Security

Ad fraud Trojan updates Flash Player so that other malware can't get in

Someone call the malware antitrust commission: Recent versions of the Kovter ad fraud Trojan, which infects computers through Web-based exploits, close the door after themselves by updating Flash Player to the latest version.

By Lucian Constantin | 04 July, 2015 01:32

Tags: patches, security, Desktop security, Exploits / vulnerabilities, malware

Cisco leaves key to all its Unified CDM systems under doormat

Cisco Systems recently realized that its Unified Communications Domain Manager (Unified CDM) software contains a default privileged account with a static password that cannot be changed, exposing the platform to hacking by remote attackers.

By Lucian Constantin | 03 July, 2015 21:13

Tags: patches, intrusion, Cisco Systems, security, Access control and authentication, Exploits / vulnerabilities

Android ransomware on the rise in Australia

More than 25 per cent of malware distributed in Australia during May was Android ransomware, a rise from February when Android ransomware levels were at six per cent, according to Bitdefender research.

By Hamish Barwick | 03 July, 2015 11:36

Tags: Android, ransomware, malware, bitdefender

Plex hacker demands Bitcoin ransom for return of data

Video streaming service Plex has reset user passwords after it was breached by a hacker who threatened to release stolen data unless he's paid a ransom.

By Jeremy Kirk | 03 July, 2015 10:29

Tags: security, data breach, Plex

Attackers abuse legacy routing protocol to amplify distributed denial-of-service attacks

Servers could be haunted by a ghost from the 1980s, as hackers have started abusing an obsolete routing protocol to launch distributed denial-of-service attacks.

By Lucian Constantin | 02 July, 2015 23:35

Tags: akamai, security

The Upload: Your tech news briefing for Thursday, July 2

Line up for IPv4 addresses... HP makes PC/enterprise split official... PayPal to buy money transfer service Xoom... and more tech news

By IDG News Service staff | 02 July, 2015 21:52

Tags: hardware systems, mastercard, finance, paypal, American Registry for Internet Numbers, Xoom, industry verticals, intel, internet, Hewlett-Packard, Uber Technologies, security, Shyp

Xbox One, PS4 sales in China could be disappointing

After China lifted its ban on video game consoles, both Microsoft and Sony moved fast to launch their products in the country. But at least for this year, the sales will be lackluster, according to a research firm.

By Michael Kan | 02 July, 2015 14:18

Tags: Game platforms, Microsoft, games, sony

Monitoring terrorists okay, targeted advertising not: Survey

Seventy nine per cent of Australians support monitoring of social media to detect terrorist activity but draw the line at companies using Twitter, Facebook or LinkedIn to make targeted advertising offers according to a new survey.

By Hamish Barwick | 02 July, 2015 11:28

Tags: social media analytics, social media, unisys

DEA agent pleads guilty to accepting Silk Road funds

A Drug Enforcement Administration agent intimately involved in the Silk Road investigation admitted on Wednesday he secretly accepted bitcoins from the underground website's operator and illegally took other funds.

By Jeremy Kirk | 02 July, 2015 09:34

Tags: U.S. Department of Justice, Criminal, security, legal, cybercrime

VPN users, beware: You may not be as safe as you think you are

It's become common practice to use virtual private networks for extra privacy and security in this era of mass surveillance, but a study published this week suggests such networks may not be as safe as they're commonly made out to be.

By Katherine Noyes | 02 July, 2015 06:40

Tags: Networking, security, Queen Mary University of London, mobile security, vpn, Sapienza University of Rome, encryption

Hacktivist group possibly compromised hundreds of websites

A hacker group known as Team GhostShell is publishing snippets of sensitive data allegedly stolen from the databases of hundreds of compromised websites.

By Lucian Constantin | 02 July, 2015 02:19

Tags: intrusion, symantec, security, data breach, privacy

One third of enterprise iOS devices vulnerable to app, data hijacking attacks

Apple released patches for several exploits that could allow maliciously crafted applications to destroy apps that already exist on devices, access their data or hijack their traffic, but a large number of iOS devices are still vulnerable.

By Lucian Constantin | 02 July, 2015 00:14

Tags: patches, Apple, security, mobile security, FireEye, Exploits / vulnerabilities, malware

Austrian court dismisses class action suit against Facebook

An Austrian court has dismissed a class action suit concerning Facebook's privacy policy, saying it has no jurisdiction over the case.

By Peter Sayer and Loek Essers | 01 July, 2015 23:52

Tags: security, Civil lawsuits, legal, Europe-v-Facebook, privacy, Facebook

The Upload: Your tech news briefing for Wednesday, July 1

Court says NSA can keep collecting phone records... Vandals cut cables again... Leap second largely trouble-free... and more tech news

By IDG News Service staff | 01 July, 2015 21:55

Tags: U.S. Federal Bureau of Investigation, Amazon Web Services, U.S. National Security Agency, hardware systems, legal, R Consortium, internet, Facebook, Cisco Systems, Google, Microsoft, security

China tightens grip over the Internet with new security law

China has adopted a new security law that gives the government control over its Internet infrastructure, along with any critical data.

By Michael Kan | 01 July, 2015 19:07

Tags: regulation, security, government

More than 28 billion gigabytes of storage shipped last quarter

Worldwide data storage hardware sales saw a boon in the first quarter of this year, with a 41.4% leap over the same quarter in 2014.

By Lucas Mearian | 01 July, 2015 10:49

Tags: Data storage, IDC, storage

Surveillance court extends NSA's phone records collection

A U.S. surveillance court has extended a controversial telephone records dragnet while the National Security Agency works to wind down the program on orders from Congress.

By Grant Gross | 01 July, 2015 05:25

Tags: telecommunication, security, Ron Wyden, U.S. Foreign Intelligence Surveillance Court, U.S. National Security Agency, Michael Mosman, U.S. Congress, government, privacy, U.S. FBI

Robot apocalypse unlikely, but researchers need to understand AI risks

Recent concerns from tech luminaries about a robot apocalypse may be overblown, but artificial intelligence researchers need to start thinking about security measures as they build ever more intelligent machines, according to a group of AI experts.

By Grant Gross | 01 July, 2015 03:54

Tags: Berkeley, Information Technology and Innovation Foundation, Nate Soares, robotics, University of California, Georgia Tech, bill gates, Machine Intelligence Research Institute, Carnegie Mellon University, Ronald Arkin, stephen hawking, Manuela Veloso, security, Elon Musk, Stuart Russell, Robert Atkinson, popular science

Amazon releases open source cryptographic module

Potentially saving the world from another online security disaster like last year's Heartbleed, Amazon Web Services has released as open source a cryptographic module for securing sensitive data passing over the Internet.

By Joab Jackson | 01 July, 2015 03:03

Tags: Amazon Web Services, open source, security, Varnish, software, encryption

EU sets June 2017 as date to end mobile roaming charges

European Union citizens will have to wait another couple of years before they are able to use their mobile phones anywhere within the EU without surcharge, after a compromise reached by lawmakers Monday night.

By Peter Sayer and Loek Essers | 01 July, 2015 02:20

Tags: Council of the European Union, regulation, european commission, legislation, government, European Parliament

Top Whitepapers

Featured Whitepapers