The Internet Security Threat Report 2015 is Now Available. Click here to download.
Welcome Guest | Sign In
ECommerceTimes.com
Google on Universal Right to Be Forgotten: Fuhgeddaboudit
August 7, 2015
Google last week asked French regulators to withdraw a demand to universally delist from search results links to information about French citizens who wish to be forgotten on the Internet. Any European can ask to have certain links about them removed from search results that appear in Europe, and Google will grant those requests if they meet specific criteria.
Windows 10 Raises Some Hackles
August 7, 2015
"Tablet view is showing saved porn images," wrote Reddit user "FalloutBos." "Woke up to wife asking why I set it to rotate all my porn images right on the desktop view. I have no idea [how] to shut that feature off and that computer is staying shut down until I do." That incident raised howls of laughter, but it points to one of the problems early users of Microsoft's new OS have reported.
Cyberwarrior Demand Outpaces Supply
August 6, 2015
Demand for cybersecurity professionals continues to far outpace supply, according to a Burning Glass Technologies report released last week. Cybersecurity hiring remains concentrated in government agencies and among defense contractors, the third annual cybersecurity job market report notes, but hiring has started to boom in industries handling consumer data.
OS X Zero-Day Exploit Threatens Massive Mac Attack
August 4, 2015
Mac users, beware -- the ads you see on the Web could let hackers hijack your device. Malwarebytes has discovered a new zero-day exploit in OS X that lets apps bypass passwords during installation to get root permission through a Unix shell. A new adware installer downloaded by a Malwarebytes researcher modified his sudoers file -- a hidden Unix file that controls access to root permissions.
Malvertisers Poison Yahoo's Ad Network
August 4, 2015
Yahoo's ad network suffered an attack that lasted for almost a week, Malwarebytes reported mid-day Monday. Malwarebytes earlier notified Yahoo of the attacks, which began July 28. Yahoo had stopped them by the time the report was published. The attackers used the Angler Exploit Kit, described as highly sophisticated, to redirect visitors to ad sites on two Microsoft Azure domains.
Consumers Fret Over Health Wearables Security
July 29, 2015
Collecting health and fitness data through wearable devices is raising concerns among consumers about the security of that information. Twenty-five percent of more than 3,500 consumers who participated in a recent survey did not believe their personal health data was safe on fitness trackers or in health-tracking apps, reported Healthline -- and that number could be low.
Super-Scary Android Flaw Found
July 28, 2015
Zimperium on Monday revealed a stunning discovery by researcher Joshua Drake -- a flaw in Android's Stagefright media playback engine that could expose millions of mobile device users to attack without their having done anything. Stagefright, which processes several popular media formats, is implemented in native code -- C++ -- which is more prone to memory corruption than some other languages.
Mobile Device Hijacking Costs Advertisers $1B a Year
July 24, 2015
A type of fraud spreading through the mobile universe could cost advertisers more than $1 billion globally this year, according to a July 2015 study released by Forensiq. The fraud, called "mobile device hijacking," uses installed apps to rapidly load ads that no one sees -- but the fraudsters collect money for the ads as if they had been viewed.
Hackers Take Hijacked Jeep Cherokee for Joyride
July 23, 2015
White-hat hackers Charlie Miller and Chris Valasek remotely took over a Jeep Cherokee, ran its controls, then cut the transmission as it sped at 70 mph along Interstate 64 in an experiment conducted with Wired. They turned on the air conditioning, switched radio channels, turned on the windshield wipers, activated the windshield washer fluid pump, and transmitted a photo of themselves.
OPM Director's Resignation Draws Mixed Reactions
July 23, 2015
The resignation of U.S. Office of Personnel Management Director Katherine Archuleta is drawing mixed reactions from the cybersecurity community. Archuleta's departure on July 10, in the wake of a massive data breach resulting in the theft of the personal information of more than 22 million people, is being characterized by security pros as everything from "necessary" to "unfair."
Leverage Big Data to Get Rid of Network Attackers
July 21, 2015
Up to 30 percent of their firms' security incidents this year should have been detected by perimeter security measures -- but weren't -- said 55 percent of respondents to a SANS Institute survey. The truth is that today's attackers have become skilled at bypassing conventional defenses, which no longer can be counted on to protect enterprise networks on their own.
Philanderers, Scarlet Women Cower After Ashley Madison Hack
July 21, 2015
About 40 million swingers and sexual sophisticates have been whimpering in fear since hearing Sunday's news that hackers broke into the servers of Avid Life Media, the parent company of online cheating site Ashley Madison. The hackers reportedly stole large caches of personal data after breaking into the servers hosting Ashley Madison and related sites Cougar Life and Established Men.
