Keyword: computersecurity

Brevity: Headers | « Text »
  • More than 80% of healthcare IT leaders say their systems have been compromised

    08/27/2015 6:31:37 PM PDT · by markomalley · 6 replies
    Computerworld ^ | 8/27/15 | Lucas Merian
    Eighty-one percent of healthcare executives say their organizations have been compromised by at least one malware, botnet or other kind of cyberattack during the past two years, according to a survey by KPMG.The KPMG report also states that only half of those executives feel that they are adequately prepared to prevent future attacks. The attacks place sensitive patient data at risk of exposure, KPMG said.The 2015 KPMG Healthcare Cybersecurity Survey polled 223 CIOs, CTOs, chief security officers and chief compliance officers at healthcare providers and health plans.Sixty-six percent of the IT executives at healthcare plans who were surveyed said they...
  • How your smartphone's battery life can be used to invade your privacy

    08/04/2015 6:33:19 AM PDT · by TigerLikesRooster · 24 replies
    The Guardian ^ | Tuesday 4 August 2015 | Alex Hern
    How your smartphone's battery life can be used to invade your privacy A group of researchers have demonstrated how to track users with nothing more than their remaining battery power, which could compromise privacy Alex Hern Tuesday 4 August 2015 08.18 BST A little-known feature of the HTML5 specification means that websites can find out how much battery power a visitor has left on their laptop or smartphone – and now, security researchers have warned that that information can be used to track browsers online. The battery status API is currently supported in the Firefox, Opera and Chrome browsers, and...
  • How Obama’s Poor Judgment Led to the Chinese Hack of OPM

    07/27/2015 7:53:58 AM PDT · by detective · 8 replies
    The Daily Signal ^ | July 27, 2015 | Paul Conway
    The maxim that “personnel is policy” transcends partisan affiliations and political labels. Every president, including President Barack Obama, has the authority to staff federal agencies with loyal political appointees.
  • Chinese Hack of U.S. Employee Database Worse Than First Reported

    06/18/2015 1:12:30 PM PDT · by detective · 23 replies
    The New American ^ | June 17, 2015 | C. Mitchell Shaw
    As we learn more about the recent cyber-attacks on U.S. federal employee records by Chinese hackers, it is becoming increasingly clear that the problem is much worse than many previously thought. In testimony before the House Oversight and Government Reform Committee, officials within the Office of Personnel Management (OPM) admitted on Tuesday to major lapses in basic cyber-security protocols that left government systems vulnerable to at least two attacks. Those attacks allowed hackers to breach sensitive personal data about nearly all employees of the federal government and millions of persons with security clearances, according to a report by the Associated...
  • IRS botches computer security, risks taxpayer info: audit

    03/19/2015 2:58:16 PM PDT · by PROCON · 8 replies ^ | March 19, 2015 | Stephen Dinan
    The IRS sometimes uses old software without key security patches that leave its computer systems vulnerable and could endanger taxpayers’ private information, the Government Accountability Office said Thursday. GAO investigators raised the issue last year, identifying 69 weaknesses. The IRS said it had corrected two dozen of them, but the new audit found just 14 of them were actually fixed, leaving dozens of weaknesses still to be resolved. Part of the problem is that the IRS hasn’t even always followed its own guidelines for assessing risks and creating information security plans, the GAO said.
  • White House: Hillary Sent Classified Emails Despite Her Claim to the Contrary

    03/11/2015 7:06:16 AM PDT · by rightistight · 49 replies
    Pundit Press ^ | 3/11/15 | Aurelius
    Before Hillary Clinton’s news conference yesterday, Jen Psaki, the spokesperson for the United States Department of State, stated that the White House could not immediately released the former Secretary of State’s emails because “it will take several months” to redact all the classified things she sent. Despite this, Ms. Clinton then stated in her press conference, “I did not email any classified material to anyone on my email. I’m certainly well aware of the classification requirements and did not send classified material.” Someone is not telling the truth. Either Ms. Psaki lied in order to prevent the immediate release of...
  • Physical security of the Clinton e-mail sever

