Archive

Category Archives for "Networking"

Yahoo uncovered breach after probing a black market sale

A hacker's attempt to sell user data he claimed was stolen from Yahoo actually led the company to uncover a far more severe breach.Yahoo confirmed Thursday a data breach, which affects at least 500 million users, but it could be unrelated to the black market sale of alleged Yahoo accounts, according to a source familiar with the matter.The information comes even as security experts have been questioning why Yahoo took so long to warn the public when it was known that a hacker was claiming to be selling the data online around early August.To read this article in full or to leave a comment, please click here

Yahoo uncovered breach after probing a black market sale

A hacker's attempt to sell user data he claimed was stolen from Yahoo actually led the company to uncover a far more severe breach.Yahoo confirmed Thursday a data breach, which affects at least 500 million users, but it could be unrelated to the black market sale of alleged Yahoo accounts, according to a source familiar with the matter.The information comes even as security experts have been questioning why Yahoo took so long to warn the public when it was known that a hacker was claiming to be selling the data online around early August.To read this article in full or to leave a comment, please click here

Hackers have a treasure trove of data with the Yahoo breach

The massive breach at Yahoo means that a treasure trove of stolen data is in the hands of hackers -- putting millions of internet users at risk.At least half a billion Yahoo accounts have been affected in one of the biggest data breaches in history. Information including names, email addresses, telephone numbers and hashed passwords may have been stolen.Yahoo has blamed the attack on a "state-sponsored actor," but it's far from clear who hacked the internet company and how the culprits pulled off the attack.Blaming it on a state-sponsored actor, however, indicates that Yahoo may have found evidence that the hackers were targeting the company over a long period of time, said Vitali Kremez, a cybercrime analyst at security firm Flashpoint.To read this article in full or to leave a comment, please click here

Hackers have a treasure trove of data with the Yahoo breach

The massive breach at Yahoo means that a treasure trove of stolen data is in the hands of hackers -- putting millions of internet users at risk.At least half a billion Yahoo accounts have been affected in one of the biggest data breaches in history. Information including names, email addresses, telephone numbers and hashed passwords may have been stolen.Yahoo has blamed the attack on a "state-sponsored actor," but it's far from clear who hacked the internet company and how the culprits pulled off the attack.Blaming it on a state-sponsored actor, however, indicates that Yahoo may have found evidence that the hackers were targeting the company over a long period of time, said Vitali Kremez, a cybercrime analyst at security firm Flashpoint.To read this article in full or to leave a comment, please click here

Apple Car rumors resurface amid new buyout rumors

One of the more fascinating rumors surrounding Apple these days rests on whether or not the company will ever roll out an Apple branded electric car. Undoubtedly, Apple has been spending lots of R&D resources on its electric car initiative, but whether or not that research will actually result in a car remains to be seen.That said, there were some interesting rumors in the news this week. First and foremost, a report surfaced indicating that Apple was potentially interested in acquiring McLaren, a company that most people know as a purveyor of expensive sports cars and incredibly fast Formula 1 race cars. That rumor naturally got the Apple blogosphere going but it wasn’t long before a McLaren spokesperson came forward and denied the report.To read this article in full or to leave a comment, please click here

Here are the 2016 Ig Nobel Prize ‘winners’

“Congratulations”Let’s say you’re a scientist, and you’ve worked your entire adult life at your discipline. You do a sort of offbeat study, for valid scientific reasons, and figure, hey, this’ll get a laugh in whatever journal is relevant to your field, and then somebody calls you from Cambridge, Mass., and tells you you’ve won science’s equivalent of a Razzie. These are this year’s Ig Nobel Prize winners. Enjoy.To read this article in full or to leave a comment, please click here

Here are the 2016 Ig Nobel Prize ‘winners’

“Congratulations”Let’s say you’re a scientist, and you’ve worked your entire adult life at your discipline. You do a sort of offbeat study, for valid scientific reasons, and figure, hey, this’ll get a laugh in whatever journal is relevant to your field, and then somebody calls you from Cambridge, Mass., and tells you you’ve won science’s equivalent of a Razzie. These are this year’s Ig Nobel Prize winners. Enjoy.To read this article in full or to leave a comment, please click here

