TweakTown NewsRefine News by Category:
President Obama is trying to win over Silicon Valley tech leaders and US citizens by meeting to discuss the current state of government surveillance. The tech meeting roundtable lasted around two hours and focused on Obama's promise in January to cut back on the NSA's phone data surveillance - and to provide greater privacy, especially to Internet users outside of the US, after they were unknowingly caught up in spying behavior.
However, it's going to be difficult to reassure Facebook CEO Mark Zuckerberg and other tech company executives from Google, Netflix, Box, Dropbox and Palantir after they met with Obama and his top cabinet officials.
As revealed by former NSA analyst Edward Snowden, the NSA has done an excellent job to undermine encryption and slip through computer security - at epic proportions - and has left citizens, foreign residents, politicians, and others quite angry.
To embrace the global spirit of the World Cup, software company Panda Security will give new customers one month of additional protection for each goal scored by a chosen team during the soccer tournament.
The World Cup begins on June 12 to July 13 and will be hosted in Brazil, with an opening match of Brazil playing Croatia.
"We love soccer and computer security, and we are sure this promotion will be very well received among users," said Alvaro Elorriaga, Panda Security Worldwide Retail Director, in a press statement. "We already have participants from the 80+ countries where we operate, including the US, Spain, Germany, England, France, Brazil and many others. Given the worldwide popularity of soccer, and the imperative need to protect our PCs and mobile devices, this is a natural and fun campaign to reward our customers."
New customers with the following software suites are eligible for the promotion: Panda Antivirus Pro, Panda Internet Security, Panda Global Protection, Panda Gold Protection, Panda Mobile Security and Panda Antivirus for Mac.
Popular Twitter platform HootSuite suffered a DDoS attack yesterday morning, though was back up and running following the temporary interruption. There was no risk to user accounts or personal information, according to HootSuite officials, as they were able to swiftly resolve the problem.
HootSuite defends against numerous DDoS attacks, which typically is a rudimentary approach to crippling a website.
"I'm writing today to let you know that the HootSuite Engineering and Security teams are working to mitigate the DoS attack," said Ryan Holmes, HootSuite CEO, in an e-mail to users. "This interruption was the result of a malicious attempt by an outside party to flood our services in order to shut down the system."
Cybercriminals use DDoS attacks to flood networks and knock websites offline - and while most companies and online services bounce back quickly - it's still an annoyance that diverts IT teams and can lead to angry users and lost revenue. However, some security analysts believe DDoS attacks are being used by organized crime groups as an extortion technique, offering to cease cyberattacks in exchange for cash payments.
In an effort to keep users safer on the Internet, NoBullying.com, an online anti-bullying campaign, listed 10 Internet security tips that users should be aware of.
For those of you trying to provide a comprehensive guide to Internet safety for education purposes, NoBullying has a series of helpful documents available.
"It is essential for parents and educations to learn those online safety tips to make exploring the cyber world a much easier (and) safer experience for our children," said Macartan Mulligan, NoBullying.com co-founder, in a press statement.
An online predator group targeting children as young as three years old utilizing Tor was recently busted by the US Department of Homeland Security. So far, 14 members accused of leading the child pornography website were arrested and face charges related to conspiracy to operate an organized child exploitation enterprise.
Operating from June 2012 to June 2013, the group had more than 27,000 members across the world, with access to at least 2,000 videos.
"These indictments represent a strong coordinated strike - by Homeland Security, the U.S. Postal Inspection Service, and several U.S. Attorney's Office around the country - against child pornography and those who allegedly seek to harm our most vulnerable citizens, our young children," said Kenneth Allen Polite, Jr., U.S. Attorney, in a press statement.
Jonathan Johnson, 27, a Louisiana-based resident is accused of operating the organized Tor child porn ring, creating fake female personas to target and exploit children - while also teaching others in his group to conduct the same activities. He now faces 20 years to life in prison.
The growing threat of data theft and sophisticated malware could top $491 billion in 2014 alone, according to a joint study from the National University of Singapore (NUS) and IDC Research Group.
The research is focused specifically on piracy and the potential ramifications both consumers and businesses face when running pirated and illegal software.
Consumers face a large amount of different cyberthreats, with an estimated 1.2 billion hours of lost time and $25 billion spent to try and deal with malware from pirated software. However, four out of 10 consumers admit to rarely installing security updates on PCs and other devices.
Meanwhile, enterprises will spend $491 billion "because of malware associated with pirated software," with $127 billion related to security issues and $364 stemming from associated data breaches.
Following years of burying their heads in the sand, lawmakers in the United States are finally taking cybercrimes seriously. As noted in the "Gangs Beyond Borders: California and the Fight Against Transnational Organized Crime" report released by California Attorney General Kamala Harris.
The state of California led all states in organized attacks, with computer systems under threat from malware.
"With the rise of a global society connected by the Internet, criminal rings organized to commit hacking, fraud, pirating and other high-tech crimes across borders have rapidly profilerated," the report notes. "These rings operate frequently from Eastern Europe, but also from places as diverse as West Africa and China, and specifically target the citizens, computer networks, and companies of prosperous countries like the U.S."
The report notes both cybercrime and cyber-based threats such as phishing compromise users in the United States and across the world. For example, "Operation Phish Phry" stole more than $1 million, but once the group was busted, 100 hackers faced charges.
aThe NSA wants to be engaged in the continued global discussion of security and secrecy in the digital age, forced to the table following countless complaints of violating user privacy, according to NSA deputy director Richard Ledgett.
The NSA continues to face pressure from Internet users, foreign citizens, political leaders and tech companies, forcing the intelligence agency to go on the defensive. To help try and appear more transparent, there is a current proposal for the NSA to release transparency reports helping give insight into NSA operations.
Ironically, Ledgett said the NSA wanted to share a public point of view during TED to help counter the "half-truths and distortions" made public by Snowden. Ledgett also said Snowden put lives at risk, showing "the bad guys" some of the NSA's cybersecurity and snooping methods.
"If our adversaries see our methods they will move away from using them," Ledgett said. "We have evidence that terrorists, smugglers and nation states have moved away. We are losing visibility into what our adversaries are doing."
Google plans to roll out necessary encrypted HTTPS connection so user emails are encrypted when data is transferred over Google networks.
The 100 percent mandatory e-mail change will prevent outsiders from accessing email messages as all sent and received messages are encrypted while they bounce around servers and data centers.
"Starting today, Gmail will always use an encrypted HTTPS connection when you check or send email," said Nicolas Lidzborski, Gmail Security Engineering lead, in a blog post. "Gmail has supported HTTPS since the day it launched, and in 2010 we made HTTPS the default. Today's change means that no one can listen in on your messages as they go back and forth between you and Gmail's servers - no matter if you're using public Wi-Fi or logging in from your computer, phone or tablet."
Following revelations of widespread and organized NSA spying, Internet users have increased pressure on Internet companies to offer better protection.
Compromised web servers infected with Linux-based malware have been used to target visitors by spreading Windows malware, with up to 25,000 suspected cases in the past two years, researchers note.
Network operators and IT specialists have been informed to look out for select Linux malware, to ensure they haven't been caught up in the Operation Windigo cybercrime effort. The server takeover campaign still is running up to 10,000 hacked servers, which are used to distribute malware, send spam, and infect users with sophisticated rootkit exploits.
"There are two kinds of victims here: Windows end-users visiting legitimate websites hosted on compromised servers, and Linux/Unix server operators whose servers were compromised through that large server-side credential stealing network," researchers note.
Four European research groups helped compile the information, as the cybercriminals behind these threats are clever and don't leave behind a big electronic signature for investigators to follow.