    03/10/2015 9:00:22 PM PDT · by 2ndDivisionVet · 159 replies
    And Still I Persist… ^ | March 10, 2015 | Bruce F. Webster
    I’ve raised in prior posts (here and here) the issue of physical security of the e-mal server, which is why were it was located and how it was set up matters. Last night, Mitch LaKind — who has experience setting up secure military e-mail servers — wrote me about the detailed issues surrounding Clinton’s approach. I’ll let him speak for himself (emphasis mine, though): As a former contractor to the Air Force, I personally managed the Microsoft Exchange servers that were installed at Thule Air Base. My experience with Microsoft Exchange goes back to 1997, when the earliest versions...
  • “FREAK” flaw undermines security for Apple and Google users, researchers discover

    03/03/2015 1:22:01 PM PST · by Swordmaker · 17 replies
    The Washington Post ^ | March 3 at 12:42 PM | By Craig Timberg
    Technology companies are scrambling to fix a major security flaw that for more than a decade left users of Apple and Google devices vulnerable to hacking when they visited millions of supposedly secure Web sites, including, and The flaw resulted from a former U.S. government policy that once forbid the export of strong encryption and required that weaker “export-grade” products be shipped to customers in other countries, say the researchers who discovered the problem. These restrictions were lifted in the late 1990s, but the weaker encryption got baked into widely used software that proliferated around the world...
  • How Lenovo's dangerous Superfish adware put its customers at risk

    02/20/2015 1:19:16 PM PST · by smokingfrog · 31 replies
    Consumer Reports ^ | 2-20-15 | Donna Tapellini
    The Internet is lighting up with warnings about Superfish, an adware program that came preinstalled on many Lenovo laptops in the past six months. Like a lot of the bloatware that comes on new computers, Superfish exists to help push advertising, not to serve any real consumer need. That would be annoying enough, but Superfish seriously undermines the user's safety, according to many security experts. Superfish is a piece of third-party software that Lenovo installed to, as it says in its apology to consumers, “enhance the shopping experience.” That means it's meant to help advertisers target potential customers. But security...
  • Today is The Last Day to Get 2GB of Free Google Drive Storage

    02/17/2015 7:06:15 AM PST · by lbryce · 17 replies
    Business Insider ^ | February 17, 2015 | Steven Tweeedie
    Please seem my comments below Google Drive is offering its users 2GB of free storage for completing a simple security checkup. It only takes a couple of minutes to complete, but the offer only lasts until Feb. 17. Designed to make sure everything about your account is shipshape, the security checkup runs through a checklist of security features examining your account recovery information, recent activity, account permissions, and your 2-step verification settings. To access the security checkup, head on over to your Google account page. Next, click "Get Started" button to begin the checkup.
  • Microsoft rescues XP users with emergency browser fix

    05/01/2014 10:50:49 AM PDT · by dayglored · 71 replies
    Reuters ^ | May 1, 2014 | Jim Finkle
    Microsoft is helping the estimated hundreds of millions of customers still running Windows XP, which it stopped supporting earlier this month, by providing an emergency update to fix a critical bug in its Internet Explorer browser. Microsoft Corp rushed to create the fix after learning of the bug in the operating system over the weekend when cybersecurity firm FireEye Inc warned that a sophisticated group of hackers had exploited the bug to launch attacks in a campaign dubbed "Operation Clandestine Fox. ...
  • Stop using Microsoft's IE browser until bug is fixed, US and UK warn

    04/28/2014 6:24:40 PM PDT · by markomalley · 52 replies
    CNET ^ | 4/28/2014 | Seth Rosenblatt
    It's not often that the US or UK governments weigh in on the browser wars, but a new Internet Explorer vulnerability that affects all major versions of the browser from the past decade has forced it to raise an alarm: Stop using IE. The zero-day exploit, the term given to a previously unknown, unpatched flaw, allows attackers to install malware on your computer without your permission. That malware could be used to steal personal data, track online behavior, or gain control of the computer. Security firm FireEye, which discovered the bug, said that the flaw is being used with a...
  • Computer Security Software Opinion

    04/21/2014 7:05:52 AM PDT · by GYPSY286 · 31 replies
    None | April 21, 2014 | Gypsy286
    Favored Computer Security Software-What's the best and most economical?
  • Apple Says iOS, OSX and “Key Web Services” Not Affected by Heartbleed Security Flaw

