<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>VR World &#187; Security</title>
	<atom:link href="http://www.vrworld.com/category/sec/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.vrworld.com</link>
	<description></description>
	<lastBuildDate>Thu, 09 Apr 2015 18:40:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1.1</generator>
	<item>
		<title>John Oliver Grills Edward Snowden on &#8216;Last Week Tonight&#8217;</title>
		<link>http://www.vrworld.com/2015/04/06/john-oliver-grills-edward-snowden-on-last-week-tonight/</link>
		<comments>http://www.vrworld.com/2015/04/06/john-oliver-grills-edward-snowden-on-last-week-tonight/#comments</comments>
		<pubDate>Mon, 06 Apr 2015 14:59:59 +0000</pubDate>
		<dc:creator><![CDATA[Sam Reynolds]]></dc:creator>
				<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[Global Politics]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[John Oliver]]></category>
		<category><![CDATA[Last Week Tonight]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[NSA Leaks]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=51605</guid>
		<description><![CDATA[<p>The Oliver-Snowden interview is uncomfortable to watch, and good journalism. </p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/04/06/john-oliver-grills-edward-snowden-on-last-week-tonight/">John Oliver Grills Edward Snowden on &#8216;Last Week Tonight&#8217;</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="630" height="354" src="http://cdn.vrworld.com/wp-content/uploads/2015/04/johnoliver_hbo.jpg" class="attachment-post-thumbnail wp-post-image" alt="johnoliver_hbo" /></p><p>NSA whistleblower <a href="http://www.vrworld.com/tag/edward-snowden/">Edward Snowden</a> is no stranger to the press. He’s appeared in dozens of interviews with major media outlets as well as an Oscar nominated documentary called <a href="http://www.vrworld.com/2015/02/23/edward-snowden-documentary-citizenfour-nabs-oscar-doc/"><i>Citizen Four</i></a><i>.</i></p>
<p>But HBO funnyman <a href="http://www.hbo.com/last-week-tonight-with-john-oliver#/">John Oliver</a> provided what is no doubt the toughest interview yet for Snowden. Granted there was plenty of light banter, such as if the NSA can intercept your “dick picks”, but there were a number of sharp, pointed questions on whether Snowden’s mass disclosure of documents was well-warranted whistleblowing or reckless behavior.</p>
<h2>John Oliver &#8211; Edward Snowden interview</h2>
<p><iframe src="https://www.youtube.com/embed/XEVlyP4_11M" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>
<p><strong><strong> </strong></strong></p>
<p>“How many of those documents have you actually read?” Oliver asked.</p>
<p>“I’ve evaluated all the documents that are in the archive,” Snowden responded.</p>
<p>Pressed he elaborated further: “I do understand what I turned over.”</p>
<p>But for Oliver that wasn’t good enough.</p>
<p>“There’s a difference between <i>understanding</i> what’s in the documents and <i>reading</i> what’s in the documents. Because when you’re handing over thousands of NSA documents the last thing you’d want to do is <i>read </i>them,” Oliver said. “So <i>The New York Times</i> took a slide, didn’t redact it properly, and in the end it was possible for people to see that something was being used in Mosul on al Qaeda.”</p>
<p>“That is a problem,” Snowden replied.</p>
<p>“Well, that’s a <i>fuckup</i>,” said Oliver.</p>
<p>The interview is hard hitting and well worth the watch. Check it out in the video embedded above.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/04/06/john-oliver-grills-edward-snowden-on-last-week-tonight/">John Oliver Grills Edward Snowden on &#8216;Last Week Tonight&#8217;</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2015/04/06/john-oliver-grills-edward-snowden-on-last-week-tonight/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Watch A Canadian Paratrooper Land In A Dense Forest</title>
		<link>http://www.vrworld.com/2015/03/27/watch-a-canadian-paratrooper-land-in-a-dense-forest/</link>
		<comments>http://www.vrworld.com/2015/03/27/watch-a-canadian-paratrooper-land-in-a-dense-forest/#comments</comments>
		<pubDate>Fri, 27 Mar 2015 03:38:41 +0000</pubDate>
		<dc:creator><![CDATA[Vanja Kljaic]]></dc:creator>
				<category><![CDATA[Global Politics]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Airplanes]]></category>
		<category><![CDATA[Canadian Air Force]]></category>
		<category><![CDATA[military]]></category>
		<category><![CDATA[Military Exercises]]></category>
		<category><![CDATA[Paratroopers]]></category>
		<category><![CDATA[Videos]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=50967</guid>
