Articles about Security

OS X, iOS and Linux have more vulnerabilities than Windows

OS X, iOS and Linux have more vulnerabilities than Windows

It might come as something of a surprise, but Windows is more secure than not only Apple's iOS and OS X, but also Linux. I'll just let that sink in for a moment...

Windows, the operating system ridiculed for its vulnerabilities and susceptibility to viruses is actually more secure than the supposedly Fort Knox-like Linux and OS X. This startling fact comes from the National Vulnerability Database (described as the "US government repository of standards based vulnerability management data") which details security issues detected in different operating systems and software titles.

Continue reading

Lenovo redeems itself with open source Superfish removal tool

opensource

What do you do when you are facing scrutiny in the media? Damage control. You see it all the time with celebrities. A famous actor or musician does something wacky or stupid and ends up crying to Oprah, or going to rehab.

If you are a respected computer manufacturer, what do you do to fix a tarnished image? Open source. Nothing makes computer nerds more giddy than hearing that software is open source and the source code is available to investigate. Today, Lenovo releases an official open source Superfish removal tool under the Mozilla Public License.

Continue reading

NSA and GCHQ hacked world's biggest SIM card manufacturer to steal your data

SIM Card Phone Smartphone

In mid-2013, Edward Snowden revealed that the government-backed agency NSA monitored everything happening on the Internet, including spying on individuals' phone calls, messaging, and emails to glean information and pinpoint suspicious activities in an attempt to stop the growing terrorist acts.

Since the revelations -- which changed everyone's perspective on privacy -- the leaked information from Snowden and acceptance from major technology companies have given us an understanding of how the NSA managed to get our data from the services we heavily rely on. Essentially, either providers agreed to turn over our data or the NSA found another way, a backdoor, to obtain it. But how it manage to tap our phone calls was mostly unclear. Last year, Vodafone did acknowledge that it allowed the NSA to place surveillance tools inside its data centers. But as it turns out, the agency had more ways to log our phone activities.

Continue reading

Lenovo loads dangerous Superfish adware onto new computers -- this fish stinks

deadish

Buying a new Windows computer can be a really fun moment. When you say goodbye to your aging and slow machine, and start fresh with a new model, everything seems faster and peppier. Unfortunately, many manufacturers pre-load unwanted software on these computers, causing headaches and wasted time for the consumer. It can take hours to uninstall all of the stuff you do not want.

Sadly, Lenovo has crossed a line when it comes to this practice. Along with all the the usual added software (bloatware), was a piece of adware called Superfish. From a security standpoint, it could potentially put customer data at risk with man in the middle attacks, which in turn threatens the manufacturer's reputation.

Continue reading

Large enterprises targeted by mobile Trojans

Threats

Mobile cyber threats are more common and more sophisticated than ever before, with a number of high profile threats in the past year.

According to a new report from security companies Check Point and Lacoon Mobile Security, this means mobile devices are growing into a serious threat to the enterprise.

Continue reading

Fighting cyber threats hampered by disconnect between IT and business

cyber security

A disconnect between systems leaders and business leaders coupled with a lack of resources is keeping enterprises from properly addressing cyber threats.

This is according to a new study commissioned by defense and security company Raytheon and conducted in conjunction with the Ponemon Institute.

Continue reading

SOAP vulnerability leaves Netgear routers open to hackers

SOAP vulnerability leaves Netgear routers open to hackers

Owners of Netgear routers are warned that their wireless security keys and admin password could be accessed by hackers. A security vulnerability has been found in the SOAP service embedded in some Netgear network devices that could be abused with specially designed HTTP requests.

Routers can be tricked into executing commands even if they originate from an unauthenticated session, potentially exposing sensitive information to hackers. For anyone with remote management enabled on their router, there is the added worry that all of this could be carried out by someone without physical access, or who is not in close proximity, to the network. A number of Netgear routers are affected.

Continue reading

Samsung lied -- its smart TV is indeed spying on you and it is doing nothing to stop that

Hulu Plus Samsung TV

About 70 years ago, English novelist George Orwell wrote 1984, a controversial novel which visioned of a fictional dystopian place called Oceania where people had no real privacy. As Orwell described, residents of Oceania had two-way telescreens so that they may be watched or listened to by government authorities. The book was written way ahead of its time, and while it didn't make much sense back then, a lot of assumptions Orwell made in 1984 are coming true now.