    04/11/2014 5:58:05 PM PDT · by Swordmaker · 36 replies ^ | April 10, 2014, 1:42 PM PDT | By Mike Isaac
    Apple said Thursday that its mobile, desktop and Web services weren’t affected by a major flaw in a set of security software used by hundreds of thousands of websites. The flaw, codenamed “Heartbleed” and first reported by Web security firm Codenomicon, was discovered in a technology called “OpenSSL” — a set of encryption software used by Web companies to safeguard user information. Sites that use OpenSSL will display a small “lock” icon in the top left-hand corner of your Web browser’s address bar (though not all sites showing this lock use OpenSSL); the technology is used on more than two-thirds...
  • NSA Paid a Huge Security Firm $10 Million to Keep Encryption Weak

    12/20/2013 4:16:47 PM PST · by James C. Bennett · 99 replies
    Gizmodo ^ | 20 dec 2013 | Gizmodo
    Reuters reports that the NSA paid massive computer security firm RSA $10 million to promote a flawed encryption system so that the surveillance organization could wiggle its way around security. In other words, the NSA bribed the firm to leave the back door to computers all over the world open. Thanks to documents leaked by Edward Snowden, we already knew the NSA played a central role in promoting a flawed formula for generating random numbers, which if used in encryption, essentially gives the spies easy access to computing systems. A piece of RSA software, bSafe, became the most significant vector...
  • How The NSA Deploys Malware: An In-Depth Look at the New Revelations

    10/09/2013 10:34:00 AM PDT · by shego · 23 replies
    EFF ^ | 10/8/13 | Dan Auerbach
    We've long suspected that the NSA, the world's premiere spy agency, was pretty good at breaking into computers. But now, thanks to an article by security expert Bruce Schneier—who is working with the Guardian to go through the Snowden documents—we have a much more detailed view of how the NSA uses exploits in order to infect the computers of targeted users. The template for attacking people with malware used by the NSA is in widespread use by criminals and fraudsters, as well as foreign intelligence agencies, so it's important to understand and defend against this threat to avoid being a...
  • How to remain secure against NSA surveillance

    09/06/2013 4:15:48 AM PDT · by shego · 41 replies
    The Guardian ^ | 9/5/13 | Bruce Schneier
    Now that we have enough details about how the NSA eavesdrops on the internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves.... At this point, I feel I can provide some advice for keeping secure against such an adversary.... 1) Hide in the network. Implement hidden services. Use Tor to anonymize yourself. Yes, the NSA targets Tor users, but it's work for them.... 2) Encrypt your communications. Use TLS. Use IPsec. Again, while it's true that the NSA targets encrypted connections--and it may have explicit exploits...
  • (Vanity) BEST free antivirus/security program?

    09/03/2013 1:08:21 PM PDT · by Doogle · 96 replies
    me | 09/03/13 | me
    Need to download a FREE program...need recommendations..
  • Zero Knowledge Proof may Answer Computer Security Question

    09/03/2013 9:35:49 AM PDT · by null and void · 39 replies
    Scientific Computing ^ | 08/28/2013 - 7:08pm | Bill Steele, Cornell University
    In the age of the Internet, it’s getting harder and harder to keep secrets. When you type in your password, there’s no telling who might be watching it go by. However, new research at Cornell may offer a pathway to more secure communications. The answer is to not send sensitive information at all. Rafael Pass, associate professor of computer science, has developed a new protocol, or set of rules, to create what computer scientists call a “zero knowledge proof.” “I think zero knowledge proofs are one of the most amazing notions in computer science,” Pass said. “What we have done...
  • Built-in backdoor: German govt warns of significant Windows 8 security danger

