Security

Former Hacking Team developer reportedly in contact with a terrorist group

An individual who did work for Hacking Team was in contact with hackers working for a terrorist organization, and disgruntled employees -- who deny the charge -- were planning to sell an antidote to the spyware vendor's surveillance software, an Italian newspaper reported Friday.

By Philip Willan | 01 August, 2015 04:20

Tags: security, Hacking Team

Black Hat 2015: Cracking just about anything

Researchers at the Black Hat 2015 conference next week will show how to crack Internet routing protocols, malware-detecting honeypots, radio-frequency ID gear that gates building access, and more, but also offer tips on how to avoid becoming victims to their new attacks.

By Tim Greene | 01 August, 2015 03:03

Tags: security, black hat, Accuvant

Ad group urges FTC to reject right to be forgotten in US

The U.S. Federal Trade Commission should reject a privacy group's push to extend the E.U.'s controversial right to be forgotten rules to the U.S. because such regulations would have a "sweeping" negative effect on many U.S. companies, a trade group said.

By Grant Gross | 01 August, 2015 01:54

Tags: U.S. Federal Trade Commission, Consumer Watchdog, regulation, Association of National Advertisers, John Simpson, government, internet, search engines, privacy, Daniel Jaffe, Peter Fleischer, Google, security

Hacker steals Bitdefender customer log-in credentials, attempts blackmail

A hacker extracted customer log-in credentials from a server owned by Bitdefender that hosted the cloud-based management dashboards for its small and medium-size business clients.

By Lucian Constantin | 31 July, 2015 23:40

Tags: intrusion, security, data breach, bitdefender

Hacker shows he can locate, unlock and remote start GM vehicles

A security researcher has posted a video on YouTube demonstrating how a device he made can intercept wireless communications to locate, unlock and remotely start GM vehicles that use the OnStar RemoteLink mobile app.

By Lucas Mearian | 31 July, 2015 11:02

Tags: Fiat Chrysler, OnStar, Automotive, security, 21, industry verticals, telematics, youtube

Researchers improve de-anonymization attacks for websites hiding on Tor

Researchers have developed a new technique that could allow attackers to determine with a high degree of accuracy which Tor websites users are accessing and where those websites are hosted.

By Lucian Constantin | 31 July, 2015 06:29

Tags: online safety, security, Massachusetts Institute of Technology, encryption, TOR Project, Qatar Computing Research Institute, privacy

Google rejects French request to expand right to be forgotten

Google won't comply with an order from France's privacy watchdog group to apply the right to be forgotten to all its search results around the world.

By Fred O'Connor | 31 July, 2015 04:18

Tags: Google, security, internet, government

Critical BIND denial-of-service flaw could disrupt large portions of the Internet

Attackers could exploit a new vulnerability in BIND, the most popular Domain Name System (DNS) server software, to disrupt the Internet for many users.

By Lucian Constantin | 31 July, 2015 03:19

Tags: Errata Security, patches, security, Internet Systems Consortium, patch management, Exploits / vulnerabilities

Opponents focus on defeating CISA cyberthreat info sharing bill

Opponents of a U.S. Senate bill intended to encourage businesses to share information about cyberthreats may have stalled a vote on the legislation.

By Grant Gross | 31 July, 2015 03:14

Tags: U.S. Senate, Mitch McConnell, Information Technology Industry Council, U.S. Department of Homeland Security, U.S. National Security Agency, legislation, Fight for the Future, privacy, Stanford University, Dean Garfield, Ron Wyden, Jonathan Mayer, security, government, data protection

Is the smartphone market saturated?

Smartphone sales increased substantially in the second quarter of 2015, but the rate of growth continued to slow, fueling concerns that the market has started to become saturated, according to a study released today by Juniper Research.