Samsung's smart TVs are in the news once again. Not for impressive sales figures -- something the South Korean technology conglomerate would definitely appreciate -- but for jeopardizing its users’ privacy.

Continue reading

Your Android device may be spying on you even when it's 'off'

mobile-malware

Much is made of the "Android malware problem", but the truth is, there isn't a very bad problem. That does not mean there is no problem though. Visuses for Google's mobile platform do exist and some folks manage to let phones and tablets contract a virus. Now a new and interesting bug seems to be floating around.

According to security software maker AVG this latest malware comes with a unique feature -- it can spy on you when you think your device is shut off. It does so by mimicking the shutdown screen, but not actually powering off the handset.

Continue reading

Don't go to RedTube without protection -- the adult site could give you a nasty infection [updated]

redtube condom

Yesterday I reported how Jamie Oliver’s website was serving up malware to unsuspecting visitors. It was a problem that was quickly fixed, but a worrying one seeing as the website has over 10 million visitors a month.

Now today, Malwarebytes -- which first discovered the Jamie Oliver exploit -- reports another compromised site that’s even more popular. Adult website RedTube.com sees over 300 million visits a month (some shorter than others), and currently has a malicious iframe in its source code.

Continue reading

Celebrity chef Jamie Oliver serves up an unpleasant malware surprise

JamieOliver2

Most web-based threats come from malicious adverts placed on websites (aka malvertising), but Malwarebytes has discovered a well hidden malicious injection on the official website of Jamie Oliver which redirects unsuspecting visitors to an exploit kit.

The compromised site -- www.jamieoliver.com -- is currently ranked 519 in the UK (5,280 in the world), according to Alexa, with around 10 million visitors a month, which makes it a valuable target for hackers.

Continue reading

New vulnerabilities kick off 2015

virtual padlock

There's always that tiny glimmer of hope that in some way a new year is going to be somehow different from and better than the one that went before.

Usually it's extinguished quite quickly and it seems that, in software terms at least, 2015 is no exception according to the latest vulnerability report from Secunia released today.

Continue reading

Worldwide Equation Group hid undetectable spyware on hard drives

Worldwide Equation Group hid undetectable spyware on hard drives

In a new twist to the on-going NSA story, security firm Kaspersky Lab has discovered that a threat actor of previously unknown complexity and sophistication has been embedding surveillance software on hard drives produced by a number of well-known manufacturers. With names such as Western Digital, Seagate and Toshiba mentioned, and the reach of the spy program stretching to dozens of countries, it's not clear quite how many people may be affected.

Although Kapersky does not go as far as naming the NSA, or even specifying which country is responsible for the advanced surveillance, it seems that the spying campaign is somehow related to Stuxnet -- the tool used by the NSA to attack Iran -- and the Flame group.

Continue reading

Microsoft leads the way with adoption of first international cloud privacy standard

Microsoft leads the way with adoption of first international cloud privacy standard

The gradual push of just about everything to the cloud means that security and privacy are of greater concern than ever before. This is true for everyone who makes use of cloud services like OneDrive and Azure, but it is of particular interest to enterprise customers.

Today Microsoft has become the first major cloud service provider to adopt ISO/IEC 27018, the world’s first international standard for cloud privacy. The idea is to ensure that there is a global standard that determines how personal data privacy is handled in the cloud. The standard equips people with a number of assurances.

Continue reading

Malware on the increase as Android and Windows battle for 'most infected' top spot

virus malware infection mobile

According to a new report from telecommunication company Alcatel-Lucent's Motive Security Labs security threats to mobile and residential devices and attacks on communications networks all rose in 2014.

It estimates that 16 million mobile devices worldwide have been infected by malware. It also points out many retail cyber-security breaches in 2014 were the result of malware infections on cash registers or point-of-sale terminals, not online stores, so shopping offline isn't guaranteed to keep your details safe.

Continue reading

© 1998-2015 BetaNews, Inc. All Rights Reserved. Privacy Policy.