    08/25/2013 9:16:51 AM PDT · by opentalk · 7 replies ^ | August 23, 2013
    Leaked documents from the German Federal Office for Information Security (BSI) indicate that the organization has become suspicious of Trusted Platform Module (TPM) technology built into an increasing number of Windows 8 PCs and tablets. Documents uncovered and leaked by German news outlet Zeit Online found that the German Ministry of Economic Affairs was displaying significant unease with the combined technologies, suggesting the possibility that a backdoor could be created for further covert NSA surveillance operations. The backdoor in question would allow Microsoft to control the computer remotely. “Trusted Computing,” a method developed and promoted by the Trusted Computing Group,...
  • Provably Secure DNS: A Case Study in Reliable Software

    07/02/2013 7:14:11 AM PDT · by OneWingedShark · 16 replies ^ | Unknown | Barry Fagin and Martin Carlisle
    Abstract. We describe the use of formal methods in the development of IRONSIDES, an implementation of DNS with superior performance to both BIND and Windows, the two most common DNS servers on the Internet. More importantly, unlike BIND and Windows, IRONSIDES is impervious to all single-packet denial of service attacks and all forms of remote code execution. Introduction DNS is a protocol essential to the proper functioning of the Internet. The two most common implementations of DNS are the free software version BIND and the implementations that come bundled with various versions of Windows. Unfortunately, despite their ubiquity and...
  • Seeking Surveillance Safe Search Engines

    06/17/2013 7:01:42 AM PDT · by ShadowAce · 11 replies
    FOSS Force ^ | 14 June 2013 | Christine Hall
    While helping our colleague Dave Bean as he worked to get his essay on Google and the NSA ready for publication, I found myself wondering if any of this latest news on the government’s forcing their nose into everybody-in-the-world’s business would have any lasting effect. Sadly, I figured not–if there was any change, it’d only be temporary. I’ve spent too many years on this planet to expect too much in the way of permanent change for the better. DuckDuckGo’s main page. Click to enlarge.Sadly, I’m of the generation that learned of the advent of global warming way back in the...
  • FBI: Hundreds Of Thousands May Lose Internet In July

    06/14/2013 9:45:51 AM PDT · by Bratch · 54 replies ^ | April 21, 2012 | AP
    For computer users, a few mouse clicks could mean the difference between staying online and losing Internet connections this summer. Unknown to most of them, their problem began when international hackers ran an online advertising scam to take control of infected computers around the world. In a highly unusual response, the FBI set up a safety net months ago using government computers to prevent Internet disruptions for those infected users. But that system is to be shut down. The FBI is encouraging users to visit a website run by its security partner, , that will inform them whether they're...
  • The All-Seeing Eye

    06/14/2013 8:12:57 AM PDT · by giant sable · 30 replies ^ | June 14, 2013 | Michael S. Malone
    The other day, my college age son quietly went around the house and put electricians tape over the camera lenses on the displays of all our home computers.
  • Oracle -- Patches 42 security holes -- in Java

    04/17/2013 8:21:22 AM PDT · by Ernest_at_the_Beach · 26 replies
    Fudzilla ^ | Wednesday, 17 April 2013 09:33 | Nick Farrell
    Patches 42 security holes Oracle has released a major security update for the version of Java programming language that runs inside Web browsers. The patch fixes 42 vulnerabilities within Java, including "the vast majority" of those that have been rated as the most critical. Oracle Executive Vice President Hasan Rizvisaid that a series of big security flaws in the Java plug-in for browsers have been uncovered in the past year by researchers and hackers, and some have been used by criminal groups. One hacking campaign infected computers using Microsoft Windows and Apple software inside hundreds of companies.Earlier this year the US Department...
  • View Internet Porn, Get Blackmailed By Hackers (SYMC)

    11/11/2012 10:39:46 AM PST · by thecodont · 18 replies
    Business Insider via San Francisco Chronicle / ^ | Published 10:53 a.m., Friday, November 9, 2012 | Julie Bort, provided by BUISNESS INSIDER
    <p>Hackers have discovered a new way to part computer uses with their money. They plant malware on a computer that threatens to report the computer user to the police for viewing or distributing porn.</p> <p>It's a form of hacking called "ransomware," according to a new report by security company Symantec, which estimates hackers are earning upwards of $5 million a year from computer users who fall for the scam and pay the blackmail.</p>
  • Romney email scam infects computers (Beware and protect yourself!)