IBM shows how fast its brain-like chip can learn

Developing a computer that can be as decisive and intelligent as humans is on IBM's mind, and it's making progress toward achieving that goal.IBM's computer chip called TrueNorth is designed to emulate the functions of a human brain. The company is now running tests and benchmarking TrueNorth to demonstrate how fast and power efficient the chips can be compared to today's computers.The results of the head-to-head contest are impressive. IBM says TrueNorth can engage in deep learning and make decisions based on associations and probabilities, much like human brains. It can do so while consuming a fraction of the power used by chips in other computers for the same purpose.To read this article in full or to leave a comment, please click here

The massive Yahoo hack ranks as the world’s biggest — so far

When Yahoo said on Thursday that data from at least 500 million user accounts had been hacked, it wasn't just admitting to a huge failing in data security -- it was admitting to the biggest hack the world has ever seen.Until Thursday, the previous largest known hack was the 2008 breach that hit almost 360 million MySpace accounts, according to a ranking by the "Have I been pwned" website. Like the Yahoo breach, the hack was only publicly disclosed this year after data was offered on a hacker forum.And only three breaches had ranked above the 100 million level:LinkedIn reported a loss of 167 million email addresses and passwords. They were originally stolen in 2012 but not publicly disclosed until 2016, again after the data was offered on an underground "dark market" site.To read this article in full or to leave a comment, please click here

The massive Yahoo hack ranks as the world’s biggest — so far

When Yahoo said on Thursday that data from at least 500 million user accounts had been hacked, it wasn't just admitting to a huge failing in data security -- it was admitting to the biggest hack the world has ever seen.Until Thursday, the previous largest known hack was the 2008 breach that hit almost 360 million MySpace accounts, according to a ranking by the "Have I been pwned" website. Like the Yahoo breach, the hack was only publicly disclosed this year after data was offered on a hacker forum.And only three breaches had ranked above the 100 million level:LinkedIn reported a loss of 167 million email addresses and passwords. They were originally stolen in 2012 but not publicly disclosed until 2016, again after the data was offered on an underground "dark market" site.To read this article in full or to leave a comment, please click here

Google Fiber push advances in Nashville

Google Fiber won a victory in Nashville as the city's Metro Council approved an ordinance called “One Touch Make Ready,” that would speed up the company's fiber-optic cable installations.The ordinance, passed Wednesday night by a voice vote, gives Google Fiber and other ISPs quicker access to utility poles for deploying fast broadband with fiber-optic cable.Without the measure, each ISP has had to send out a separate crew to a utility pole to move its own line to make room for a new one. The ordinance would permit a single company to make the wire adjustments on a pole instead of waiting for existing providers — competitors like Comcast or AT&T-- to make the changes, which could take months.To read this article in full or to leave a comment, please click here

Google Fiber push advances in Nashville

Google Fiber won a victory in Nashville as the city's Metro Council approved an ordinance called “One Touch Make Ready,” that would speed up the company's fiber-optic cable installations.The ordinance, passed Wednesday night by a voice vote, gives Google Fiber and other ISPs quicker access to utility poles for deploying fast broadband with fiber-optic cable.Without the measure, each ISP has had to send out a separate crew to a utility pole to move its own line to make room for a new one. The ordinance would permit a single company to make the wire adjustments on a pole instead of waiting for existing providers — competitors like Comcast or AT&T-- to make the changes, which could take months.To read this article in full or to leave a comment, please click here

Yahoo data breach affects at least 500 million users

A massive breach at Yahoo compromised account details from at least 500 million users, and the company is blaming the attack on state-sponsored hackers.Names, email addresses, telephone numbers, and hashed passwords may have been stolen as part of the hack, which occurred in late 2014, Yahoo said.The company reported the breach on Thursday, after a stolen database from the company went on sale on the black market last month.However, the hacker behind the sale claimed that the stolen database involved only 200 million users and was likely obtained in 2012.To read this article in full or to leave a comment, please click here

Yahoo data breach affects at least 500 million users

A massive breach at Yahoo compromised account details from at least 500 million users, and the company is blaming the attack on state-sponsored hackers. Names, email addresses, telephone numbers, and hashed passwords may have been stolen as part of the hack, which occurred in late 2014, Yahoo said. The company reported the breach on Thursday, after a stolen database from the company went on sale on the black market last month. However, the hacker behind the sale claimed that the stolen database involved only 200 million users and was likely obtained in 2012.To read this article in full or to leave a comment, please click here

