Network World Daily News AM | | A security feature offered by PayPal to help prevent accounts from being taken over by hackers can be easily circumvented, an Australian security researcher has found.PayPal users can elect to receive a six-digit passcode via text message in order to access their accounts. The number is entered after a username and password is submitted.The security feature, known as two-factor authentication, is an option on many online services such as Google and mandatory on many financial services websites for certain kinds of high-risk transactions. Since the code is sent offline or generated by a mobile application, it is much more difficult for hackers to intercept although by no means impossible.To read this article in full or to leave a comment, please click here | | Issue highlights 1. Exposed: An inside look at the Magnitude Exploit Kit 2. Telefónica bids $9B to acquire Brazilian telecom operator 3. Symantec, Kaspersky deny government ban in China 4. The Linux desktop-a-week review: MATE 5. 'Unusual uptick' in attacks on media, publishing, Cisco says 6. LinkedIn pays almost $6M for wage law violations 7. Storage maker builds fast SSD to prepare for life after NAND flash 8. Web acceleration protocol nears completion 9. How NOT to handle negative online reviews 10. Gates cashes out another 20M Microsoft shares for $882M 11. PF Chang's hack hit 33 restaurants for 8 months 12. New products of the week 08.04.2014 | WHITE PAPER: OutSystems It's time to kick start your mobile application strategy. • Why go mobile? • What are the three primary mobile application types? • What type of app should you build first? • How to get started, really fast! Read Now | LAS VEGAS (Black Hat USA) - Researchers at Trustwave have provided CSO with an inside look at the Magnitude Exploit Kit's infrastructure.Linked to attacks against PHP.net and Yahoo, this kit has gone from obscurity to a certified threat in a short amount of time, while generating more than $60,000 USD per week in income.+ ALSO ON NETWORK WORLD Black Hat 2014: How to crack everything +Malware-as-a-Service: Crime Kits are a way for Web-based criminals to automate their business. Some kits focus on malware alone, enabling total control over delivery and management. Others focus on controlling traffic, making them perfect for advertising fraud and Black Hat SEO operations; but at the same time, they can also be used to drive traffic to the third type of kit – exploit kits.To read this article in full or to leave a comment, please click here READ MORE | Telefónica has submitted an offer for Brazilian telecom operator GVT (Global Village Telecom) worth €6.7 billion (US$9 billion), as it seeks to build up its business in Brazil by integrating mobile and fixed broadband with pay-TV services.The Spanish operator's plan is to acquire the operator from its current owner, French media and telecom company Vivendi, and merge it with Telefónica Brasil. A combination of Vivo, the brand Telefónica uses in Brazil, and GVT would create the largest telecom operator in Latin America's largest market, the company said.To read this article in full or to leave a comment, please click here READ MORE | Symantec and Kaspersky Lab are both denying that China has banned their products, amid media reports that the country is shutting out foreign security vendors from selling to government agencies.Both companies are not listed among the approved anti-virus vendors with the country's central government procurement center, leaving only domestic security providers. This prompted reports to suggest that China had excluded both Symantec and Kaspersky Lab as a way to curb the use of foreign technology.But despite the exclusion, U.S.-based Symantec said on Tuesday its products could still be sold to the Chinese government."It is important to note that this list is only for certain types of procurement and Symantec products are not banned by the Chinese government," the company said in an email. "We are investigating this report and will continue to bid for and win governments projects in China."To read this article in full or to leave a comment, please click here READ MORE | I've been running MATE as my one and only environment for the last week. And boy howdy, do I have an opinion. READ MORE | WHITE PAPER: Polycom The Gartner "MarketScope for Group Video Systems" evaluates 7 group video system vendors based on 6 customer-focused criteria such as customer experience, market responsiveness and track record, and offering strategy. The report offers guidance for IT leaders who want to start or expand the use of video collaboration within their organizations. Learn more >> | In its semi-annual threat report out today, Cisco points to an "unusual uptick" in attacks on media and publishing, putting that sector the top target for malware.For the first half of 2014, media and publishing sites had the dubious distinction of being in first place in terms of visitors being at risk for malware, sometimes because the sites were serving up "malvertising" instead of advertising. Malvertising often works by trying to re-direct browsers through methods