		<description><![CDATA[<p>In the annual Maple Flag exercise, the Canadian air force military airplane dropped a company of paratroopers, where one of them had a pretty scary landing in a dense forest in this video</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/03/27/watch-a-canadian-paratrooper-land-in-a-dense-forest/">Watch A Canadian Paratrooper Land In A Dense Forest</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="2720" height="1812" src="http://cdn.vrworld.com/wp-content/uploads/2015/03/Lockheed_CC-130H_Hercules_8111583732_2.jpg" class="attachment-post-thumbnail wp-post-image" alt="Close approach, YWG." /></p><p style="text-align: justify;">Dropping out of a perfectly good airplane &#8212; that&#8217;s something than only those with a few screws loose can do. While I may be quoting the guys from <em><a href="http://en.wikipedia.org/wiki/Band_of_Brothers_%28miniseries%29">Band of Brothers</a></em> a bit, the fact remains; it&#8217;s hard to mentally justify such a thing and only the brave men and women in the military world are performing such tasks on a weekly basis.</p>
<p style="text-align: justify;">Canada had hosted a military exercise called the <em>Maple Flag</em> a few weeks ago. Established in 1978, Maple Flag is one of the largest of such exercises in the world, as it makes use of the extensive Cold Lake Air Weapons Range (CLAWR) which is co-existent with Canadian Forces Base Cold Lake. Occurring annually, the military exercise takes place during a four-week period, where the Royal Canadian Air Force takes up their mission status readiness type drills, together with different allied nations from around the world.</p>
<p style="text-align: justify;">It is yet unclear who screwed up in this jump. While the region mostly forested, there was a big patch of clear fields visible in the video. But as military parachutes are somewhat difficult to navigate with, its no wonder that, in combination with the prop blast, heavy winds and onset air flow above the landing area, all resulted in this scary situation. Luckily, the <a href="http://en.wikipedia.org/wiki/Paratrooper">paratrooper</a> has utilized his training well. Affording him a safe landing, except revealing to the world that even Canadians can curse in such situations. Check out the complete drop right below.</p>
<p><iframe width="1140" height="641" src="https://www.youtube.com/embed/CAvPEzvrbX8?feature=oembed" frameborder="0" allowfullscreen></iframe></p>
<p><strong>Image:</strong> Canadian Air Force Hercules C-130 Photo By <a href="http://www.flickr.com/people/40563877@N00">BriYYZ</a></p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/03/27/watch-a-canadian-paratrooper-land-in-a-dense-forest/">Watch A Canadian Paratrooper Land In A Dense Forest</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2015/03/27/watch-a-canadian-paratrooper-land-in-a-dense-forest/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>No Browser Was Safe at Pwn2Own 2015</title>
		<link>http://www.vrworld.com/2015/03/23/no-browser-was-safe-at-pwn2own-2015/</link>
		<comments>http://www.vrworld.com/2015/03/23/no-browser-was-safe-at-pwn2own-2015/#comments</comments>
		<pubDate>Mon, 23 Mar 2015 06:10:18 +0000</pubDate>
		<dc:creator><![CDATA[Sam Reynolds]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Apple Safari]]></category>
		<category><![CDATA[Browser Security]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[FF]]></category>
		<category><![CDATA[Google Chrome]]></category>
		<category><![CDATA[IE]]></category>
		<category><![CDATA[Internet Explorer]]></category>
		<category><![CDATA[Mozilla Firefox]]></category>
		<category><![CDATA[NASDAQ: HPQ]]></category>
		<category><![CDATA[Pwn2Own]]></category>
		<category><![CDATA[safari]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=50561</guid>
		<description><![CDATA[<p>Every major browser fell to the exploits delivered at Pwn2Own. </p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/03/23/no-browser-was-safe-at-pwn2own-2015/">No Browser Was Safe at Pwn2Own 2015</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="600" height="400" src="http://cdn.vrworld.com/wp-content/uploads/2015/03/Pwn2Own_1-600x400.jpg" class="attachment-post-thumbnail wp-post-image" alt="Pwn2Own_1-600x400" /></p><p>Every year at the CanSecWest security conference in Vancouver, <a href="http://www.vrworld.com/tag/hewlett-packard/">Hewlett-Packard </a>(<a href="http://www.google.com/finance?cid=17154">NYSE: HPQ</a>) runs the Pwn2Own hacking competition where big cash prizes are delivered for browser exploits.</p>
