U.S. Financial Institutions Become Targets of Cyberattacks

American Express confirmed that its website had come under attack last week. The assault, which took the site offline for two hours, marks the latest in a string of powerful digital attacks on American financial institutions that began this past September. JPMorgan Chase and others experienced a similar attack this month. The assaults collectively resulted in the loss of millions of dollars. Continue reading U.S. Financial Institutions Become Targets of Cyberattacks

Ethical Hacking: Going Undercover to Train Employees

Businesses have been training their employees to be more aware of potential cyberattacks. However, here’s the twist: the employees don’t always know they are being trained. So-called “ethical hackers” have been hired to lure employees with different tactics such as fake emails promising work bonuses and pictures of adorable cats with links or software that teaches workers how to avoid online dangers. Continue reading Ethical Hacking: Going Undercover to Train Employees

CIA Discusses Plans for Collecting and Analyzing Big Data

During a presentation at last week’s GigaOM Structure:Data conference in New York, Ira “Gus” Hunt, the CIA’s chief technology officer, detailed the Agency’s vision for collecting and analyzing information people put on the Internet. The presentation came just two days after it was reported that the CIA is about to sign a cloud computing contract with Amazon worth up to $600 million over 10 years. Continue reading CIA Discusses Plans for Collecting and Analyzing Big Data

Coalition of 38 States Draws Up Security Steps for Google

After a two-year investigation into whether or not Google’s Street View violates privacy protections, law enforcement officials have again told the company it is time to shape up. Google acknowledged breaches this week and said no longer will there be a scenario in which a midlevel engineer launches a program to secretly gather data from possibly millions of unencrypted global Wi-Fi networks, unbeknownst to his bosses. Continue reading Coalition of 38 States Draws Up Security Steps for Google

Obama Seeks Corporate Support for Cybersecurity Initiative

President Obama met with a group of 13 corporate executives at the White House on Wednesday to discuss growing cybersecurity concerns and to enlist support for his proposed legislation to combat the threat of computer warfare and corporate espionage. Among the chief execs were Rex W. Tillerson of Exxon Mobil, Randall L. Stephenson of AT&T, Brian T. Moynihan of Bank of America and Jamie Dimon of JPMorgan Chase. Continue reading Obama Seeks Corporate Support for Cybersecurity Initiative

China Hacking Hollywood Computers, Say Security Experts

Some cybersecurity experts say that Chinese hackers have invaded Hollywood’s computers, much like they did to the systems of Facebook, Apple, The New York Times and many others. The root of the problem, according to The Hollywood Reporter, is China’s contempt for intellectual property. In a country where most video and software is pirated, the culture of copying runs deep. Continue reading China Hacking Hollywood Computers, Say Security Experts

Danny Hillis Asks: What Happens if the Internet Goes Down?

At TED 2013 last week, Danny Hillis, an early Internet user who registered the third domain name ever (Think.com), spoke on the vulnerability of the expanding Internet. While standing on stage for his talk, he held up a one-inch-thick notebook, which listed every person — including name, address and phone number — who had an Internet address in 1982. By his estimates, that book would be 25 miles tall in today’s world. Continue reading Danny Hillis Asks: What Happens if the Internet Goes Down?

Samsung Preps Android to Take On BlackBerry in Enterprise

Samsung Electronics has another target in its ever-growing sights: the BlackBerry. Until recently, Samsung has marketed its smartphones very successfully to consumers worldwide, but never to businesses. That’s been changing over the past year, as the South Korean manufacturer has been beefing up the Google Android software that runs its phones, in an effort to give businesses a phone with increased security. Continue reading Samsung Preps Android to Take On BlackBerry in Enterprise

China Denies Cyberattack Allegations from Mandiant Report

After U.S. computer-security firm Mandiant Corp. accused China of stealing large swaths of data from U.S. companies, China flatly denied the accusation. In a 74-page report, the firm claims a group attached to China’s People’s Liberation Army stole data from 141 companies since 2006, 115 of which were in the U.S., spanning industries like information technology, telecommunications, aerospace and energy. Continue reading China Denies Cyberattack Allegations from Mandiant Report

CISPA Reintroduced: Activist Groups Fuel Online Response

After Congress reintroduced the controversial Cyber Intelligence Sharing and Protection Act (CISPA), a collection of Internet freedom activists quickly jumped into action. “Among them have been Demand Progress and Fight for the Future, who this week helped 300,000 citizens send a petition against CISPA to the lawmakers behind it,” reports Mashable. Continue reading CISPA Reintroduced: Activist Groups Fuel Online Response

Twitter Hacked: 250,000 Users Affected by Recent Attack

Hackers have carried out a sophisticated attack on Twitter, prompting the company to release a statement explaining how its “investigation has thus far indicated that the attackers may have had access to limited user information — usernames, email addresses, session tokens and encrypted/salted versions of passwords — for approximately 250,000 users.” The nature of the attack suggests it could be part of a larger effort. Continue reading Twitter Hacked: 250,000 Users Affected by Recent Attack

Rapid7 Uncovers Shocking Flaws in Universal Plug and Play

Computer security firm Rapid7 has discovered and outlined three sets of security flaws in Universal Plug and Play (UPnP), a component that allows devices to connect and communicate on networks. “The flaws would allow hackers to steal passwords and documents or take remote control of webcams, printers, security systems, and other devices that are connected to the Internet,” reports Wired. Continue reading Rapid7 Uncovers Shocking Flaws in Universal Plug and Play

Internet Of Things Has Arrived, So Have Security Concerns

The “Internet of Things” has arrived and companies across multiple industries are developing means of linking smartphones, vehicles, household appliances and more to industrial-strength sensors, the Internet and each other. Wired notes that while it may seem to be resulting in somewhat mundane technical features as of now, “the potential benefits to lifestyles and businesses are huge” — in both good and bad ways. Continue reading Internet Of Things Has Arrived, So Have Security Concerns

CES 2013: NSM Group Forms LLC for Secure Memory Tech

A consortium first launched in 2011 to address secure memory needs has established an LLC. Formed January 2, NSM Initiatives LLC is making its first appearance at CES. NSM, or Next Generation Secure Memory, is a developing content protection technology that will enable the transfer and viewing of HD content into a mobile environment. A consortium including Panasonic, Samsung, Sony and Toshiba is developing the technology. Continue reading CES 2013: NSM Group Forms LLC for Secure Memory Tech

Malware Shift: Android Overtakes Windows as Top Security Threat

  • In the 2013 Security Threat Report from security firm Sophos, it’s been revealed that Android is now the top market for hackers, beating out previous frontrunner Microsoft’s Windows OS.
  • “The security firm found that during a three-month period this year, 10 percent of Android-based devices experienced some form of malware attack. Just 6 percent of Windows PCs, meanwhile, were hit by an attack,” according to Technology Review.
  • Cybercriminals understand more than ever that the technological future is in mobile, making this an issue of high concern considering over 100 million Android devices shipped worldwide in the second quarter of 2012, notes the report.
  • Because Android is fairly new, especially when compared to Windows OS, users are not yet conditioned to security concerns and will click on links or open unknown apps.
  • “To make matters worse, the anti-malware tools available in the Android ecosystem just aren’t as strong as they could be,” explains the article. “Security firms are behind the times a bit. And until they catch up, we’re all at risk.”
  • According to the Saphos report, in order to stay safe, users should only surf the Web to known sites and should not download anything that could be dangerous.

Page 37 of 38«...1020...29303132333435363738