such as iFrame attacks to force them to links elsewhere, says Levi Gundert, technical lead for Cisco's threat research, analysis and communications group.MORE ON NETWORK WORLD: Free security tools you should try "Criminals like re-directing traffic from media and publishing sites because they are high volume," Gundert says. Criminals, by paying for ads, are exploiting the highly-automated advertising exchanges to accept ads that contain carefully coded elements such as iFrame attacks and JavaScript that the exchanges themselves are not detecting and may not have the means to do so. So far, the industry hasn't come to terms with the significance of the scale of these attacks, but Cisco is hoping it will adopt proactive protections.To read this article in full or to leave a comment, please click here READ MORE | Professional networking company LinkedIn agreed to pay close to US$6 million in overtime back wages and damages to employees at its branches in California, Illinois, Nebraska and New York, the U.S. Department of Labor said Monday.The payments to 359 former and current employees were made after LinkedIn was found to have violated overtime and record-keeping provisions under the federal Fair Labor Standards Act, which prescribes minimum wage, overtime pay, record keeping and youth employment standards for employees in the private sector and in government.LinkedIn agreed to pay the overtime back wages and take steps to prevent repeat violations, including providing compliance training to relevant employees and their managers, the Labor Department said in a statement. Its investigators found the company did not record, account and pay for all hours worked in a work-week.To read this article in full or to leave a comment, please click here READ MORE | Storage technologies much faster than NAND flash aren't expected to reach most smartphones and data centers for years, but preparations are already underway in order to make the most of them when they arrive.Western Digital's HGST subsidiary is demonstrating one advance in that effort this week, showing what it calls the world's fastest SSD (solid-state drive) at the Flash Memory Summit in Santa Clara, California.The device, which can be plugged into a server's PCIe slot like any SSD, isn't a new storage product but a platform for demonstrating a low-latency interface that the company developed with future solid-state media in mind. It implemented the experimental communications protocol in a Linux driver on the server and in the SSD's embedded software.To read this article in full or to leave a comment, please click here READ MORE | When it comes to speeding up Web traffic over the Internet, sometimes too much of a good thing may not be such a good thing at all.The Internet Engineering Task Force is putting the final touches on HTTP/2, the second version of the Hypertext Transport Protocol (HTTP). The working group has issued a last call draft, urging interested parties to voice concerns before it becomes a full Internet specification.Not everyone is completely satisfied with the protocol however."There is a lot of good in this proposed standard, but I have some deep reservations about some bad and ugly aspects of the protocol," wrote Greg Wilkins, lead developer of the open source Jetty server software, noting his concerns in a blog item posted Monday.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: RES Software Check out the five most common annoyances facing enterprise IT service desks today, and how automation can resolve all of them. Download the white paper Learn more | Bad online reviews can bury a business, but netizens do not react well when free speech is threatened. When a business such as the Union Street Guest House hotel adds in hefty fines as the penalty for negative reviews, it can end up becoming one the most hated hotels online. READ MORE | Holdings drop under 300-million-share mark for the first time as sales plan continues READ MORE | The hack of credit-card-processing terminals at PF Chang's hit 33 of the company's locations across the U.S. and continued for around eight months, the company said Monday.The restaurant chain operator first disclosed a possible hack of its credit- and debit-card-processing system in mid-June, but Monday was the first time it detailed which of its restaurants had been hit.Eight locations had data stolen over an eight-month period from Oct. 19, 2013, until June 11, 2014. Data theft began at a second batch of eight restaurants on Feb. 21, and at another 15 restaurants on April 10, both ending on June 11. At two additional restaurants, theft began on Oct. 19, 2013, and ended on Oct. 26, 2013, and April 10, 2014, respectively.To read this article in full or to leave a comment, please click here READ MORE | Our roundup of intriguing new products from companies such as EMC and RSA. READ MORE | WHITE PAPER: Red Hat Flybe was one of the 21 companies that were interviewed for quantitative results on their operations as part of an IDC ROI analysis. This case study presents the qualitative side of the company's success story. Read Now | | | | | | | |
No comments:
Post a Comment