tech in the spotlight
Posted by Sheila Shayon on May 1, 2013 02:53 PM
As with any device that ups the ante on usage and reach, added security risks and vulnerability come hand-in-hand—and in this case, fashion issues as well.
Google has been busy hyping Google Glass, as it unleashes the futuristic specs on developers and journalists to test drive. It released a tutorial video this week, demonstrating how the glasses work.
But as developers pour over the specs of the device, several security loopholes have been discovered, causing already existing security concerns to rise. Jay Freeman, iOS and Android developer discovered that an Android hacking technique could compromise the Glass headset, gaining complete control of its operating system and potentially allowing the installation of surveillance malware.
This “Explorer” version of Glass that developers received doesn’t have a PIN code or authentication protection, so when left on and unattended, the device is vulnerable to hacking. A USB cable could be attached to the headset and used to gain full "root" access to the device, which could allow surveillance programs to be installed. Such programs could upload a user's photos, video and audio to a remote server.Continue reading...
Posted by Sheila Shayon on February 20, 2013 05:53 PM
More than 40 companies including Apple, Facebook and Twitter have been targeted in malware attacks linked to an Eastern European gang of hackers using an iPhone-developer website, iPhoneDevSDK.
The hackers are mining for proprietary research and intellectual property they can re-sell underground, with their assault being called a “sophisticated attack” by Facebook and “extremely sophisticated” by Twitter.
RSA Security Inc. has called their tactics a “waterhole” attack, as victims are attracted to the source of the infection. This technique attacks a centralized website with many visitors and secretly infects vulnerable machines using an un-patched exploit. It differs from a targeted attack like emailing a malware-laden attachment to a specific user.
Apple said Tuesday in a statement, "We identified a small number of systems within Apple that were infected and isolated them from our network. There is no evidence that any data left Apple." Apple countered with release of a Java patch for OS X users and a tool that will sweep Mac computers for any Java malware and remove the offending software, which millions of Mac users must now install.Continue reading...
Posted by Sheila Shayon on November 6, 2012 10:54 AM
Blooomberg reveals that the hackers spent one month “pilfering sensitive files” about Coca-Cola’s attempt to acquire China Huiyuan Juice Group for $2.4 billion. If successful, the transaction would have been the largest foreign takeover of a Chinese company ever. The breach started with malware-infected e-mails to Coca-Cola's senior executives which, when opened, enabled the hackers to infiltrate the network and steal proprietary information. Once revealed, the Huiyuan deal collapsed three days later.Continue reading...
Posted by Sheila Shayon on April 26, 2012 12:11 PM
As he battles to restore his media conglomerate's reputation as the British hacking inquiry continues, News Corp. head Rupert Murdoch found himself in more hot water this week.
On the second day of the UK media ethics inquiry chaired by Lord Justice Brian Leveson about the Australian-born mogul’s intertwined political influence and business interests, Murdoch stepped into it by describing British Prime Minister David Cameron's late son Ivan as "retarded." In fact, Ivan Cameron was afflicted with cerebral palsy and epilepsy and died at age six in 2009.Continue reading...