    10/13/2012 10:10:19 PM PDT · by Innovative · 12 replies
    FoxNews ^ | Oct 12, 2012 | Ben Weitzenkorn
    "CNN Breaking News -- Mitt Romney Almost President," reads the subject line of an email phishing scam aimed at political junkies. Inside the email is a collection of headlines that appear to link to But clicking through won't inform readers - instead, the links take users to a site that hosts the Blackhole Exploit kit code. Right now, the Blackhole Exploit kit accounts for 28 percent of all Internet threats, Sophos said. The kit can load a Java Trojan and relay which exploits exist on a victim's computer back to the BlackHole server. Hackers use trickery through malicious Web...
  • World IPv6 Launch Day: A Security Risk?

    06/06/2012 5:49:08 AM PDT · by ShadowAce · 11 replies
    eSecurity Planet ^ | 5 June 2012 | Sean Michael Kerner
    When World IPv6 Launch Day dawns on June 6th, IPv6 services will be enabled on thousands of sites around the world and left on. As the 32-bit IPv4 address space has been exhausted, there is a need for global carriers to move to the larger 128-bit address space that IPv6 provides. But will your organization be ready for the new security issues raised by IPv6? In an interview with eSecurity Planet, Chief Security Officer Danny McPherson of VeriSign cautioned that IPv6 is both an opportunity and a potential security risk. VeriSign is responsible for two of the 13 root DNS...
  • Google warns hundreds of thousands may lose Internet in July

    05/25/2012 9:25:10 AM PDT · by Berlin_Freeper · 21 replies ^ | May 25, 2012 | FoxNews
    Google plans to warn more than half a million users of a computer infection that may knock their computers off the Internet this summer. Unknown to most of them, their problem began when international hackers ran an online advertising scam to take control of infected computers around the world. In a highly unusual response, the FBI set up a safety net months ago using government computers to prevent Internet disruptions for those infected users. But that system will be shut down July 9 -- killing connections for those people.
  • Fast-growing Flashback Botnet Includes Over 600,000 Macs, Malware Experts Say

    04/05/2012 5:45:29 AM PDT · by iowamark · 27 replies
    PCWorld ^ | Apr 5, 2012 | Lucian Constantin
    More than 600,000 Macs have been infected with a new version of the Flashback Trojan horse that's being installed on people's computers with the help of Java exploits, security researchers from Russian antivirus vendor Doctor Web said on Wednesday. Flashback is a family of Mac OS malware that appeared in September 2011. Older Flashback versions relied on social engineering tricks to infect computers, but the latest variants are distributed via Java exploits that don't require user interaction. On Tuesday, Apple released a Java update in order to address a critical vulnerability that's being exploited to infect Mac computers with the...
  • Chinese hackers took over NASA's Jet Propulsion Lab, Inspector General reveals

    03/01/2012 3:05:47 PM PST · by Doogle · 23 replies · 4+ views
    FOX ^ | 03/01/12 | FOXNEWS
    Chinese hackers gained control over NASA’s Jet Propulsion Laboratory (JPL) in November, which could have allowed them delete sensitive files, add user accounts to mission-critical systems, upload hacking tools, and more -- all at a central repository of U.S. space technology, according to a report released Wednesday afternoon by the Office of the Inspector General. That report revealed scant details of an ongoing investigation into the incident against the Pasadena, Calif., lab, noting only that cyberattacks against the JPL involved Chinese-based Internet Protocol (IP) addresses. Paul K. Martin, NASA’s inspector general, put his conclusions bluntly. “The attackers had full functional...
  • 5 ways to stay safe until 'do not track' button arrives

    02/24/2012 1:02:48 PM PST · by Ron C. · 19 replies · 1+ views
    FoxNews ^ | February 24, 2012 | Clayton Morris
    Google, Microsoft, AOL and other big companies have agreed to install a "do not track" button in Web browsers to make sure that you can surf the Web with an assured amount of privacy. It's a big step for the industry -- but until this button arrives, how can you assure yourself a little more privacy online? The "No Track" button would stop companies from using data about your Web browsing habits to customize ads for you. They have also agreed not to use the data for employment, credit, health-care or insurance purposes. For obvious reasons, that type of usage...
  • Anonymous Hacks Greek Ministry Website, Threatens It Will Wipe Away All Citizen Debts

