individual software makers to improve the quality of their products, but they can have incidental benefits for all software makers, too. One of those is to encourage bug hunters to wear a white hat instead of a black one. When you make it easy for hackers to do the right thing, the majority will," noted Alex Rice, CTO of HackerOne.
Federal 'Internet of Things' Report Triggers Debate, Senate Inquiry
February 10, 2015
Just how close is 'too close for comfort' in the unprecedented connectivity of people, products and electronic communication that lies ahead with the Internet of Things? Should the providers of electronic devices be allowed to know when you set your house thermometer, or how often and how long you go for a jog using a 'wearable' electronic exercise sensor?
Concerns Emerge About Samsung Smart TVs 'Bugging' Owners
February 09, 2015
The feature in question may transmit some voice commands, along with information about the device, to a third-party service that converts speech to text, Samsung's global privacy policy warns. If voice recognition is going to be on all the time, "that seems like really poor design, and certainly represents a privacy risk," said Justin Brookman, director of the consumer privacy project at the Center for Democracy & Technology.
Anthem Mega-Breach Jeopardizes 80 Million Consumers
February 05, 2015
Hackers broke into the databases of Anthem Inc., the second-largest health insurer in the U.S., and stole up to 80 million customers' personal information. The data includes current and former customers' names, birthdays, medical IDs, social security numbers, street addresses, email addresses and employment information, Anthem president and CEO Joseph Swedish wrote in a note sent to customers.
FTC Argues Against IoT Law, For Now
February 05, 2015
The global "installed and connected base" of IoT units will reach approximately 30 billion in 2020, noted IDC in a November 2014 report. Yet now is not the time to enact privacy or security laws aimed directly at the impact of the IoT, the U.S. Federal Trade Commission says. The FTC argues that such specific legislation could stymie the development of IoT technology.
IoT Risky Business for Enterprise Networks
February 05, 2015
There were 9 billion Internet of Things units installed at the end of 2013 -- and analysts expect the figure to hit 28 billion by 2020. That's going to make life difficult for IT security admins. A Tripwire survey found that employed consumers who took work home had an average of 11 IoT devices on their home networks, and 24 percent of them had connected at least one of these devices to their enterprise network.
Infected Android Apps From Google Play Affect Millions
February 04, 2015
The malware harbors fake ads that pop up when users unlock their devices, to warn them about nonexistent infections, or that their devices are out of date or have porn. Victims are then asked to take action. If they agree, they are redirected to poisoned Web pages that contain a variety of hazards. Google spokesperson Elizabeth Markman did not confirm how many devices had been hit.
Is the FTC Jumping the Gun on IoT Security?
February 03, 2015
For months, the security community has been waving a red flag about how the nascent Internet of Things could become a cyber criminal's paradise. Last week, those admonitions were given some credence when the Federal Trade Commission recommended that the makers of IoT gadgets adopt some "best practices" to protect consumers from potential violations of their privacy and security.

See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS