Tech-support scammers claim your email has been hacked

The Federal Trade Commission is warning of “a new twist” on the old tech-support scam.From an FTC blog post: Lately, we’ve heard reports that people are getting calls from someone claiming to be from the Global Privacy Enforcement Network. Their claim? That your email account has been hacked and is sending fraudulent messages. They say they’ll have to take legal action against you, unless you let them fix the problem right away.If you raise questions, the scammers turn up the pressure – but they’ve also given out phone numbers of actual Federal Trade Commission staff (who have been surprised to get calls). The scammers also have sent people to the actual website for the Global Privacy Enforcement Network. (It’s a real thing: it’s an organization that helps governments work together on cross-border privacy cooperation.)To read this article in full or to leave a comment, please click here

Tech-support scammers claim your email has been hacked

The Federal Trade Commission is warning of “a new twist” on the old tech-support scam.From an FTC blog post: Lately, we’ve heard reports that people are getting calls from someone claiming to be from the Global Privacy Enforcement Network. Their claim? That your email account has been hacked and is sending fraudulent messages. They say they’ll have to take legal action against you, unless you let them fix the problem right away.If you raise questions, the scammers turn up the pressure – but they’ve also given out phone numbers of actual Federal Trade Commission staff (who have been surprised to get calls). The scammers also have sent people to the actual website for the Global Privacy Enforcement Network. (It’s a real thing: it’s an organization that helps governments work together on cross-border privacy cooperation.)To read this article in full or to leave a comment, please click here

Apple fixes iOS lock screen bypass that gives access to photos, contacts

Apple has reportedly fixed a vulnerability that could have allowed hackers to bypass the passcode on iPhone 6s and 6s Plus running iOS 9.3.1 in order to access the address book and photos.The bypass technique was discovered by researchers from German security firm Evolution Security and takes advantage of Siri's integration with apps like Twitter or Facebook and the new 3D Touch feature that's only available on the iPhone 6s and 6s Plus models.On a locked device, attackers can call up Siri and ask to search for items that contain @ tags using Twitter, Facebook or Yahoo. Then they can locate a string like an email address and use the 3D Touch hard push to bring out the context menu for it.To read this article in full or to leave a comment, please click here

Apple fixes iOS lock screen bypass that gives access to photos, contacts

Apple has reportedly fixed a vulnerability that could have allowed hackers to bypass the passcode on iPhone 6s and 6s Plus running iOS 9.3.1 in order to access the address book and photos.The bypass technique was discovered by researchers from German security firm Evolution Security and takes advantage of Siri's integration with apps like Twitter or Facebook and the new 3D Touch feature that's only available on the iPhone 6s and 6s Plus models.On a locked device, attackers can call up Siri and ask to search for items that contain @ tags using Twitter, Facebook or Yahoo. Then they can locate a string like an email address and use the 3D Touch hard push to bring out the context menu for it.To read this article in full or to leave a comment, please click here

Frontier Communications continues to take a beating from Verizon castoffs

The transition of 3.7 million Verizon landline customers in California, Florida and Texas to Frontier Communications, as announced on April 1 of all days, continues to be a mess due to a combination of technical and communications issues.Unhappy landline phone, broadband FiOS Internet and video-on-demand customers have vented to Frontier support, including on social media sites, to express their frustration. Some have blamed Verizon as well, for not ensuring its residential, small/medium business and enterprise customers would receive a smooth transition after grabbing its $10.54 billion in the sale and shifting 9,400 of its employees to Frontier. (Though Verizon has blamed uncertainty round federal Internet regulation (i.e., net neutrality) for forcing it to sell the assets in the first place.)To read this article in full or to leave a comment, please click here

Frontier Communications continues to take a beating from Verizon castoffs

The transition of 3.7 million Verizon landline customers in California, Florida and Texas to Frontier Communications, as announced on April 1 of all days, continues to be a mess due to a combination of technical and communications issues.Unhappy landline phone, broadband FiOS Internet and video-on-demand customers have vented to Frontier support, including on social media sites, to express their frustration. Some have blamed Verizon as well, for not ensuring its residential, small/medium business and enterprise customers would receive a smooth transition after grabbing its $10.54 billion in the sale and shifting 9,400 of its employees to Frontier. (Though Verizon has blamed uncertainty round federal Internet regulation (i.e., net neutrality) for forcing it to sell the assets in the first place.)To read this article in full or to leave a comment, please click here