<p>This year no browser proved to be unhackable. The big winner of the contest was South Korean security researcher JungHoon Lee, who developed exploits for Internet Explorer and Chrome on Windows as well as Safari on OSX. For that, he walked away with $225,000 in cash.</p>
<p>Lee’s attack on Chrome exploits a buffer overflow race condition in Chrome, then uses an info leak and race condition in two Windows kernel drivers to get SYSTEM access according to <a href="http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Pwn2Own-2015-Day-Two-results/ba-p/6722884#.VQ-oUfmUeX2">HP’s Security Research blog</a>. This attack bypasses the anti-exploit mechanisms included in Chrome, such as sandbox and address space layout randomization which has made the browser one of the more secure browsers.</p>
<p>&#8220;With all of this, lokihardt managed to get the single biggest payout of the competition, not to mention the single biggest payout in Pwn2Own history: $75,000 USD for the Chrome bug, an extra $25,000 for the privilege escalation to SYSTEM, and another $10,000 from Google for hitting the beta version for a grand total of $110,000,&#8221; Pwn2Own organizers wrote in a <a href="http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Pwn2Own-2015-Day-Two-results/ba-p/6722884#.VQ-oUfmUeX2">blog post</a>. &#8220;To put it another way, lokihardt earned roughly $916 a second for his two-minute demonstration.&#8221;</p>
<p>Lee also demonstrated a viable Internet Explorer 11 attack. This attack bypassed Internet Explorer’s sandbox through something called a time-of-check to time-of-use (TOCTOU) vulnerability, which allows for elevated execution of Java Script. This earned Lee another $65,000.<br />
<iframe src="https://www.youtube.com/embed/X2Ssw2sLUHI" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>
<p><iframe src="https://www.youtube.com/embed/V99skqmTyiY" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>
<p>Finally, Lee demonstrated an exploit for Safari with a use-after-free (UAF) vulnerability in an uninitialized stack pointer in the browser and bypassed the sandbox for code execution.</p>
<p>Firefox was hacked on the first day of the contest using via a out-of-bounds read/write vulnerability leading to medium-integrity code execution vulnerability.</p>
<p>All of the exploits were disclosed to the vendors after the conference. The vendors will be given time to patch the exploits before the code is released to the public.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/03/23/no-browser-was-safe-at-pwn2own-2015/">No Browser Was Safe at Pwn2Own 2015</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2015/03/23/no-browser-was-safe-at-pwn2own-2015/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Stealth Is Non-Negotiable With the B-2 Bomber</title>
		<link>http://www.vrworld.com/2015/03/21/stealth-is-non-negotiable-with-the-b-2-bomber-it-seems/</link>
		<comments>http://www.vrworld.com/2015/03/21/stealth-is-non-negotiable-with-the-b-2-bomber-it-seems/#comments</comments>
		<pubDate>Sat, 21 Mar 2015 08:41:13 +0000</pubDate>
		<dc:creator><![CDATA[Vanja Kljaic]]></dc:creator>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Global Politics]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Aicraft]]></category>
		<category><![CDATA[Armchair Generals]]></category>
		<category><![CDATA[B-2]]></category>
		<category><![CDATA[Bombers]]></category>
		<category><![CDATA[military]]></category>
		<category><![CDATA[stealth]]></category>
		<category><![CDATA[Technology]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=50366</guid>
		<description><![CDATA[<p>Here is a video showcasing a B-2 Bomber and why the stealth on this platform is non-negotiable in every aspect.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/03/21/stealth-is-non-negotiable-with-the-b-2-bomber-it-seems/">Stealth Is Non-Negotiable With the B-2 Bomber</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1920" height="1202" src="http://cdn.vrworld.com/wp-content/uploads/2015/03/B-2_Spirit_original.jpg" class="attachment-post-thumbnail wp-post-image" alt="B-2_Spirit_original" /></p><p>Whether you like it or not, the B-2 bomber is probably the only stealth bomber that will stay that way for a long, long time.</p>
<p>Even though we&#8217;re seeing plenty of stealth technology being implemented, the sheer scale and size of the B-2 is overwhelming. It has the capacity to carry close to 40,000 lbs of ordnance. This includes the B61 and B83 nuclear bombs; the AGM-129 ACM cruise missile was also intended for use on the B-2 platform. Some people may argue that newer Russian bomber designs will have similar capabilities, I wouldn&#8217;t agree. Not for the fact that Russian bombers wont be able to provide the same (or greater) amount of stealth or carry the similar ordnance packages, the deployment of stand-off weapons like cruise missiles is what Russian air-force is putting a big emphasis on these days.</p>
