Tech content trusted by users in North America and around the world
6,733 Reviews & Articles | 46,263 News Posts

TweakTown News

Refine News by Category:

Hacking & Security Posts - Page 12

Silk Road's Ross Ulbricht asks judge for leniency, some freedom

By: Michael Hatamoto | More News: Hacking & Security | Posted: May 26, 2015 3:08 am

Silk Road leader Ross Ulbricht, 30, faces a minimum of 20 years in prison, but could face up to life, when he is sentenced by US District Judge Katherine Forrest. In a two-page letter, Ulbricht has asked Judge Forrest to at least give him the chance at leaving prison in his elder years, providing a "light at the end of the tunnel" for him.




Ulbricht was found guilty of seven charges that include narcotics trafficking, engaging in a continuing criminal enterprise, computer hacking and money laundering - and will be sentenced on May 29.


"In creating Silk Road, I ruined my life and destroyed my future," Ulbricht wrote in an open letter to the judge. "I could have done so much more with my life. I see that now, but it is too late. Even now I understand what a terrible mistake I made. I've had my youth, and I know you must take away my middle years, but please leave me my old age."

Continue reading 'Silk Road's Ross Ulbricht asks judge for leniency, some freedom' (full post)

Americans think privacy is important, but doubt its possibility

By: Michael Hatamoto | More News: Hacking & Security | Posted: May 25, 2015 7:30 pm

Ninety-three percent of adults in the United States feel it's important to be in control of who can collect information about them, with 90 percent noting it's important to control what information is collected, according to a recent Pew Research Center report.




Ironically, 91 percent of Americans didn't bother changing Internet or mobile phone usage habits, while just seven percent reported making changes in "recent months." However, it looks like more users are clearing their browser history (59 percent), refusing to share information that isn't relevant during checkout (57 percent), using temporary email addresses and usernames (25 percent), and providing inaccurate information about themselves (24 percent).


Things are changing in the United States, with many citizens frustrated by the overreaching powers of the Patriot Act - and the eventual information released by former NSA contractor Edward Snowden. Google, Yahoo and other services are providing end-to-end encryption, though only a small number of users are taking advantage.

Patriot Act didn't do very much good in breaking cases, FBI says

By: Michael Hatamoto | More News: Hacking & Security | Posted: May 25, 2015 10:35 am

A new 77-page report from Michael Horowitz, the Justice Department's inspector general, found that the Patriot Act didn't really help solve any major cases. FBI agents were unable to note a single case in which using the Patriot Act gave them an advantage they couldn't have received otherwise - even though other government officials previously said having the Patriot Act was "valuable."




However, the FBI continually increased bulk surveillance activity, issuing a growing number of orders, without any evidence that it works - and with growing uneasiness of government spying - it looks like changes could finally be made.


"The agents we interviewed did not identify any major case developments that resulted from the records obtained in response to Section 215 orders," according to the report, "but told us that the authority is valuable when it is the only means to obtain certain information."

Researchers: Android factory reset doesn't fully wipe data

By: Michael Hatamoto | More News: Hacking & Security | Posted: May 25, 2015 9:46 am

Google Android smartphone owners under the assumption they were able to wipe data from their devices could be leaving information behind, according to researchers from Cambridge University. The researchers took a look at used devices and found files that allowed them to access the previous owner's Gmail accounts and other login/password data.




The devices ran Android 2.3.x Gingerbread all the way to 4.3 Ice Cream Sandwich, with the UK devices including smartphones from Samsung, LG Electronics, Motorola, Google, and HTC.


"We were able to retrieve the Google master cookie from the great majority of phones, which means that we could have logged on to the previous owner's Gmail account," according to the researchers. "The reasons for failure are complex; new phones are generally better than old ones, and Google's own brand phones are better than the OEM offerings."

Continue reading 'Researchers: Android factory reset doesn't fully wipe data' (full post)

NSA wants to give you malware through mobile app stores

By: Anthony Garreffa | More News: Hacking & Security | Posted: May 22, 2015 2:30 pm

Edward Snowden is back in the news, talking about a plan that the NSA had to have malware in various app stores, like the Google Play Store, and Apple iTunes Store.




The NSA program was called IRRITANT HORN, with the US spy agency wanting to find the path of web traffic to and from mobile application severs that are owned by Google and Samsung. Once the NSA found this traffic, it would place an attack in the middle, where it could silently inject malware and spying tools into a mobile device of its choice.


After it had planted this software, it could pull out e-mails, texts, search history, call records, videos, photos and anything else you have on your device. Thanks to the user thinking they're on an official app store, they would be unaware that they're being attacked by the US government in the form of the NSA.