DoJ: Firms Should Hire Cyber-Savvy Lawyers
July 20, 2015
Hardly a day goes by without a headline about a cyberintrusion. No entity is immune -- international retailers, airlines, hotels, mom and pop stores, cloud providers -- even the U.S. government. However, it seems that few businesses contemplate how important it is for their attorney to know and understand cybersecurity, as well as know what to do when a cyberintrusion occurs.
Swipes, Taps and Cursor Movements Can Foil Cyberthieves
July 16, 2015
Swipes, taps, cursor movements and other ways of interacting with electronic devices can be used to protect online merchants from Net fraudsters. Many people are familiar with biometric authenticators like irises, fingerprints and voices, but it turns out that how we behave with our machines, including typing speed and the use of keyboard shortcuts, can authenticate our identities, too.
Feds Deliver Darkode's Doomsday
July 16, 2015
United States law enforcement agencies and their counterparts in 19 countries on Wednesday announced they had dismantled the Darkode hackers' forum. Charges, arrests and searches were launched against 70 Darkode members and associates around the world, and 12 people associated with the forum were indicted in the U.S. The agencies also served several search warrants in the U.S.
Flash Furor Grows Despite Adobe's Latest Fix
July 15, 2015
Three new vulnerabilities in Adobe Flash Player have been reported over the past two weeks, triggering a storm of protest and leading Mozilla and Google to ban the plug-in from their Firefox and Chrome browsers. "It is time for Adobe to announce the end-of-life date for Flash and to ask the browsers to set killbits on the same day," Facebook CSO Alex Stamos tweeted Sunday.
Apple Gives Fans a Taste of New OSes
July 10, 2015
Apple on Thursday released to consumers a preview of the latest versions of its mobile and desktop operating systems -- iOS 9 and OS X El Capitan -- which contain a number of new features, including a revamped two-factor authentication scheme. The latest release of iOS also contains two new smart folders. One collects selfies, and the other aggregates screen shots.
Gunpoder Malware Masquerades as Lesser Evil
July 9, 2015
Palo Alto Networks' Unit 42 team on Tuesday published a report on Gunpoder, a family of Android malware that can evade detection scans by pretending to be adware. Cong Zheng and Zhi Xu authored the report. The team discovered the new Android malware last November. Its new report aims to spur cooperation within the security community to mount defenses against the threat.
NYSE, United Shutdowns Spark Cyberattack Rumors
July 9, 2015
The New York Stock Exchange on Tuesday halted all transactions for three hours, due to what it maintained was a technical glitch. Trading continued on the other exchanges belonging to its owner, holding company Intercontinental Exchange. "The markets did not plummet with the shutdown," said Jim Wright, chief investment officer at Harvest Financial Partners.
Security Pros Shine Light on Shadowy Cyberspy Ring
July 8, 2015
A highly sophisticated group of hackers who use cutting-edge techniques to shield their attacks from detection has been bedeviling corporations around the world for several years. The group, which Symantec dubbed "Morpho" and Kaspersky Lab calls "Wild Neutron," has hit multibillion-dollar corporations in the Internet, software, pharmaceutical and commodities sectors in at least 11 countries.
Is Isolating the Internet Key to Bulletproof Security?
July 7, 2015
With so many cybersecurity pros drowning in an ever-rising tide of hack attacks on their computer systems, an emerging approach to defending those systems may be the life preserver they've been looking for. The approach doesn't involve beefing up perimeter defenses, carefully scrutinizing network traffic, or applying analytics to employee behavior.
Poll Highlights Container Security Concerns
July 6, 2015
The results of a recent survey on container usage trends suggest that a deployment surge is likely within the next two years -- but also that companies have serious concerns about container security, certification and skills. The survey, commissioned by Red Hat and conducted by TechValidate, assessed enterprise adoption plans for application containers.
Hacking Team's Dingy Laundry Hung Out Online
July 6, 2015
Fireworks of a different kind rocked the security world this Fourth of July weekend, when news surfaced that hackers breached Hacking Team, an Italy-based firm that develops malware for governments and law enforcement. The attackers reportedly exposed 400 GB of data stolen from its servers. "It appears [Hacking Team] were compromised through social engineering, said Bugcrowd's Jonathan Cran.
FBI Hunts SF Bay Area Fiber-Optic Cable Cutters
July 2, 2015
The FBI for the past year has been on the hunt for people slashing fiber-optic cables throughout the San Francisco Bay Area. The FBI called for the public's assistance in June, after 10 attacks had taken place. The 11th occurred on Tuesday, when someone severed cables used by Wave Broadband. "We have been in consultation with the FBI," said Wave Broadband spokesperson Mark Petersen.

See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS
Targeted advertising...
Gives me the creeps -- I hate it.
Is really helpful -- I like the personalization.
Is effective -- it makes business sense.
Is irrelevant to me -- I use an ad blocker.