By Jon Gold | 31 July, 2015 03:01

Tags: Juniper Research, smartphones, iPhone, Vine, Xiaomi, galaxy, Blackberry, Anthem, Apple, consumer electronics, symantec

Endpoint security firm SentinelOne challenges traditional anti-virus software

Next-generation endpoint protection vendor SentinelOne has received the same certification that many traditional antivirus platforms seek, meaning it can be considered suitable for meeting certain requirements of industry and governmental regulations.

By Tim Greene | 31 July, 2015 02:14

Tags: palo alto networks, Gartner, Bit9, security, Network World

The Upload: Your tech news briefing for Thursday, July 30

Obama wants to boost U.S. supercomputing power...OPM, Anthem hackers also hit United Airlines...Oracle preps 'Sonoma' chip for low-priced Sparc servers...and more tech news.

By IDG News Service staff | 30 July, 2015 21:57

Tags: United Airlines, U.S. Office of Personnel Management, Bishop Fox, hardware systems, Oracle, U.S. Navy, Facebook, Anthem, Yahoo, consumer electronics, Google, security

Video gaming sparks excitement in China

These are exciting times to be a gamer in China, according to 19-year-old Dai Qi, a soon-to-be college student.

By Michael Kan | 30 July, 2015 20:55

Tags: game software, Game platforms, Microsoft, regulation, games, government, sony

OPM, Anthem hackers reportedly also breached United Airlines

The cyberespionage group that stole the personal records of millions of Americans from U.S. health insurer Anthem and the U.S. Office of Personnel Management (OPM) has also reportedly breached United Airlines.

By Lucian Constantin | 30 July, 2015 20:14

Tags: United Airlines, United Continental Holdings, intrusion, symantec, security, U.S. Office of Personnel Management, data breach, malware, Anthem

Despite H-1B lottery, offshore firms dominate visa use

Offshore outsourcing firms that do most of their work in India remain the largest users of the H-1B visa for computer-related jobs, seemingly unaffected by the odds of the visa lottery, according to new data.

By Patrick Thibodeau, Sharon Machlis | 30 July, 2015 19:57

Tags: services, outsourcing, infosys, Google, Microsoft, H-1B, Tata Consultancy Services, Oracle, IT outsourcing

Mimecast launches services from Australian data centres

Email services security vendor Mimecast has begun offering co-located data centre services from two facilities in New South Wales.

By Hamish Barwick | 30 July, 2015 16:17

Tags: co-location, Mimecast, data centres, Data Centre

Researchers develop astonishing Web-based attack on a computer's DRAM

Millions of Web users could be vulnerable to an attack on their computer's DRAM via the Web, a surprising development that expands on a bug that has increasingly worried computer security experts.

By Jeremy Kirk | 30 July, 2015 11:07

Tags: security, Graz University of Technology, Exploits / vulnerabilities

Symantec: Well-heeled hacking group Black Vine behind Anthem breach

A group has been singled out as the attacker behind the recently disclosed hack against Anthem, believed to be the largest waged against a health care company.

By Fred O'Connor | 30 July, 2015 07:05

Tags: symantec, security, health care, industry verticals

Trade groups tell Congress to keep its hands off IoT

The U.S. Congress should take a hands-off approach toward the burgeoning Internet of Things industry and let vendors figure out how to deal with privacy and security issues, representatives of four trade groups said.

By Grant Gross | 30 July, 2015 06:31

Tags: Information Technology Industry Council, Mitch Bainwol, regulation, government, internet, Judy Chu, Consumer Electronics Association, Darrell Issa, Dean Garfield, Ted Poe, Alliance of Automobile Manufacturers, U.S. House of Representatives, Internet of Things, Gary Shapiro

Maliciously crafted MKV video files can be used to crash Android phones

A malicious application or Web page could be used to crash Android devices, in some cases persistently, due to a vulnerability in a multimedia processing component.

By Lucian Constantin | 30 July, 2015 00:41

Tags: Google, trend micro, security, mobile security, Exploits / vulnerabilities, malware

Top Whitepapers

Featured Whitepapers