OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
ECommerceTimes.com
How
NYSE, United Shutdowns Spark Cyberattack Rumors
July 9, 2015
The New York Stock Exchange on Tuesday halted all transactions for three hours, due to what it maintained was a technical glitch. Trading continued on the other exchanges belonging to its owner, holding company Intercontinental Exchange. "The markets did not plummet with the shutdown," said Jim Wright, chief investment officer at Harvest Financial Partners.
Security Pros Shine Light on Shadowy Cyberspy Ring
July 8, 2015
A highly sophisticated group of hackers who use cutting-edge techniques to shield their attacks from detection has been bedeviling corporations around the world for several years. The group, which Symantec dubbed "Morpho" and Kaspersky Lab calls "Wild Neutron," has hit multibillion-dollar corporations in the Internet, software, pharmaceutical and commodities sectors in at least 11 countries.
Is Isolating the Internet Key to Bulletproof Security?
July 7, 2015
With so many cybersecurity pros drowning in an ever-rising tide of hack attacks on their computer systems, an emerging approach to defending those systems may be the life preserver they've been looking for. The approach doesn't involve beefing up perimeter defenses, carefully scrutinizing network traffic, or applying analytics to employee behavior.
Poll Highlights Container Security Concerns
July 6, 2015
The results of a recent survey on container usage trends suggest that a deployment surge is likely within the next two years -- but also that companies have serious concerns about container security, certification and skills. The survey, commissioned by Red Hat and conducted by TechValidate, assessed enterprise adoption plans for application containers.
Hacking Team's Dingy Laundry Hung Out Online
July 6, 2015
Fireworks of a different kind rocked the security world this Fourth of July weekend, when news surfaced that hackers breached Hacking Team, an Italy-based firm that develops malware for governments and law enforcement. The attackers reportedly exposed 400 GB of data stolen from its servers. "It appears [Hacking Team] were compromised through social engineering, said Bugcrowd's Jonathan Cran.
FBI Hunts SF Bay Area Fiber-Optic Cable Cutters
July 2, 2015
The FBI for the past year has been on the hunt for people slashing fiber-optic cables throughout the San Francisco Bay Area. The FBI called for the public's assistance in June, after 10 attacks had taken place. The 11th occurred on Tuesday, when someone severed cables used by Wave Broadband. "We have been in consultation with the FBI," said Wave Broadband spokesperson Mark Petersen.
New Android Malware Sprouting Like Weeds
July 1, 2015
Information stored on an Android smartphone or tablet is vulnerable to almost 4,900 new malware files each day, according to a report G Data SecurityLabs released Wednesday. Cybercriminals' interest in the Android operating system has grown, the firm's Q1 2015 Mobile Malware Report revealed. The number of new malware samples in the first quarter increased 6.4 percent.
Cisco Erects 6 Pillars for the IoT
June 29, 2015
Cisco on Monday launched Cisco IoT System -- a new Internet of Things initiative comprised of 15 products geared toward improving device interoperability. As many as 50 billion devices and objects could be connected to the Internet by 2020, the company forecast, yet today more than 99 percent of things in the physical world currently are unconnected.
The Encryption Software Scuffle
June 29, 2015
In the face of encryption that could block brute force attempts for years, law enforcement agencies at every level have been calling for keys that allow investigators to crack open smartphones and court cases alike. Some of the world's leading tech companies and privacy advocates have called for the White House to stand against any proposal to weaken the security software on consumer products.
Samsung Jams Up Windows Security Updates
June 25, 2015
Samsung has been disabling Windows updates by means of an executable file, Disable_Winduwsupdate.exe, that is part of its SW Update software. The issue came to light on Tuesday, when Microsoft MVP Patrick Barker published a blog post about his discovery when helping a user who was having problems. It seemed that Windows Update kept getting disabled.
Will LastPass Breach Poison Trust in Password Managers?
June 25, 2015
A data breach is no picnic for any organization, but for a company that makes its potato salad by protecting other people's passwords, it's the mother of all nightmares. Yet, that has happened to LastPass twice. In 2011, the service found anomalies in its network traffic that forced it to reset all its users' master passwords. Recently, it came under attack again.
US, Brit Spooks Bedevil Security Software
June 24, 2015
The United States' National Security Agency and the UK's Government Communications Headquarters reportedly have been attacking antivirus and other security software since at least 2008. The aim is to infiltrate networks and track users. The agencies apparently have reverse-engineered security and antivirus software, sometimes under dubious legal authority.
Data Requests Put Amazon Between Rock, Hard Place
June 23, 2015
Amazon's recently released first report on government requests for information revealed that from January to May, it received 813 subpoenas and 25 search warrants. The company fully responded and provided all the requested information sought for 542 of the subpoenas. It provided only some of the requested information for 126 of the cases, and it did not respond to 145 requests.