    02/21/2012 5:05:39 PM PST · by dynachrome · 19 replies
    Zero Hedge ^ | 2-22-12 | Tyler Durden (Zero Hedge)
    If there is one war that Greece could not afford to join, that is with the global computer hacking collective known as Anonymous. Yet as of minutes ago, that is precisley what happened, after Anonymous, as part of what it now calls Operation Greece, took down the Greek Ministry of Justice ( While the pretext for the hacking appears to have been an arrest of the wrong people, is seems to have angered Anonymous to the point where they have left an extended message of demands on the Greek website, warning that unless the IMF withdraws from the country and...
  • 'Anonymous' hackers threatens US power grid, official warn

    02/21/2012 9:09:24 AM PST · by Kartographer · 29 replies
    Fox News/WSJ ^ | 2/21/12
    The director of the National Security Agency warned that the hacking group Anonymous could have the ability within the next year or two to bring about a limited power outage in the US through a cyber attack. Gen. Keith Alexander, the agency's director, provided his assessment in meetings at the White House and in other private sessions, according to people familiar with the gatherings.
  • A simple HTML tag will crash 64-bit Windows 7

    12/21/2011 10:18:07 AM PST · by ShadowAce · 55 replies
    The Register ^ | John Leyden
    An unpatched critical flaw in 64-bit Windows 7 leaves computers vulnerable to a full 'blue screen of death' system crash. The memory corruption bug in x64 Win 7 could also allow malicious kernel-level code to be injected into machines, security alert biz Secunia warns. Fortunately the 32-bit version of Windows 7 is immune to the flaw, which has been pinned down to the win32k.sys operating system file - which contains the kernel portion of the Windows user interface and related infrastructure.Proof-of-concept code showing how to crash vulnerable Win 7 boxes has been leaked: the simple HTML script, when opened in...
  • Firefox Add-On Bypasses SOPA DNS Blocking

    12/21/2011 8:39:14 AM PST · by ShadowAce · 21 replies
    Torrent Freak ^ | 20 December 2011 | Ernesto
    The pending Stop Online Piracy Act (SOPA) continues to inspire opponents to come up with creative solutions to circumvent it. A new anti-SOPA add-on for Firefox, titled “DeSopa,” is such a counter measure.When installed, users can click a single button to resolve a blocked domain via foreign DNS servers, bypassing all domestic DNS blockades and allowing the user to browse the site though the bare IP-address (if supported). “I feel that the general public is not aware of the gravity of SOPA and Congress seems like they are about to cater to the special interests involved, to the detriment of...
  • I2P - Anonymity for the Masses

    11/15/2011 4:26:44 AM PST · by ShadowAce · 11 replies
    Linux Career ^ | 11 November 2011 | Jonathon Cox
    1. Introduction For many years people have wanted to protect their right to privacy. As technology changes, it seems that privacy evolves away more and more. I2P is a protocol used for an encrypted multi-proxy on the Internet. While, this sounds simple, there is actually a lot of work going on with I2P to achieve this. Unlike some multi-proxies, I2P will allow you to tunnel many more applications through it than just web browsing, making it a very robust protocol.I2P is available for all platforms, not just Linux. For this example I have used Debian Sid to perform the installation. With...
  • Feds: Cyber Criminals Hijacked 4 Million Computers

    11/10/2011 2:09:35 PM PST · by decimon · 8 replies
    ABC News ^ | November 9, 2011 | RICHARD ESPOSITO and LEE FERRAN
    > According to the indictment, the suspects entered into deals with various internet advertisers in which they would be paid for generating traffic to certain websites or advertisements. But instead of earning the money legitimately, the FBI said the defendants used malware to force infected computers to unwillingly visit the target sites or advertisements -- pumping up click results and, therefore, ill-gotten profits to the tune of $14 million. The malware was also designed to prevent users from installing anti-virus software that may have been able to free the infected computers. > In the first case, if a user searched...
  • The U.S. Drone Fleet Is Fully Infected By A Computer Virus

