TweakTown NewsRefine News by Category:
Former CIA intelligence analyst Ray McGovern believes Edward Snowden isn't a traitor to the United States, nor is he a hero.
McGovern discussed how Snowden didn't appreciate a "clear violation of the 4th Amendment to the Constitution," which is one of the reasons the data disclosures were made public. Also, the former CIA analyst noted that National Intelligence Director James Clapper didn't face punishment for lying under oath in front of Congress.
"He's a patriot," McGovern recently said during a speech at Missouri Southern State University. "He took his oath seriously. He took the Constitution seriously."
The top social media network in Russia is now being sued by Sony Music, Warner Music and Universal Music, with vKontakte accused of "deliberately facilitating piracy on a large scale."
Each of the top three music labels filed individual suits against vKontakte, spearheaded by the International Federation of the Phonographic Industry (IFPI). In 2012, the social media site made $172 million in advertising revenue, but didn't pay the IFPI for copyrighted music shared through the site.
vKontakte says it allows copyright holders to submit removal requests of any content that violates copyright rules, but IFPI officials noted the process is too cumbersome. Both the US government and copyright holders have believed vKontakte provides large-scale music piracy - originally launched in 2006, vKontakte has 143 million global users, and 88 million Russian members.
Security bugs in software could leave power plants, oil refineries, and similar infrastructure vulnerable to cyberattacks from foreign-based hackers, according to recent research.
To make matters worse, around 7,600 plants worldwide have software that a cybercriminals with the "lowest skill in hacking" could still be successful. The Yokogawa Centum CS 3000, released in 1998 and designed for Microsoft Windows 98, while companies need to evaluate if they should make immediate software improvements.
"We went from zero to total compromise," said Juan Vazquez, security researcher with Rapid7, told BBC. "If you are able to exploit the vulnerabilities we have identified you get control of the Human Interface Station. That's where the operator sits or stand and monitors operation details. If you have control of that station as an attacker you have the same level of control as someone standing on the plant floor wearing a security badget."
A homeless man in Maine used his ATM card at a TD Bank branch to collect more than $37,000 in cash advances, receiving $700 separated into 53 transactions.
Initially, the man had just $100 in his checking account, but the malfunctioning ATM allowed him to receive multiple cash advances before he was stopped by police.
"We got a call that he was sleeping in the [ATM] vestibule, and we had to move him along," said Lt. Todd Bernard, from the South Portland Police Department, in a statement to local media. "Then at around 5:30 a.m., we got another call that he was back there and taking an unusually long time at the ATM by a who was trying to use it. She thought it seemed suspicious."
European companies are responding to the NSA's spying activities by tightening control over data, boosting encryption, and promising to do a better job of protecting user rights.
"For Israeli companies, the new rules may appear to be onerous, but there could be a great business opportunity for many of them in Europe as a result," said Patrick Van Eecke, legal expert specializing in cybersecurity, in a statement to Israeli media. "There are many companies around the world that specialize in collecting data, but they are not clear on the implications of Europe's new policies - and as a result, there is opportunity for companies from Israel, many of which do understand the policies."
In addition of concerns related to snooping, there are expectations of cyberattacks between national governments and splinter hacker groups. Growing global cyber threats allow countries to find yet another outlet to torment one another - Russia is reportedly launching cyberattacks to disrupt Ukrainian infrastructure, while Ukrainian hackers retaliated by hitting the Kremlin.
aFederal agencies aren't seriously defending against data breaches and personal identifiable information (PII) is increasingly finding its way into the hands of cybercriminals, according to a recent report published from the Government Accountability Office (GAO).
The number of government data breaches increased up to 25,566, twice the amount as reported in 2010 - and affected companies often are unfamiliar with how to respond properly.
The GAO has criticized federal government branches, specifically the Department of the Army, IRS, SEC, and a few other agencies, falling short of mandating information security programs and being lackadaisical about security efforts.
There is a shifting strategy to try and fight Internet piracy, with the old strategy of targeting individual users eliminated in favor of shutting down organized piracy rings.
There are three emerging strategies to target piracy: force ISPs to block subscribers from accessing sites with pirated content, shut down advertising streams on pirated sites, and trying to pressure search engines to not index and show links to sites with pirated content.
"Disrupting the money unlawful websites make from advertising could make a real difference to the fight against copyright infringement," said Ed Vaizey, creative industries minister, in a statement. "It is an excellent example of what can be achieved through industry, government and law enforcement working together."
Credit bureau Experian is now facing a multi-state investigation following a data breach that left almost 200 million people at risk of data theft.
"We are investigating," according to a spokeswoman for Illinois Attorney General Lisa Madigan, in a statement to Reuters. "It's part of a multi-state investigation."
Vietnamese citizen Hieu Minh Ngo pleaded guilty for his part in the theft, in which he sold stolen information to a large number of cybercriminals.
It shouldn't be surprising to hear there is a thorough investigation into the breach - not only was the company compromised using clever social engineering - Experian is a leading credit bureau in the United States.
Yahoo is the latest Silicon Valley tech giant moving to increase security because of government spying, announcing that traffic moving between the Yahoo data centers is now encrypted.
In addition, Yahoo Mail already uses HTTPS by default, and all mail sent between Yahoo servers also is encrypted. The company is now using 2048-bit RSA encryption for its Mail, Homepage and Digital Magazines portions of the site.
"Hundreds of Yahoos have been working around the clock over the last several months to provide a more secure experience for our users and we want to do even more moving forward," said Alex Stamos, Yahoo Chief Information Security Officer, in a blog post. "Our goal is to encrypt our entire platform for all users at all time, by default. One of our biggest areas of focus in the coming months is to work with and encourage thousands of our partners across all of Yahoo's hundreds of global properties to make sure that any data that is running on our network is secure."
Two members of an international cybercrime, identity theft and credit card fraud ring pleaded guilty to one count of wire fraud conspiracy and one count of conspiracy to commit access device fraud and identity theft, the Department of Justice announced.
Robert Dubuc, 40, from Massachusetts along with Oleg Pidtergerya, 49, of New York, used information stolen from more than 12 banks, payroll processing companies, brokerage firms and government agencies - in their effort, more than $15 million in funds have been reportedly stolen.
"Both Dubuc and Pidtergerya were asked by leaders of the conspiracy to participate in a scheme to 'cash out' bank accounts and pre-paid debit cards opened in the names of others," according to the DoJ press release.