<p><a href="http://cdn.vrworld.com/wp-content/uploads/2015/03/1280px-B-2_first_flight_071201-F-9999J-034.jpg" rel="lightbox-0"><img class="aligncenter size-medium wp-image-50383" src="http://cdn.vrworld.com/wp-content/uploads/2015/03/1280px-B-2_first_flight_071201-F-9999J-034-600x484.jpg" alt="1280px-B-2_first_flight_071201-F-9999J-034" width="600" height="484" /></a></p>
<p>The B-2 is capable of all-altitude attack missions up to 50,000 feet (15,000 m), with a range of more than 6,000 nautical miles (11,000 km) on internal fuel and over 10,000 nautical miles (19,000 km) with one midair refueling. The last part is the main theme of this video, ensuring the public stays rather profoundly interested in these air-planes, somebody at U.S. DoD released a rather interesting showcase of the bomber&#8217;s capabilities.</p>
<p>As stealth is the main aspect of this airplanes, the retractable fuel cover that seemingly vanishes into pin-point precision alignment with the rest of the bomber&#8217;s exterior skin is simply staggering. It seems like the bomber is alive and the part once open to receive a bunch of fuel &#8211; simply joins with its exterior shell almost without a single line being seen. To see how this thing works, please take a look at the video shown below.</p>
<p><iframe width="1140" height="641" src="https://www.youtube.com/embed/77G8NZv4kY8?feature=oembed" frameborder="0" allowfullscreen></iframe></p>
<p><strong>Images:</strong> First B-2 Image by U.S. Air Force photo/Staff Sgt. Bennie J. Davis III, second B-2 image by USAF</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/03/21/stealth-is-non-negotiable-with-the-b-2-bomber-it-seems/">Stealth Is Non-Negotiable With the B-2 Bomber</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2015/03/21/stealth-is-non-negotiable-with-the-b-2-bomber-it-seems/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How the FREAK SSL Flaw Could Have Been Prevented</title>
		<link>http://www.vrworld.com/2015/03/09/how-the-freak-ssl-flaw-could-have-been-prevented/</link>
		<comments>http://www.vrworld.com/2015/03/09/how-the-freak-ssl-flaw-could-have-been-prevented/#comments</comments>
		<pubDate>Mon, 09 Mar 2015 03:14:35 +0000</pubDate>
		<dc:creator><![CDATA[Brandon Shutt]]></dc:creator>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Operating Systems]]></category>
		<category><![CDATA[Opinion]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[FREAK]]></category>
		<category><![CDATA[FREAK FLAW]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[TLS]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=49407</guid>
		<description><![CDATA[<p>Last week the world was panicking when the FREAK SSL flaw was discovered. Here's how to stop another one from occurring. </p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/03/09/how-the-freak-ssl-flaw-could-have-been-prevented/">How the FREAK SSL Flaw Could Have Been Prevented</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1024" height="768" src="http://cdn.vrworld.com/wp-content/uploads/2015/03/Drama.jpg" class="attachment-post-thumbnail wp-post-image" alt="Drama" /></p><p>Since cryptographers from the IMDEA, IRIA and Microsoft Research found a serious vulnerability in the SSL/TLS security standards that are used to keep passwords and other sensitive information safe in modern browsers, security researchers have been scrambling to uncover the range of everything that has been affected as a result.</p>
<p>Since then, it has been discovered that Microsoft&#8217;s (<a href="www.google.com/finance?cid=358464">NASDAQ: MSFT</a>) server software was vulnerable, along with a host of sensitive websites, including those of Facebook (<a href="www.google.com/finance?cid=296878244325128">NASDAQ: FB</a>), American Express (<a href="www.google.com/finance?cid=1033">NYSE: AXP</a>), the NSA, the White House, and others. Additionally, many and most popular web browsers were vulnerable to the exploit: the extent was, on the whole, very impressive.</p>
<p>Parties using vulnerable computers could quickly find themselves on the receiving end of man-in-the-middle attacks, that could be used to steal payment information, passwords, and other extremely sensitive data. Webmasters fared even worse, as the vulnerability could be used to inject malicious code onto server and web buttons.</p>
<p>Companies were quick to roll out patches and fixes for the attack, but this whole mess could have been mitigated, and definitely should not have happened in the first place.</p>
