TweakTown
Tech content trusted by users in North America and around the world
5,935 Reviews & Articles | 38,244 News Posts

TweakTown News Posts - Page 28

Edward Snowden wants encryption, data protection used by journalists

By: Michael Hatamoto | More News: Hacking & Security | Posted: Jul 17, 2014 11:28 pm

Former NSA contractor Edward Snowden wants professionals to utilize data protection and encryption to communicate, and is reportedly working on some type of "encryption tools" to help protect sources. Remaining in Russia, with his asylum status extended, it's mainly unknown what the American has been doing with his spare time.

 

TweakTown image news/3/9/39148_01_edward_snowden_wants_encryption_data_protection_used_by_journalists.jpg

 

Snowden also is working on funding for the project, which will be used to keep communications between journalists and their anonymous sources secure from government spying.

 

"Journalists have to be particularly conscious about any sort of network signaling, any sort of connection, any sort of license-plate reading device that they pass on their way to a meeting point, any place they use their credit card, any place they take their phone, any email contact they have with the source because that very first contact, before encrypted communications are established, is enough to give it all away," Snowden recently said in an interview.

Continue reading 'Edward Snowden wants encryption, data protection used by journalists' (full post)

Russian hackers breached NASDAQ, as high-profile incidents rise

By: Michael Hatamoto | More News: Hacking & Security | Posted: Jul 17, 2014 10:43 pm

Suspected Russian hackers successfully breached NASDAQ in 2010, with malware reaching the company's servers. The FBI first noticed unusual network traffic originating from NASDAQ's systems in 2010, and the code was well written and designed to launch attacks.

 

TweakTown image news/3/9/39147_01_russian_hackers_breached_nasdaq_as_high_profile_incidents_rise.jpg

 

Not surprisingly, Russian Embassy spokesperson Yevgeniy Khorishko said putting blame on Russia is "pure nonsense" and that the topic "is not even worth commenting on," though that is a typical response when Russia is blamed for cyberespionage efforts.

 

"We've seen a nation-state gain access to at least one of our stock exchanges, I'll put it that way, and it's not crystal clear what their final objective is," said Rep. Mike Rogers (R-MI), in a statement. "The bad news of that equation is, I'm not sure you will really know until that final trigger is pulled. And you never want to get to that."

Continue reading 'Russian hackers breached NASDAQ, as high-profile incidents rise' (full post)

Japanese porn websites spreading banking trojan, researchers warn

By: Michael Hatamoto | More News: Hacking & Security | Posted: Jul 17, 2014 9:18 pm

Compromised Japanese pornography websites are being used to share the Win32/Aibatook banking Trojan, designed to steal banking credential information and hosting provider account credentials. The Trojan monitors where users are going inside of Web browsers, redirects Web pages, and tracking data that is inputted into online forms, according to ESET researchers.

 

TweakTown image news/3/9/39146_01_japanese_porn_websites_spreading_banking_trojan_researchers_warn.jpg

 

Despite the Trojan being identified late last year, cybercriminals updated it a few months ago to target Japanese banks and other companies. Microsoft Internet Explorer remains the most popular Web browser in Japan - and despite great security improvements than previous versions - vulnerabilities are still being found and exploited.

 

"The exploitation success ratio is probably high enough for the Aibatook's operators," said Joan Calvet, ESET malware researcher, in a statement to SCMagazine. "Using a more powerful exploit pack and targeting other Web browsers would be the next logical step for the operators in order to increase the number of potential victims."

Continue reading 'Japanese porn websites spreading banking trojan, researchers warn' (full post)

First half of 2014 saw a tremendous amount of DDoS attacks

By: Michael Hatamoto | More News: Hacking & Security | Posted: Jul 17, 2014 8:30 pm

The use of distributed denial-of-service (DDoS) attacks by cybercriminals remains an effective and affordable strategy to compromise large targets. DDoS attacks topping 20Gbps during the first two quarters of 2014 doubled when compared to all four quarters of 2013 - and there have been more than 100 DDoS-related attacks with speeds of 100Gbps or higher so far.

