AP Twitter Account Hacked: Underlines Need for Security

The Associated Press Twitter account was hacked yesterday with a false report involving explosions at the White House. The account was quickly suspended, but not before the news had been retweeted thousands of times, resulting in a temporary yet sharp drop in the Dow and news outfits clamoring to ascertain details. Although the account is active again, the news agency has nearly 2 million less followers, which Twitter explains could take up to 24 hours to repair. Continue reading AP Twitter Account Hacked: Underlines Need for Security

CISPA: House of Representatives Passes Controversial Bill

In a 288 to 127 vote, the U.S. House of Representatives has passed the Cyber Intelligence Sharing and Protect Act (CISPA), which encourages businesses to share cyberthreat information with the government. Privacy advocates have been fighting passage of the act, concerned that it allows agencies to conduct warrantless searches of data collected from e-mail and Internet providers. The bill overrides current privacy and wiretap laws. Continue reading CISPA: House of Representatives Passes Controversial Bill

Search Engine Exposes Vulnerability of Connected Devices

Rather than crawl websites like a traditional search engine, Shodan navigates back channels tracking servers, webcams, printers, routers and other devices connected to the Internet. Each month, it gathers information on roughly 500 million connected devices and services. CNNMoney calls Shodan “the scariest search engine on the Internet.” As we move closer to the Internet of Things, it raises questions about how easy it may be to hack anything that is connected to the Internet. Continue reading Search Engine Exposes Vulnerability of Connected Devices

Google Creates Manager for Permanently Inactive Accounts

With Internet users posting an increasing amount of information online, the question has arisen regarding what happens to that data once an individual passes on. Google may now have an answer with its new Inactive Account Manager. With this technology, users of any Google service can set a time to delete their “digital life” or send selected elements to a person of their choosing, after the account or accounts become permanently inactive. Continue reading Google Creates Manager for Permanently Inactive Accounts

U.S. Financial Institutions Become Targets of Cyberattacks

American Express confirmed that its website had come under attack last week. The assault, which took the site offline for two hours, marks the latest in a string of powerful digital attacks on American financial institutions that began this past September. JPMorgan Chase and others experienced a similar attack this month. The assaults collectively resulted in the loss of millions of dollars. Continue reading U.S. Financial Institutions Become Targets of Cyberattacks

Ethical Hacking: Going Undercover to Train Employees

Businesses have been training their employees to be more aware of potential cyberattacks. However, here’s the twist: the employees don’t always know they are being trained. So-called “ethical hackers” have been hired to lure employees with different tactics such as fake emails promising work bonuses and pictures of adorable cats with links or software that teaches workers how to avoid online dangers. Continue reading Ethical Hacking: Going Undercover to Train Employees

CIA Discusses Plans for Collecting and Analyzing Big Data

During a presentation at last week’s GigaOM Structure:Data conference in New York, Ira “Gus” Hunt, the CIA’s chief technology officer, detailed the Agency’s vision for collecting and analyzing information people put on the Internet. The presentation came just two days after it was reported that the CIA is about to sign a cloud computing contract with Amazon worth up to $600 million over 10 years. Continue reading CIA Discusses Plans for Collecting and Analyzing Big Data

Coalition of 38 States Draws Up Security Steps for Google

After a two-year investigation into whether or not Google’s Street View violates privacy protections, law enforcement officials have again told the company it is time to shape up. Google acknowledged breaches this week and said no longer will there be a scenario in which a midlevel engineer launches a program to secretly gather data from possibly millions of unencrypted global Wi-Fi networks, unbeknownst to his bosses. Continue reading Coalition of 38 States Draws Up Security Steps for Google

Obama Seeks Corporate Support for Cybersecurity Initiative

President Obama met with a group of 13 corporate executives at the White House on Wednesday to discuss growing cybersecurity concerns and to enlist support for his proposed legislation to combat the threat of computer warfare and corporate espionage. Among the chief execs were Rex W. Tillerson of Exxon Mobil, Randall L. Stephenson of AT&T, Brian T. Moynihan of Bank of America and Jamie Dimon of JPMorgan Chase. Continue reading Obama Seeks Corporate Support for Cybersecurity Initiative

China Hacking Hollywood Computers, Say Security Experts

Some cybersecurity experts say that Chinese hackers have invaded Hollywood’s computers, much like they did to the systems of Facebook, Apple, The New York Times and many others. The root of the problem, according to The Hollywood Reporter, is China’s contempt for intellectual property. In a country where most video and software is pirated, the culture of copying runs deep. Continue reading China Hacking Hollywood Computers, Say Security Experts

Danny Hillis Asks: What Happens if the Internet Goes Down?

At TED 2013 last week, Danny Hillis, an early Internet user who registered the third domain name ever (Think.com), spoke on the vulnerability of the expanding Internet. While standing on stage for his talk, he held up a one-inch-thick notebook, which listed every person — including name, address and phone number — who had an Internet address in 1982. By his estimates, that book would be 25 miles tall in today’s world. Continue reading Danny Hillis Asks: What Happens if the Internet Goes Down?

Samsung Preps Android to Take On BlackBerry in Enterprise

Samsung Electronics has another target in its ever-growing sights: the BlackBerry. Until recently, Samsung has marketed its smartphones very successfully to consumers worldwide, but never to businesses. That’s been changing over the past year, as the South Korean manufacturer has been beefing up the Google Android software that runs its phones, in an effort to give businesses a phone with increased security. Continue reading Samsung Preps Android to Take On BlackBerry in Enterprise

China Denies Cyberattack Allegations from Mandiant Report

After U.S. computer-security firm Mandiant Corp. accused China of stealing large swaths of data from U.S. companies, China flatly denied the accusation. In a 74-page report, the firm claims a group attached to China’s People’s Liberation Army stole data from 141 companies since 2006, 115 of which were in the U.S., spanning industries like information technology, telecommunications, aerospace and energy. Continue reading China Denies Cyberattack Allegations from Mandiant Report

CISPA Reintroduced: Activist Groups Fuel Online Response

After Congress reintroduced the controversial Cyber Intelligence Sharing and Protection Act (CISPA), a collection of Internet freedom activists quickly jumped into action. “Among them have been Demand Progress and Fight for the Future, who this week helped 300,000 citizens send a petition against CISPA to the lawmakers behind it,” reports Mashable. Continue reading CISPA Reintroduced: Activist Groups Fuel Online Response

Twitter Hacked: 250,000 Users Affected by Recent Attack

Hackers have carried out a sophisticated attack on Twitter, prompting the company to release a statement explaining how its “investigation has thus far indicated that the attackers may have had access to limited user information — usernames, email addresses, session tokens and encrypted/salted versions of passwords — for approximately 250,000 users.” The nature of the attack suggests it could be part of a larger effort. Continue reading Twitter Hacked: 250,000 Users Affected by Recent Attack