<h2>Who is responsible for the FREAK SSL exploit?</h2>
<p>Who is to blame for a flaw in the most commonly used security protocol in the world, that managed to affect more than one-third of websites offering SSL?</p>
<p>According to cryptographer at John Hopkins university Matthew Green, the flaw was built into SSL from the very start. &#8220;The SSL protocol itself was deliberately designed to be broken,&#8221; <a href="http://blog.cryptographyengineering.com/2015/03/attack-of-week-freak-or-factoring-nsa.html">Green wrote on his blog</a>.</p>
<p>Back in the 1990s, when (it is fair to say) computers were significantly slower than they are today, and the World Wide Web was still in its infancy, cryptography was not very strong by modern standards. After Netscape revealed it&#8217;s new SSL technology, <a href="http://en.wikipedia.org/wiki/Export_of_cryptography_from_the_United_States">the U.S government was quick to regulate the standard</a>. U.S versions of the browser came with 1024 bit public keys, but these keys could not be exported to other countries. The International edition was significantly weaker, with 512 bit public keys.</p>
<p>Since the government made this rule in the interests of being able to break into other nations&#8217; SSL, the standard was quite literally designed to be broken.</p>
<p>Since the 1990s, of course, computers have moved on, and so have politics. The U.S has relaxed its laws about international encryption, and in 2013, a broad push was made to introduce 2048-bit SSL encryption, which is now the standard across the Internet.</p>
<p>So why, fifteen years later, are we being haunted by SSL&#8217;s poor security?</p>
<p>Because of the varying degrees of encryption offered by servers and browsers, &#8216;cipher suites&#8217; were used to negotiate the strongest available encryption standards between a client and a host. While this is barely used nowadays, the option still exists in the clockwork behind operating systems and browsers. The essence of the FREAK attack is, therefore, very simple: interrupt a vulnerable client, and downgrade its encryption from standard RSA to &#8216;export RSA&#8217;.</p>
<p>The resultant encryption is so weak by today&#8217;s standards that it can be cracked in a manner of hours using Amazon Web Services.</p>
<p>FREAK never needed to be an issue, and it&#8217;s the classic result of companies failing to keep up with rapidly deprecating technology standards.</p>
<h2>Fixing the FREAK SSL vunerability</h2>
<p>Here are three ways to prevent another FREAK attack from occurring:</p>
<ol>
<li>The government should not try to regulate Internet security standards. The government should be involved in security, and it should certainly regulate the security of its own systems: but laws should not be in place that will hamper the development of security technologies in the private sector. Criminals will continue innovating, and computers will only get faster. The government cannot shut down the Internet, or control its rate of progress, and it shouldn&#8217;t try. When it does, bad things happen.</li>
<li>Software and web developers &#8211; especially larger ones, like Microsoft and Facebook &#8211; must actively curate its software for deprecated standards, and disable it. It can be a pain, and a hassle to keep changing systems when old ones are in place that worked in the past. But a little pain in the present could prevent massive disasters down the road.</li>
<li>Consumers must be willing to let go of old, familiar technologies and upgrade to ones that are newer and safer on a consistent basis. Individuals &#8211; and especially companies &#8211; who insist on keeping software solutions that are deprecated in terms of decades must dedicate the time and money to keep up with the changing environment of threats and dangers by upgrading. At the very least, if they must keep the old solutions, they must seek ways to actively improve and safeguard them from potential exploits (similar to what the active Windows XP community is doing now).</li>
</ol>
<p>This isn&#8217;t a novelty, and it isn&#8217;t rocket science. This is common sense, and it&#8217;s what people should be doing in the first place.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/03/09/how-the-freak-ssl-flaw-could-have-been-prevented/">How the FREAK SSL Flaw Could Have Been Prevented</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2015/03/09/how-the-freak-ssl-flaw-could-have-been-prevented/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Updated: Xiaomi Hits Back Hard at Bluebox Labs’ Claims</title>
