Cybersecurity

Almost 17,000 malware alerts surface every week, the Ponemon Institute recently found. Only 4 percent of alerts were investigated, and traditional antivirus products missed nearly 70 percent of malware in the first hour, researchers discovered in a recent Damballa study. Rescanning led to identifi...

China should change its tune on new rules for purchases from American high-tech companies if it wants to do business with the U.S., President Obama has warned. China reportedly is planning to ask U.S. high-tech firms to hand over their encryption keys and install security backdoors to allow surveill...

SPOTLIGHT ON SECURITY

Monster Problem Threatens New US Cyberthreat Plan

President Barack Obama last week made good on his promise to establish a center for cybersecurity information gathered by agencies of the federal government. It's a laudable initiative -- if it works. The Cyber Threat Intelligence Integration Center will, according to a White House fact sheet, conne...

SPOTLIGHT ON SECURITY

Malicious Emailers Find Healthcare Firms Juicy Prey

Healthcare providers have garnered growing interest from hackers in recent months. More evidence of that trend appeared last week in a report on email trust. An email that appeared to come from a healthcare company was four times more likely to be fraudulent than an email purportedly from a social m...

Citizenfour, a film documenting interviews director Laura Poitras conducted with whistle-blower Edward Snowden, won the Oscar for best documentary Sunday. The talks took place as Snowden blew the lid off the United States National Security Agency's surveillance activities. The award highlights the d...

The United States' National Security Agency and British spy agency GCHQ have hacked into the internal computer network of Gemalto, the world's largest maker of SIM cards, and stolen the cards' encryption keys, according to information in files leaked by whistle-blower Edward Snowden. Gemalto makes a...

Lenovo on Thursday came under fire for preinstalling spyware on some of its laptops. The software, Superfish, uses the same techniques cybercriminals often employ to crack encrypted traffic from computers to the Internet. "Superfish is purposely designed to bypass the security of HTTPS websites in...

Facebook this week announced ThreatExchange, an API-based platform for technology companies to share information on security threats. It had been working on the platform for about a year in a joint project with other prominent Internet firms. Facebook layered APIs on top of its existing platform inf...

The Obama Administration on Tuesday announced plans to set up a national Cyber Threat Intelligence Integration Center to integrate all data from government agencies and the private sector, and disseminate it appropriately. Lisa Monaco, assistant to the president for homeland security and counterterr...

SPOTLIGHT ON SECURITY

Bug Bounties Entice Researchers to Don White Hats

Bug bounty programs are used by individual software makers to improve the quality of their products, but they can have incidental benefits for all software makers, too. One of those is to encourage bug hunters to wear a white hat instead of a black one. That's particularly true for researchers attra...

SPOTLIGHT ON SECURITY

Is the FTC Jumping the Gun on IoT Security?

The security community has been waving a red flag about how the Internet of Things could become a cybercriminal's paradise. Last week, those admonitions were given some credence when the Federal Trade Commission recommended that the makers of IoT gadgets adopt some "best practices" to protect consum...

Google has decided not to fix vulnerabilities in WebView for Android 4.3 and older, sparking heated discussions among developers. Those versions of WebView run on the WebKit browser. Fixing them "required changes to significant portions of the code and was no longer practical to do so safely," expla...

Canada's spy agency, the Communications Security Establishment, has been eavesdropping on 102 free file upload sites, including Sendspace, Rapidshare and Megaupload, which has been shut down. A CSE program called "Levitation" lets analysts access information on 10-15 million uploads and downloads of...

SPOTLIGHT ON SECURITY

POS Terminals Rich Vein for Gold-Digging Hackers

Hackers are like gold miners. Once they find a rich vein for their malware, they mine it until it's dry. Point-of-sale terminals are such a vein. Following the success of the Target breach in 2013, the hacker underground was quick to rush more POS malware to market. "Attackers have recognized that t...

SPOTLIGHT ON SECURITY

Businesses Waste Big Bucks Fighting Phantom Cyberattacks

Businesses spend an average of $1.27 million a year chasing cyberthreats that turn out to be dead ends. That is one of the findings in a report released last week on the cost of containing malware. In a typical week, an organization can receive nearly 17,000 malware alerts, although only 19 percent ...

Technewsworld Channels