 

TweakTown image news/3/9/39145_01_first_half_of_2014_saw_a_tremendous_amount_of_ddos_attacks.jpg

 

Large-scale DDoS attacks are most worrisome for security experts, as thousands of compromised machines can flood targets with tremendous amounts of traffic. As more households have faster Internet service, the threat is becoming more complicated and difficult to properly prevent.

 

"The frequency of very large attacks continues to be an issue, and organizations should take an integrated, multi-layered approach to protection," said Darren Anstee, Arbor Networks Director of Solutions Architects, in a statement. "Even organizations with significant amounts of Internet connectivity can now see that capacity exhausted relatively easily by the attacks that are going on out there."

Continue reading 'First half of 2014 saw a tremendous amount of DDoS attacks' (full post)

Smart technology provides cybercriminals unique attack opportunities

By: Michael Hatamoto | More News: Hacking & Security | Posted: Jul 17, 2014 7:33 pm

The wider adoption of 'smart' technology has presented cybercriminals with a unique opportunity to compromise emerging solutions that heavily rely on Internet connectivity. Both consumer and industrial smart technologies are becoming more common place, but security protocols are struggling to keep up at the moment.

 

TweakTown image news/3/9/39144_01_smart_technology_provides_cybercriminals_unique_attack_opportunities.jpg

 

The head of Recurity Labs, an IT security company based in Germany, noted it would have been possible for him to shut off the power, water and gas supply of the southern German town of Ettlingen. Using the utility network's IT grid, Felix Lindner and his team were able to gain control of its access grid, indicating how insecure critical infrastructure is at the moment.

 

"The smart metering system has been developed to provide security controls that mitigate the risks of security compromise," a British Department of Energy and Climate Change spokesperson told Reuters. "Smart metering system security uses international standards and common industry good practices, e.g. encryption of sensitive data, protection from viruses and malware, access control, tamper alerts on meters, two-party authorization of important messages to the meters and system monitoring."

Coffee shops, cafes struggle to provide free Wi-Fi with guidance

By: Michael Hatamoto | More News: Internet & Websites | Posted: Jul 17, 2014 6:04 pm

Coffee shops, restaurants and other locations invite customers to use Wi-Fi, but many small businesses are struggling to handle some visitors leeching free Web access without being paying customers. It's not uncommon to see visitors purchase one item and occupy a table during peak customer times for long durations without making any additional purchases.

 

TweakTown image news/3/9/39121_01_coffee_shops_cafes_struggle_to_provide_free_wi_fi_with_guidance.jpg

 

Time Warner Cable and other Internet service providers are working with businesses to create methods to ensure customers can access Wi-Fi, but don't try to abuse free Internet access. Many locations still rely on customers to use their best judgment and be courteous to their fellow visitors.

 

"For a large retailer, information is as valuable as anything else," said Thad Nation, Wired Wisconsin Executive Director, in a statement to local media. "Businesses wouldn't offer free Wi-Fi if people didn't spend money there and keep coming back. They make sure you're comfortable and have electrical outlets because a happy customer is a repeat customer."

Continue reading 'Coffee shops, cafes struggle to provide free Wi-Fi with guidance' (full post)

Sprint and T-Mobile partner for wireless spectrum auction

By: Shane McGlaun | More News: Business, Financial & Legal | Posted: Jul 17, 2014 5:00 pm

Mobile phone providers want to have all the wireless spectrum they can get their hands-on. The catch is that wireless spectrum is very expensive making it hard to come up with the cash to get hands-on all the spectrum many firms want. That fact results in some odd bedfellows.

 

TweakTown image news/3/9/39142_8_sprint_and_t_mobile_partner_for_wireless_spectrum_auction.jpg

 

Such is the case with a planned partnership with Sprint and T-Mobile for the upcoming wireless spectrum auctions. The two are teaming up, despite being rivals in the wireless industry, to raise $10 billion that can be used to purchase wireless spectrum according to sources.

