ComputerWorld

ComputerWorldIndependent

Worried about hacks, senators want info about Trump’s personal phone

Credit to Author: John Ribeiro| Date: Tue, 14 Feb 2017 03:09:00 -0800

Two senators have written to the U.S. Department of Defense about reports that President Donald Trump may still be using an old unsecured Android phone, including to communicate through his Twitter account.

“While it is important for the President to have the ability to communicate electronically, it is equally important that he does so in a manner that is secure and that ensures the preservation of presidential records,” Tom Carper, a Democrat from Delaware, and Claire McCaskill, a Democrat from Missouri, wrote in the letter, which was made public Monday.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

NASA scientist detained at U.S. border until handing over PIN to unlock his phone

Credit to Author: Darlene Storm| Date: Mon, 13 Feb 2017 06:17:00 -0800

Sidd Bikkannavar understands that his last name may sound foreign, but he is a natural-born U.S. citizen who has been working at NASA’s Jet Propulsion Lab for 10 years. He was flagged by U.S. Customs and Border Protection (CBP) for extra scrutiny when returning to the U.S. from Patagonia where his vacation consisted of racing solar-powered cars.

After his passport was scanned at George Bush Intercontinental Airport in Houston, Bikkannavar was detained by CBP until he handed over the PIN to his government-issued phone.

At first, the border agent asked him questions that CBP already knew the answers to since Bikkannavar is enrolled in CPB’s Global Entry program which gives “pre-approved, low-risk travelers” expedited entry into the U.S.; before being approved for the program, CBP says “all applicants undergo a rigorous background check and in-person interview before enrollment.”

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Experts worry that ransomware could hit critical infrastructure

Credit to Author: Michael Kan| Date: Mon, 13 Feb 2017 13:14:00 -0800

Expect ransomware to grow more aggressive in the coming years, including higher ransom payments and attempts to go beyond attacking data — by shutting down entire computer systems to utilities or factories.

“I see no reason for ransomware to stop,” said Neil Jenkins, an official with the U.S. Department of Homeland Security. “It’s shown to be effective.”

On Monday at the RSA cybersecurity conference, experts gave a grim outlook on the future of ransomware, which they fear will spread. Through the attacks, cybercriminals have already managed to rake in US$1 billion last year, according to one estimate.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Recent malware attacks on Polish banks tied to wider hacking campaign

Credit to Author: Lucian Constantin| Date: Mon, 13 Feb 2017 09:43:00 -0800

Malware attacks that recently put the Polish banking sector on alert were part of a larger campaign that targeted financial organizations from more than 30 countries.

Researchers from Symantec and BAE Systems linked the malware used in the recently discovered Polish attack to similar attacks that have taken place since October in other countries. There are also similarities to tools previously used by a group of attackers known in the security industry as Lazarus.

The hackers compromised websites that were of interest to their ultimate targets, a technique known as watering-hole attacks. They then injected code into the websites that redirected visitors to a custom exploit kit.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

IDG Contributor Network: The look of a Facebook imposter

Credit to Author: Sandra Henry-Stocker| Date: Mon, 13 Feb 2017 08:38:00 -0800

While I don’t usually write about hoaxes and scams, a little encounter that I had over the weekend with a con artist brought this issue into clear focus for me. So, I thought I would share some thoughts about what to watch out for when dealing with Facebook friends and how to respond if one of those “friends” turns out to be someone else entirely.

You’ve probably already heard about facebook imposters – individuals who pretend to be someone you know. After you accept them as a friend, they might ask for money, claiming to be stranded in some foreign country or complaining that their wallet was stolen while on vacation and now they need your help getting back home, or they might just try to learn more about you for some nefarious reason or another. In my case, my “friend” — after a quick “hello” — started telling me that I’d won some an award amounting $150,000 in cash and that it should be on its way to me. She suggested that I call a number that she provided to be sure that I was still on the list. She claimed that she had noticed my name on the list when she got hers. Why shouldn’t I believe that?

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

NASA scientist detained at US border until handing over PIN to unlock his phone

Credit to Author: Darlene Storm| Date: Mon, 13 Feb 2017 06:17:00 -0800

Sidd Bikkannavar understands that his last name may sound foreign, but he is a natural-born U.S. citizen who has been working at NASA’s Jet Propulsion Lab for 10 years. He was flagged by U.S. Customs and Border Protection (CBP) for extra scrutiny when returning to the U.S. from Patagonia where his vacation consisted of racing solar-powered cars.

After his passport was scanned at George Bush Intercontinental Airport in Houston, Bikkannavar was detained by CBP until he handed over the PIN to his government-issued phone.

At first, the border agent asked him questions that CBP already knew the answers to since Bikkannavar is enrolled in CPB’s Global Entry program which gives “pre-approved, low-risk travelers” expedited entry into the U.S.; before being approved for the program, CBP says “all applicants undergo a rigorous background check and in-person interview before enrollment.”

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Getting buy-in to combat risk

Credit to Author: Mathias Thurman| Date: Mon, 13 Feb 2017 03:45:00 -0800

When I start at a new company, I make a point of meeting with key personnel from the departments that have the greatest potential for security risk, including operations, engineering, customer service, IT, finance, facilities and human resources. It’s a good way to unearth risks that might not be obvious to me and to get all of those people thinking in terms of security.

Read More
ComputerWorldIndependent

Intel, McAfee dispute heads for settlement talks

Credit to Author: John Ribeiro| Date: Mon, 13 Feb 2017 03:22:00 -0800

A dispute between Intel and security expert John McAfee over the use of his name for another company is headed for settlement talks, according to court records.

The move comes shortly after the federal court refused John McAfee and MGT Capital Investments, the company to be renamed, a preliminary injunction on Intel’s transfer of marks and related assets containing the word McAfee, as part of a proposed spin-out by the chipmaker of its security business as a separate company that would be called McAfee.

To read this article in full or to leave a comment, please click here

Read More