Homeland Security issues call to action on IoT security

U.S. Department of Homeland Security’s Robert Silvers says his purpose in speaking at the Security of Things Forum in Cambridge on Thursday wasn’t to scare anyone, but then he went ahead and called on everyone in the room to “accelerate everything you’re doing” to secure the internet of things. As the Assistant Secretary for Cyber Policy at DHS says, IoT security is a public safety issue that involves protecting both the nation’s physical and cyber infrastructures.Acknowledging a growing national dependency on the internet of things, be it in the medical, utility or transportation fields, Silvers says IoT has his department’s full attention. And a straightforward undertaking it is not, he says.To read this article in full or to leave a comment, please click here

Homeland Security issues call to action on IoT security

U.S. Department of Homeland Security’s Robert Silvers says his purpose in speaking at the Security of Things Forum in Cambridge on Thursday wasn’t to scare anyone, but then he went ahead and called on everyone in the room to “accelerate everything you’re doing” to secure the internet of things. As the Assistant Secretary for Cyber Policy at DHS says, IoT security is a public safety issue that involves protecting both the nation’s physical and cyber infrastructures.Acknowledging a growing national dependency on the internet of things, be it in the medical, utility or transportation fields, Silvers says IoT has his department’s full attention. And a straightforward undertaking it is not, he says.To read this article in full or to leave a comment, please click here

Federal cyber incidents grew an astounding 1,300% between 2006 and 2015

That’s one amazingly scary number: Since 2006 cyber incidents involving the Federal government have grown 1,300%.Another Government Accountability Office report on Federal cybersecurity out this week offers little in the way of optimism for the cyber-safeguard of the massive resources the government has control over.+More on Network World: Network security weaknesses plague federal agencies+“Federal information systems and networks are inherently at risk. They are highly complex and dynamic, technologically diverse, and often geographically dispersed. This complexity increases the difficulty in identifying, managing, and protecting the myriad of operating systems, applications, and devices comprising the systems and networks. Compounding the risk, systems used by federal agencies are often riddled with security vulnerabilities—both known and unknown. For example, the national vulnerability database maintained by the Mitre Corporation has identified 78,907 publicly known cybersecurity vulnerabilities and exposures as of September 15, 2016, with more being added each day,” the GAO wrote.To read this article in full or to leave a comment, please click here

Federal cyber incidents grew an astounding 1,300% between 2006 and 2015

That’s one amazingly scary number: Since 2006 cyber incidents involving the Federal government have grown 1,300%.Another Government Accountability Office report on Federal cybersecurity out this week offers little in the way of optimism for the cyber-safeguard of the massive resources the government has control over.+More on Network World: Network security weaknesses plague federal agencies+“Federal information systems and networks are inherently at risk. They are highly complex and dynamic, technologically diverse, and often geographically dispersed. This complexity increases the difficulty in identifying, managing, and protecting the myriad of operating systems, applications, and devices comprising the systems and networks. Compounding the risk, systems used by federal agencies are often riddled with security vulnerabilities—both known and unknown. For example, the national vulnerability database maintained by the Mitre Corporation has identified 78,907 publicly known cybersecurity vulnerabilities and exposures as of September 15, 2016, with more being added each day,” the GAO wrote.To read this article in full or to leave a comment, please click here

Site that leaked Colin Powell’s emails dumps First Lady’s passport

The site that leaked Colin Powell's stolen emails has also allegedly obtained a scan of Michelle Obama's passport. On Thursday, the site DCLeaks began circulating the passport image on Twitter and leaking it to the press. The image includes the U.S. First Lady's alleged passport number. The site tweeted out the scan after obtaining stolen emails it claims are from a White House aide named Ian Mellul. The files, which are posted on DCLeaks, appear to come from Mellul's Gmail account and date back to February 2015.Although DCLeaks claims to be the work of "American hacktivists," some security experts suspect that the site is a front for Russian state-sponsored hackers.  To read this article in full or to leave a comment, please click here