AT&T, Verizon and WhatsApp Flunk Privacy
June 22, 2015
An Electronic Frontier Foundation survey published last week gave AT&T, Verizon and WhatsApp the thumbs down when it comes to protecting user privacy. Google and Twitter also got a black eye. The five were among 24 companies the EFF evaluated on criteria worked out over the past four years. WhatsApp, now owned by Facebook, also took criticism in the EFF's fifth annual report, "Who Has Your Back?"
Routers Becoming Juicy Targets for Hackers
June 18, 2015
Most consumers pay as much attention to routers as they do to doorknobs. That's not the case with Net marauders. They're finding the devices ripe targets for mischief. "We've seen a big increase in malware designed for home routers," said Incapsula researcher Ofer Gayer. "Every week, we see a new vulnerability in a vendor's routers," he said. "They're low-hanging fruit if you're a hacker."
Swiftkey Security Slipup Exposes Samsung Smartphones
June 17, 2015
At least 600 million Samsung smartphones are vulnerable to remote attacks because of the way the company implemented the SwiftKey keyboard, NowSecure researcher Ryan Welton warned Tuesday. A phone can be attacked if it's connected to a compromised or malicious WiFi network and the SwiftKey app is updating existing languages or adding a new language pack.
Senators Aim to Ground FBI's Warrantless Spy Planes
June 17, 2015
Sen. Ron Wyden, D-Ore., and Sen. Dean Heller, R-Nev., on Wednesday introduced legislation that would require federal government agents to get a warrant before snooping from the sky. "Americans' privacy rights shouldn't stop at the treetops," Wyden said. The issue came to a head following the revelation earlier this month that the FBI was engaged in warrantless aerial surveillance across the U.S.
Can Android Give BlackBerry New Life?
June 16, 2015
BlackBerry could be considering equipping an upcoming smartphone with Google's Android operating system, Reuters reported last week. The move would be consistent with BlackBerry's strategy to focus on software and device management instead of handsets. Such a pivot would take the company away from its current strategy to regain lost market share with a new generation of BlackBerry smartphones.
San Jose to Dabble With Smart City Tech
June 16, 2015
The city of San Jose, California, recently decided to undertake an Internet of Things pilot project. Under a deal finalized last month, anyCOMM, will deploy WiFi sensors on 166 streetlights, to collect data on traffic, sense movement on the streets, turn off streetlights when sidewalks and roads are empty, detect ground shifts and send earthquake warnings, and act as WiFi hotspots.
Duqu 2.0 Makes Other Malware Look Clunky
June 12, 2015
Duqu 2.0 may have just snatched the title of "most sophisticated malware ever," according to Kaspersky Lab, which published a report on the new threat this week. Kaspersky discovered Duqu 2.0 after the malware penetrated its own internal networks. "The philosophy and way of thinking of the Duqu 2.0 group is a generation ahead of anything seen in the APT world," said Kaspersky's Kurt Baumgartner.
Patch Tuesday Sunset Will Be a Mixed Bag for Windows Security
June 11, 2015
Microsoft will phase out Patch Tuesday -- its monthly potpourri of software product fixes -- when it rolls out Windows 10, which could be a mixed bag for the operating system's security. Patches will be applied automatically as they're ready. That means users no longer will have to wait until the second Tuesday in the month to secure their systems from potentially troublesome vulnerabilities.
US Snooping Costs High-Tech Sector $35B and Counting
June 10, 2015
Other countries' concerns over U.S. government surveillance programs likely will cost American businesses more than $35 billion, according to a report released Tuesday by the Information Technology & Innovation Foundation. Originally it was thought that the fallout from Edward Snowden's revelations of U.S. mass surveillance programs would be limited to cloud service providers.
US CIO Orders Federal Websites to Get More Secure
June 10, 2015
U.S. federal CIO Tony Scott on Monday sent a memo to the heads of executive departments and agencies requiring that all publicly accessible federal websites and Web services use HTTPS -- "the strongest privacy and integrity protection currently available for public Web connections." Some federal websites currently use HTTPS, but there has not been a consistent policy across the federal government.
Pega Healthcare CRM Promises 360-Degree View
June 9, 2015
Pega last week announced enhancements to Pegasystems Customer Service for Healthcare, an application that integrates customer service and care management to provide a 360-degree view of all customer interactions. The application provides call center agents with data across administrative, health and care management interactions with the goal of enabling them to provide better service.

See More Articles in Security Section >>
Facebook Twitter LinkedIn Google+ RSS
Targeted advertising...
Gives me the creeps -- I hate it.
Is really helpful -- I like the personalization.
Is effective -- it makes business sense.
Is irrelevant to me -- I use an ad blocker.
How