Login
Password
Sources on this Page

> Headlines by Category

 Home / Technology / Security / Authentication & Encryption

You are using the plain HTML view, switch to advanced view for a more complete experience.

Russian cyberspies likely behind DNC breach move on to German election

A group of suspected Russian cyberspies accused of interfering in the U.S. presidential election is also attempting to influence the upcoming vote in Germany, according to the country’s domestic intelligence agency.

The Russian hacking group known as Fancy Bear, or APT 28, has been targeting political parties in the country, Germany's Federal Office for the Protection of the Constitution (BfV) intelligence agency said in a statement Thursday.

The hacking activities have led to a surge in spear-phishing email attacks directed at German politicians, the agency said.  

To read this article in full or to leave a comment, please click here

Cyberspies stole secrets from industrial giant ThyssenKrupp

Germany-based industrial conglomerate ThyssenKrupp was hit by a cyberespionage attack earlier this year that resulted in data being stolen from its industrial solutions and steel producing units.

An investigation revealed that the attack was carried out by a professional group of hackers from Southeast Asia and targeted technological know-how and research, according to the company.

While hackers managed to steal some information, its exact nature is not clear, with the exception of certain project data from an engineering company, ThyssenKrupp said in an emailed statement Thursday. As a result, at this time there's no reliable estimate of the damage to the company's intellectual property.

To read this article in full or to leave a comment, please click here

OpenVPN will be audited for security flaws

The next major version of OpenVPN, one of the most widely used virtual private networking technologies, will be audited by a well-known cryptography expert.

The audit will be fully funded by Private Internet Access (PIA), a popular VPN service provider that uses OpenVPN for its business. The company has contracted cryptography engineering expert Matthew Green, a professor at Johns Hopkins University in Baltimore, to carry out the evaluation with the goal of identifying any vulnerabilities in the code.

Green has experience in auditing encryption software, being one of the founders of the Open Crypto Audit Project, which organized a detailed analysis of TrueCrypt, a popular open-source full-disk encryption application. TrueCrypt has been abandoned by its original developers in 2014, but its code has since been forked and improved as part of other projects.

To read this article in full or to leave a comment, please click here

U.S. and U.K. spy agencies have intercepted in-flight phone calls for years

U.S. and U.K. spy agencies have been monitoring in-flight mobile phone users for years, according to new revelations from the trove of documents leaked by former NSA contractor Edward Snowden.

As early as 2012, the U.K. Government Communications Headquarters (GCHQ) was intercepting voice and data communications from commercial aircraft using the OnAir service to carry 2G mobile services over the Inmarsat satellite communications network. At the time, the GCHQ did not have access to a rival in-flight mobile service provider, Aeromobile, the French newspaper Le Monde reported Wednesday.

To read this article in full or to leave a comment, please click here

4 top disaster recovery packages compared

Whether the disaster is a flood, a power outage or human error, IT departments have the critical role of getting business systems working again. And that requires reliable disaster-recovery software.

To read this article in full or to leave a comment, please click here

(Insider Story)
Fighting ransomware: A fresh look at Windows Server approaches

Ransomware is evil, and it continues to prey upon thousands of businesses every year. Most infections are fairly quiet affairs: A small business gets infected, almost always by some employee opening an email attachment he or she mistakes as legitimate but that really contains the payload of a virus. Then several undetected hours later, all of the business' files -- at least those the employee had access to, which in a lot of businesses without good security and permissions policies is all of the files -- are encrypted, and demands for payment of a ransom in Bitcoin are made in exchange for the decryption key.

To read this article in full or to leave a comment, please click here

(Insider Story)
Democrats push for probe of Russia's role in alleged election hacks

U.S. lawmakers are pushing for a government probe into whether Russia may have interfered with the presidential election by hacking high-profile political targets.  

On Wednesday, two Democratic representatives unveiled legislation that proposes to form a 12-member bipartisan commission to investigate the electronic means Russia may have used to influence the U.S. election.

"Regardless of whether you voted for Donald Trump, Hillary Clinton, or anyone else, Russia’s attacks on our election are an attempt to degrade our democracy," said Representative Elijah Cummings of Maryland, one of the sponsors of the bill.

To read this article in full or to leave a comment, please click here

Latest Android security update fixes Dirty COW, GPS vulnerabilities

The monthly Android security update released this week fixes the serious Dirty COW privilege escalation attack that can allow malicious apps to take full control of devices.

Dirty COW (copy-on-write) is a privilege escalation vulnerability that has existed in the Linux kernel for the past nine years and is already being exploited in the wild. It affects Android because the mobile OS is based on Linux, but it was initially believed that the SELinux security policies enforced by default in Android provided some mitigation against the attack.

To read this article in full or to leave a comment, please click here

Post Selected Items to:

Showing 10 items of 137

home  •   advertising  •   terms of service  •   privacy  •   about us  •   contact us  •   press release design by Popshop •   Official PR partner PRNews.io •   © 1999-2016 NewsKnowledge