Coking coal resumes sharp decline
After a pause last week (and even a small move higher) following 12 weeks of non-stop selling, the rout on coking coal markets resumed on Tuesday. The steelmaking raw material fell 4.7% to $154.80 on the day, the lowest since early September.
Mongolia paves the way for IMF bailout
Mongolia’s parliament moved towards meeting the conditions of an International Monetary Fund (IMF) bailout of $3-5 billion on Friday, as lawmakers voted to grant greater independence to the Development Bank of Mongolia.
What Could China’s ‘Social Credit System’ Mean for its Citizens?
China’s authoritarian government is using big data to develop credit scoring systems and a so-called social credit system, while urging data-sharing between companies and governments. How should Chinese netizens and global citizens concerned about privacy react?
Big data breaches found at major email services – expert
Hundreds of millions of hacked user names and passwords for email accounts and other websites are being traded in Russia’s criminal underworld, a security expert told Reuters.
Avast tricks Mobile World Congress attendees into revealing browsing info in Wi-Fi experiment
Being one of the biggest technology conferences in the world, you’d think those attending Mobile World Congress (MWC) would be pretty well-versed in the importance of digital security and keeping their private info out of the hands of tricksters. Not according to Avast, who managed to fool more than 2,000 attendees into exposing their browsing [...]
BlackBerry will fully exit Pakistan over government surveillance demands
BlackBerry has decided not to operate in Pakistan after Dec. 30, rather than let the local government intercept communications on its enterprise services.
‘USB Killer’ is a flash drive designed to fry your laptop
Have you ever heard stories about malicious USB thumb drives frying laptops and thought they were far fetched? An electronics engineer heard them too, and then set out to create a prototype.
US Congress members urged to embrace encrypted apps
Congress members and staff are being urged by a civil rights group to use encrypted smartphone apps such as WhatsApp and Signal rather than traditional cellular networks.
China’s secret gold hoarding strategy
China’s recent stock market gyrations have some analysts now calling China the biggest bubble in history. But those who write off China because of market volatility are missing a more important long-term trend of Chinese geopolitical and monetary ascendancy. That trend shows no signs of abating.
Pakistan to shut down BlackBerry services on “security” grounds
Pakistani authorities are planning to shut down BlackBerry’s secure messaging services in the country towards the end of the year, citing national security reasons.
Security Analysis of Android Factory Resets
With hundreds of millions of devices expected to be traded by 20181 , flaws in smartphone sanitisation functions could be a serious problem. Trade press reports2 have already raised doubts about the effectiveness of Android “Factory Reset”, but this paper presents the first comprehensive study of the issue.
How the U.S. thinks Russians hacked the White House
Russian hackers behind the damaging cyber intrusion of the State Department in recent months used that perch to penetrate sensitive parts of the White House computer system, according to U.S. officials briefed on the investigation.
Треть пользователей Android были взломаны в 2014 г.
Аккаунты 34 % пользователей устройств на ОС Android подверглись взлому в 2014 году. Такую неутешительную статистику приводит «Лаборатория Касперского» и аналитическое агентство B2B International.
Russian researchers expose breakthrough U.S. spying program
The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world’s computers, according to cyber researchers and former operatives.
Bank Hackers Steal Millions via Malware
In late 2013, an A.T.M. in Kiev started dispensing cash at seemingly random times of day. No one had put in a card or touched a button. Cameras showed that the piles of money had been swept up by customers who appeared lucky to be there at the right moment.
NSA secretly hijacked existing malware to spy on N. Korea, others
A new wave of documents from Edward Snowden’s cache of National Security Agency data published by Der Spiegel demonstrates how the agency has used its network exploitation capabilities both to defend military networks from attack and to co-opt other organizations’ hacks for intelligence collection and other purposes. In one case, the NSA secretly tapped into [...]
Surprise! North Korea’s official news site delivers malware, too
A security researcher examining the website of North Korea’s official news service, the Korean Central News Agency, has discovered that the site delivers more than just the latest photo spread of Democratic Peoples’ Republic of Korea leader Kim Jong Un inspecting mushroom farms. There’s a little extra surprise hidden in the site’s code—malware. The news [...]
Apparent Islamic State backers hack U.S. military Twitter feed
The Twitter and YouTube accounts for the U.S. military command that oversees operations in the Middle East were hacked on Monday by people claiming to be sympathetic toward the Islamic State militant group being targeted in American bombing raids.
‘Hacktivist’ group Anonymous says it will avenge Charlie Hebdo attacks by shutting down jihadist websites
Hacker group Anonymous have released a video and a statement via Twitter condemning the attacks on Charlie Hebdo, in which 12 people, including eight journalists, were murdered.
Sony employees resort to BlackBerry phones after hacker comms shutdown
Communications are critical and when Sony was shut down by cyber attacks they ended up finding help in an archived collection of BlackBerry phones.
Kaspersky Security Bulletin 2014. Predictions 2015
In 2015, we expect to see another stage in the evolution of cyber-criminal activity with the adoption of APT tactics and techniques in financially motivated online criminal activity.
Cyber-espionage expected to surge in 2015: McAfee Labs
Cyber-espionage and attacks on connected devices are expected to surge in 2015, according to McAfee Labs’ annual threats predictions report for the coming new year.
New bill aims to curb US government backdoor spying
While the FBI thinks that all communication tools in the US should have backdoors for law enforcement, a new Senate bill has proposed the exact opposite. The Secure Data Act, introduced by Senator Ron Wyden, would prohibit the government from forcing companies like Google and Apple to grant access to encrypted data. A different bill [...]
DeathRing, a new Pre-loaded mobile trojan in the wild
The number of Pre-loaded mobile trojan in the wild is increasing, DeathRing is the last one discovered by the experts at Lookout firm.
The NSA spent years snooping on the world’s wireless carriers
The NSA’s got its long, spindly proboscises slurping up sweet, sweet information from within governments and businesses the world over, so it shouldn’t come as a surprise to hear that wireless carriers are targets, too. That’s the thrust of a lengthy new report from The Intercept: The NSA is capable of snooping in on a [...]
Predicting crimes BEFORE they happen: Berlin police adopt Minority Report-style software that seeks out criminal behaviour
When police officers in Minority Report predicted who would commit crimes, and stopped them before they happened, it was considered so futuristic the film was set in 2054.
German government says “ja” to BlackBerry’s acquisition of Secusmart
The German government has signed off BlackBerry’s acquisition of the German company Secusmart, according to local media (Google Translate).