Continue reading 'NSA wants to give you malware through mobile app stores' (full post)

Tech companies don't want police to receive encrypted phone data

By: Anthony Garreffa | More News: Hacking & Security | Posted: May 21, 2015 12:30 am

In an open letter to President Obama, more than 140 civil society groups, tech companies and tech leaders signed a statement showing concern regarding the US government's desire to view decrypted smartphone data. Both the FBI and Justice Department claim they support encryption, but want to create backdoors so law enforcement can gain access - but that seems unlikely without creating avenues that cybercriminals and foreign governments can also exploit.




Not surprisingly, law enforcement complain they will lose access to data and communications as more data can be encrypted - with Google and Apple providing ways to prevent outside snooping.


"Strong encryption is the cornerstone of the modern information economy's security," the open letter reads. "Encryption protects billions of people every day against countless threats - be they street criminals trying to steal our phones and laptops, computer criminals trying to defraud us, corporate spies trying to obtain our companies' most valuable trade secrets, repressive governments trying to stifle dissent, or foreign intelligence agencies trying to compromise our and our allies' most sensitive national security secrets."

Continue reading 'Tech companies don't want police to receive encrypted phone data' (full post)

Study: Takes 197 days for retailers to discover advanced threats

By: Anthony Garreffa | More News: Hacking & Security | Posted: May 20, 2015 2:30 pm

Even after seeing major retailers suffer data breaches, it still takes an average of 197 days to identify an advanced threat, with an additional 39 days to contain the security problem.




To make matters even worse, 38 percent relied on a "gut feeling" as the top method how retailers identify possible cybersecurity problems, according to the Ponemon Institute. Meanwhile, 23 percent turned to forensic evidence, 21 percent studied attacker signatures, while 16 percent received threat intelligence from other companies.


Instead of focusing on working with outside consultants to improve cybersecurity, retailers rather save the time and money - and instead rely on pointing fingers when a data breach occurs. However, the retailers and financial institutions suffer when a breach does take place, while the retailers suddenly scramble to react.

Continue reading 'Study: Takes 197 days for retailers to discover advanced threats' (full post)

Akamai: Hackers changing tactics, as number of DDoS attacks increase

By: Anthony Garreffa | More News: Hacking & Security | Posted: May 20, 2015 12:27 pm

Cybersecurity experts are creating new methods to help companies fight back against distributed denial-of-service (DDoS) attacks, so hackers are shifting their efforts. To help avoid detection, DDoS attacks are using less bandwidth but increasing frequency and duration of their attacks.




The first quarter of 2015 has been extremely busy, with a record number of DDoS attacks - double year-over-year when compared to Q1 2014 - and the type of users being targeted is changing. One-third of all DDoS attacks focused on gaming-related servers and services, with the Lizard Squad and other groups trying to get attention from the media.


Not surprisingly, China accounted for 23 percent of DDoS traffic during Q1, with Germany (17 percent), and the United States (12 percent) rounding out the top three.

Continue reading 'Akamai: Hackers changing tactics, as number of DDoS attacks increase' (full post)

Aussie cloud service gets the tick to serve its government

By: Chris Smith | More News: Hacking & Security | Posted: May 18, 2015 11:07 am

In a world of leaked information and hacking sprees, Australian cloud services provider Macquarie Telecom has been the first ever of its kind to be approved on the government's list of providers thanks to its performance in the security standards testing.




With this accreditation approved by the Australian Signals Directorate (ASD), Macquarie Telecom's Managing Director Aiden Tudehope stated "the ASD was detailed and thorough and Macquarie is proud that out hard work has been recognized in this way." Tudehope added that the motive for this accreditation is quite reasonable as "our analysis shows governments are increasingly looking for a range of cloud computing services for different data classification use cases."


Further privatization of Government services can be good or bad depending on which way the situation is assessed and it's up to you to decide if you're happy with this movement or not. Either way, congratulations Macquarie Telecom for being the first of a kind.

VENOM cybersecurity vulnerability could pose problems for companies

By: Chris Smith | More News: Hacking & Security | Posted: May 16, 2015 7:27 pm

The VENOM vulnerability, which is the Virtualized Environment Neglected Operations Manipulation targeting data center software, allows cybercriminals to exploit remote access on virtual machines. If done, hackers are able to steal data - and gather information about the company's public cloud.




There is a fear that the VENOM puts intellectual property at risk, along with other personal information, so millions of users could be impacted. Although there were initial comparisons between Venom and Heartbleed, the new security flaw isn't quite on the same level.


"At this time, Venom poses the same level of risk as any new remote-code execution vulnerability," said Chad Kahl, Threat Intelligence Team Lead at Solutionary. "It is bad, but readily fixed or mitigated. First off, it only affects certain platforms. While popular, it doesn't span almost the entire Internet like Heartbleed did."

Continue reading 'VENOM cybersecurity vulnerability could pose problems for companies' (full post)

Subscribe to our Newsletter

Latest News Posts

View More News Posts

Forum Activity

View More Forum Posts

Press Releases

View More Press Releases