    10/07/2011 11:19:43 AM PDT · by PapaBear3625 · 115 replies · 1+ views
    Business Insider ^ | Oct 7, 2011 | Robert Johnson
    An unnamed computer virus is compromising the security of U.S. Reaper and Predator drones as they fly missions in Afghanistan, Iraq, Yemen, and Pakistan. Wired reports the virus was found about two weeks ago and hasn't kept the drone pilots at Creech Air Force Base in Nevada from conducting missions. There haven't been any reports of classified data breaches, but the virus has resisted the military's best efforts to remove it.
  • WTF: Microsoft praised by hacker for “spectacular” security approach

    08/08/2011 10:57:57 AM PDT · by for-q-clinton · 10 replies
    Venture Beat ^ | 5 Aug 2011 | Dean Takahashi
    Microsoft’s security used to be a joke. Its operating systems were riddled with bugs that were exploited by hackers and mocked at conferences such as Black Hat, the Las Vegas confab for security technology. But yesterday, one of the independent security researchers at the conference praised Microsoft’s progress on improving security. Chris Paget, chief hacker at security consulting firm Recursion Ventures, is a well-known figure at the twin Black Hat and Defcon conferences in Las Vegas, having demonstrated a live interception of a cell phone call last year. In her talk this year, she said she hated the limitations of...
  • N. Korea: `NK programmers hired in S.Korea to make security software`

    08/07/2011 5:52:15 PM PDT · by TigerLikesRooster · 5 replies
    Donga Ilbo ^ | 08/08/11
    `NK programmers hired in S.Korea to make security software` AUGUST 08, 2011 07:54 The CEO of a computer security company repeatedly looked around in an interview with a Dong-A Ilbo reporter. The executive seemed wary of whether somebody was listening to what he was saying. He started talking after placing on a table two mobile phones with different numbers. He showed nervousness in the interview, saying, “If what I say is leaked (to a third party)...” What the CEO was afraid of was none other than North Korea. He told Dong-A, “North Korean programmers are developing information security programs for...
  • Wireless drone sniffs Wi-Fi, Bluetooth, phone signals(war flying?)

    08/05/2011 7:25:52 PM PDT · by TigerLikesRooster · 12 replies
    CNET ^ | 08/04/11 | Declan McCullagh
    Wireless drone sniffs Wi-Fi, Bluetooth, phone signals By: Declan McCullagh August 4, 2011 11:19 AM PDT LAS VEGAS--Forget Wi-Fi war driving. Now it's war flying. A pair of security engineers showed up at the Black Hat security conference here to show off a prototype that can eavesdrop on Wi-Fi, phone, and Bluetooth signals: a retrofitted U.S. Army target drone, bristling with electronic gear and an array of antennas. "Nobody's really looking at this from a threat perspective," said Mike Tassey, a security consultant who works for the U.S. government intelligence community. "There's some pretty evil stuff you can do from...
  • Massive Global Cyberattack Targeting U.S., U.N. Discovered; Experts Blame China

    08/03/2011 6:25:02 AM PDT · by Freeport · 70 replies
    Fox News ^ | August 03, 2011 | N/A
    The world's most extensive case of cyber-espionage, including attacks on U.S. government and U.N. computers, is set to be revealed Wednesday by online security firm McAfee, and analysts are speculating that China is behind the attacks. The spying was dubbed "Operation Shady RAT," or "remote access tool" by McAfee -- and it led to a massive loss of information that poses a huge economic threat, wrote vice president of threat research Dmitri Alperovitch "What is happening to all this data — by now reaching petabytes as a whole — is still largely an open question," Alperovitch wrote on a blog detailing the threat. "However,...
  • What You Need to Know About the Internet Snooping Bill (and How You Can Protect Yourself)

    07/31/2011 4:38:42 PM PDT · by lbryce · 19 replies
    Lifehacker ^ | July 29, 2011 | Adam Dachis
    On Thursday, the US House of Representatives approved an internet snooping bill that requires internet service providers (ISPs) to keep records of customer activity for a year so police can review them as needed. Here's what this bill means for you and what you can do about it. What Is This Internet Snooping Bill, Exactly, and Why Is It Bad? The lovingly titled Protecting Children From Internet Pornographers Act of 2011 (PCFIPA of 2011) requires ISPs to retain customer names, addresses, phone numbers, credit card numbers, bank account numbers, and dynamic IP addresses. It's a record of your personal information...
  • House panel approves broadened ISP snooping bill