 

The spectrum that the two are eyeing is currently used by TV broadcasters. The auction will be held sometime in 2015. The funds that will be used in the spectrum purchase are part of the $45 billion SoftBank has put together to finance the Sprint purchase of T-Mobile, if the deal gets approved.

Malaysia Airlines Boeing 777 with 295 people shot down in Ukraine

By: Michael Hatamoto | More News: BREAKING STORY | Posted: Jul 17, 2014 4:20 pm

Malaysian Airlines flight MH17 was shot down this morning by suspected Ukrainian rebels near the country's border with Russia, according to Ukrainian Interior Ministry official. The flight with 295 passengers took off from Amsterdam and was heading to Kuala Lumpur, flying around 32,000 feet when it disappeared from radar while in Ukrainian airspace.

 

TweakTown image news/3/9/39143_01_malaysia_airlines_boeing_777_with_295_people_goes_down_over_ukrai.jpg

 

A pro-Russian group operating in Ukraine claimed they shot down a Ukrainian military plane - though military and aviation experts note the differences between commercial airliners, such as the Boeing 777, and military aircraft are recognizable. There are no indications an air-to-air missile launched from a fighter jet took down MH17, though details are relatively scarce at the moment. It's unknown if the missile was launched from the Ukrainian or Russian side of the border.

 

Although MH17's flight route is a typical one between the Netherlands and Kuala Lumpur, it seems reckless to fly over a conflict zone in which both sides possess surface-to-air missile technology. Ukrainian officials are scrambling to try to learn more about the incident, as the Prime Minister's office is prepared to launch an immediate inquiry.

Continue reading 'Malaysia Airlines Boeing 777 with 295 people shot down in Ukraine' (full post)

Google now selling aerial Maps images to businesses

By: Shane McGlaun | More News: Business, Financial & Legal | Posted: Jul 17, 2014 4:05 pm

Google has announced that it has a new way to make money off its aerial images that you see on Google maps. The search giant is now offering to sell the images to businesses that want to see their assets on a map. Google is selling the images directly to users looking to use them for public service projects.

 

TweakTown image news/3/9/39141_7_google_now_selling_aerial_maps_images_to_businesses.jpg

 

Those projects can include things like property evaluation, environmental impact studies, and others. These images were previously available to users via the Maps API, but users could only view the images and were unable to manipulate them.

 

"We hear from organizations that they want to own and have access to aerial imagery for their business," said a Google spokesperson. Satellite images are still not available for purchase, only the aerial images Google offers.

Microsoft Bing offers users right to be forgotten in Europe

By: Shane McGlaun | More News: Business, Financial & Legal | Posted: Jul 17, 2014 3:04 pm

Not long ago Google began offering users in Europe the ability to submit links to content about them that is listed on the search engine and have those links removed. This is known as the right to be forgotten and is the result of a ruling made this year by the top court in Europe.

 

TweakTown image news/3/9/39140_6_microsoft_bing_offers_users_right_to_be_forgotten_in_europe.jpg

 

Microsoft has now launched a four part online form that Europeans can fill in to have content about them removed from the search engine. The form asks for the name and country of residence for the person and details of the pages that they want blocked.

 

The form also asks if the person is a public figure or is involved in a role that involves trust, leadership, or safety. Microsoft isn't guaranteeing that the content will be removed, but courts allow the person asking for the content to be removed to appeal legally if Microsoft refuses.

Latest Tech News Posts

View More News Posts

TweakTown Web Poll

Question: Facebook's acquisition of Oculus VR will...

Improve Oculus Rift Development

Hamper Oculus Rift Development

Completely destroy Oculus Rift Development

Let's wait and see, I'm not sure

or View the Results

View More Polls

Forum Activity

View More Forum Posts

Press Releases

View More Press Releases