Volkswagen chooses OpenStack for private cloud

The second largest car manufacturer in the world, Volkswagen Group, will use the open-source cloud computing platform OpenStack to build a private cloud that will host websites for its brands VW, Audi and Porsche, and be a platform for innovating automotive technology, the company announced today.+MORE AT NETWORK WORLD: Mirantis beats out Red Hat for big VW OpenStack deal | Jeff Bezos to shareholders: At 10 years old, AWS is bigger than Amazon was and growing faster +To read this article in full or to leave a comment, please click here

WhatsApp: The FBI’s worst nightmare

If encryption is something to be feared in the hands of terrorists, WhatsApp just delivered them a tool that will give the FBI nightmares much worse than the encryption on iPhones. WhatsApp enlisted the help of Open Whisper Systems to implement the encryption, and according to that company’s blog, “This includes chats, group chats, attachments, voice notes, and voice calls across Android, iPhone, Windows Phone, Nokia S40, Nokia S60, Blackberry, and BB10.” This will likely drive law enforcement crazy, the FBI in particular, because it makes it impossible for WhatsApp to obey court orders to decrypt specified communications. Even if it wanted to comply, it couldn’t. The encryption is set up between the endpoints in the communication and WhatsApp just moves the traffic.To read this article in full or to leave a comment, please click here

WhatsApp: The FBI’s worst nightmare

If encryption is something to be feared in the hands of terrorists, WhatsApp just delivered them a tool that will give the FBI nightmares much worse than the encryption on iPhones. WhatsApp enlisted the help of Open Whisper Systems to implement the encryption, and according to that company’s blog, “This includes chats, group chats, attachments, voice notes, and voice calls across Android, iPhone, Windows Phone, Nokia S40, Nokia S60, Blackberry, and BB10.” This will likely drive law enforcement crazy, the FBI in particular, because it makes it impossible for WhatsApp to obey court orders to decrypt specified communications. Even if it wanted to comply, it couldn’t. The encryption is set up between the endpoints in the communication and WhatsApp just moves the traffic.To read this article in full or to leave a comment, please click here

Intel and the Network Arms Race

IntelLogo

Networking is undergoing a huge transformation. Software is surely a huge driver for enabling technology to grow by leaps and bounds and increase functionality. But the hardware underneath is growing just as much. We don’t seem to notice as much because the port speeds we deal with on a regular basis haven’t gotten much faster than the specs we read about years go. But the chips behind the ports are where the real action is right now.

Fueling The Engines Of Forwarding

Intel has jumped into networking with both feet and is looking to land on someone. Their work on the Data Plane Development Kit (DPDK) is helping developers write code that is highly portable across CPU architecture. We used to deal with specific microprocessors in unique configurations. A good example is Dynamips.

Most everyone is familiar with this program or the projects that spawned, Dynagen and GNS3. Dynamips worked at first because it emulated the MIPS processor found in Cisco 7200 routers. It just happened that the software used the same code for those routers all the way up to the first releases of the 15.x train. Dynamips allowed for the emulation of Cisco router software but it Continue reading

At MIT, a glimpse into our techno future

In the future, you may use aeroponic systems at home to bring in water mixed with nutrients. You'll use this water to grow vegetables, home-grown food that can cut your produce costs in half.Your commute to work may be on a covered, quasi-bike vehicle that uses battery power to assist the pedaling rider (who gets healthier from the effort).And the era of the large suburban homes will end. Why have multiple rooms for various purposes?"The cost of transformable furniture is much less than a mortgage," said David Rose, a visiting scientist at the MIT Media Lab and author of Enchanted Objects: Innovation, Design and the Future of Technology. Rose was at Tuesday's MIT "Connected Things" Enterprise Forum.To read this article in full or to leave a comment, please click here

Hospitals hacks put patient health at risk

A report that highlights the vulnerabilities in medical devices and the risks they pose to patient health issued by Independent Security Evaluators comes at an opportune time as the past month has shown that hospitals are becoming targets for criminals.Ted Harrington, executive partner at Independent Security Evaluators said, "It’s a scary report in a lot of ways, but our hope is to organize an industry in recognizing these problems. We are trying to make an entire industry start changing, especially one that is very regulated and complex. The conversations need to start happening."To read this article in full or to leave a comment, please click here

Kinder, gentler hacks: A bevy of low-stakes early computer breaches

When the world was newImage by National Security AgencyToday, IT security is a deadly serious business. But in the early days of computing, the stakes were a bit lower. Maybe it's just that we're seeing it through a nostalgic lens, but the computer breaches in the '70s, '80s, and '90s just seemed a bit more ... fun? We spoke to some people who were there, who enjoyed reminiscing about a gentler era, whether they were the ones hacking or the ones being hacked.To read this article in full or to leave a comment, please click here