    Internet providers would be forced to keep logs of their customers' activities for one year--in case police want to review them in the future--under legislation that a U.S. House of Representatives committee approved today. The 19 to 10 vote represents a victory for conservative Republicans, who made data retention their first major technology initiative after last fall's elections, and the Justice Department officials who have quietly lobbied for the sweeping new requirements, a development first reported by CNET. A last-minute rewrite of the bill expands the information that commercial Internet providers are required to store to include customers' names, addresses,...
  • Every Move You Make, Every Click You Take, I’ll Be Watching You

    07/29/2011 3:27:47 PM PDT · by decimon · 33 replies
    Belmont Club ^ | July 29, 2011 | Richard Fernandez
    Boing-boing notices that “yesterday, the House Judiciary Committee voted 19-10 for H.R. 1981, a data-retention bill that will require your ISP to spy on everything you do online and save records of it for 12 months. California Rep Zoe Lofgren, one of the Democrats who opposed the bill, called it a ‘data bank of every digital act by every American’ that would ‘let us find out where every single American visited Web sites.’” The databank is “for the children”. HR 1981 is actually titled “Protecting Children From Internet Pornographers Act of 2011″. Its sponsors say “the Protecting Children from Internet...
  • 'Anonymous' Hackers Claim to Breach NATO Security

    07/21/2011 6:57:30 AM PDT · by markomalley · 6 replies
    AP/Fox News ^ | 7/21/11
    A group of computer hackers claims to have breached NATO security and accessed hordes of restricted material. The group called Anonymous says it would be "irresponsible" to publish most of the material it stole from NATO but that it is sitting on about 1 gigabyte of data. Anonymous posted a PDF file Thursday, and broadcast a link to it from its Twitter page, showing what appeared to be a document headed "NATO Restricted."
  • EXCLUSIVE: FBI Raids Homes of Suspected Anonymous Hackers

    07/19/2011 5:02:49 AM PDT · by Doogle · 5 replies · 1+ views
    FOX ^ | 07/19/11 | Jana Winter
    The FBI is executing search warrants at two Long Island, N.Y., homes and one Brooklyn, N.Y., home of three suspected members of notorious hacking group Anonymous early Tuesday morning, has learned. More than 10 FBI agents arrived at the Baldwin, N.Y., home of Giordani Jordan with a search warrant for computers and computer-related accessories. The targets of the FBI searches are all in their late teens to early 20s.
  • Software designer says Casey Anthony prosecution data was wrong

    07/19/2011 6:27:00 PM PDT · by Clintonfatigued · 35 replies · 1+ views
    The Orlando Sentinal ^ | Jul 19, 2011 | Jeff Weiner
    Prosecutors cited a report prepared by a software program called CacheBack, which the state argued showed 84 web searches for chloroform being made on the Anthony computer. The defense would later contradict the CacheBack report with a separate report generated by another program, NetAnalysis. That report returned only one search result for chloroform. Last week, CacheBack CEO John Bradley posted a statement on his website, acknowledging that the 84-search result was an error, and criticizing the state for its use of flawed data. It was Bradley who introduced those results as a witness for the defense. On the stand, he...
  • A Cyber-Pearl Harbor On Horizon?

    07/15/2011 5:28:21 PM PDT · by Kaslin · 24 replies
    IBD Editorials ^ | July 15, 2011 | Staff
    Security: The Pentagon has disclosed perhaps the largest theft of sensitive data by an unnamed foreign government. The threat to our electronic infrastructure is real, growing and as dangerous as a North Korean missile. In outlining America's cyberwarfare strategy last Thursday at the National Defense University, Deputy Secretary of Defense William Lynn disclosed that 24,000 sensitive files containing Pentagon data at a defense company were accessed in a cyberattack in March, likely by a foreign government. He didn't disclose the identity of that government, but in a bit of an understatement he acknowledged, "We have a pretty good idea." So...