		<link>http://www.vrworld.com/2015/03/09/xiaomi-hits-back-hard-bluebox-labs-claims/</link>
		<comments>http://www.vrworld.com/2015/03/09/xiaomi-hits-back-hard-bluebox-labs-claims/#comments</comments>
		<pubDate>Sun, 08 Mar 2015 23:40:38 +0000</pubDate>
		<dc:creator><![CDATA[Sam Reynolds]]></dc:creator>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Asia Pacific (APAC)]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Global Politics]]></category>
		<category><![CDATA[Mobile Computing]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Operating Systems]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Bluebox Labs]]></category>
		<category><![CDATA[Hugo Barra]]></category>
		<category><![CDATA[Xiaomi]]></category>
		<category><![CDATA[Xiaomi security]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=49380</guid>
		<description><![CDATA[<p>Xiaomi representatives strongly rebut Bluebox Labs’ claims, and say the device tested was tampered with</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/03/09/xiaomi-hits-back-hard-bluebox-labs-claims/">Updated: Xiaomi Hits Back Hard at Bluebox Labs’ Claims</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="770" height="511" src="http://cdn.vrworld.com/wp-content/uploads/2014/09/xiaomimipad09.jpg" class="attachment-post-thumbnail wp-post-image" alt="xiaomimipad09" /></p><p>Recently security consultancy Bluebox Labs <a href="http://www.vrworld.com/2015/03/06/bluebox-labs-xiaomi-phones-major-security-risk/">reported on some major security flaws </a>found in the latest Xiaomi Mi 4 phone. Xiaomi didn’t take this criticism lying down, and has prepared a lengthy <a href="https://bluebox.com/blog/technical/popular-xiaomi-phone-could-put-data-at-risk/">rebuttal </a>to Bluebox’s claims.</p>
<p>While Xiaomi had already called the report “inaccurate” in a statement to <i>VR World</i>, Hugo Barra, Xiaomi’s VP International responded to Bluebox Labs by saying the phone purchased by the company in China had been tampered with. It’s important to note that Bluebox had already tested the device to make sure that it was authentic and not a knockoff.</p>
<p>“We are certain the device that Bluebox tested is not using a standard MIUI ROM, as our factory ROM and OTA ROM builds are never rooted and we don’t pre-install services such as YT Service, PhoneGuardService, AppStats etc,” Barra said in his statement. “Bluebox could have purchased a phone that has been tampered with, as they bought it via a physical retailer in China. Xiaomi does not sell phones via third-party retailers in China, only via our official online channels and selected carrier stores.”</p>
<p>If Barra’s claim holds true, this brings up the very worrying issue of supply chain security, as Bluebox points out. If these &#8212; authentic &#8212; phones are modified by the retailer, or someone else in the supply chain, that’s incredibly concerning for device security and brand reputation.</p>
<p>Barra says that customers should only purchase Xiaomi phones from the official online store to ensure authenticity and “reputable retailers”. But what makes a “reputable retailer”? If the one Bluebox purchased its phone from &#8212; and it went to great lengths to ensure authenticity &#8212; isn’t reputable than which ones are? After all, China is home to fake <a href="http://www.ithome.com/html/it/122503.htm">Xiaomi stores </a>(and fake Apple as well as Samsung stores too).</p>
<p>If indeed what Barra says is true, this is largely a lesson in supply chain security. All vendors need to ensure that the China side of their supply chain isn’t compromised by a man-in-the-middle attack. Because clearly even local companies aren’t immune.</p>
<p>&nbsp;</p>
<p><strong>UPDATE: March 9 2015 11:00 AM China Standard Time</strong></p>
<p>Xiaomi emailed <em>VR World</em> further statements to expand upon what it told Bluebox Labs. Here&#8217;s the statement in full.</p>
<blockquote>
<div class="">There are glaring inaccuracies in the Bluebox blog post. Official Xiaomi devices do not come rooted and do not have malware pre-installed. Our investigation based on information received so far indicates that the phone Bluebox obtained is a counterfeit product purchased through an unofficial channel on the streets in China. We&#8217;re gathering more information to fully confirm this and should have a final answer in the next 24 hours.<br class="" /><br class="" />With the large parallel street market for mobile phones in China, not only is it somewhat common for third parties to tamper with the software sold on smartphones, but there are counterfeit products which are almost indistinguishable from the original products on the outside. This happens across all brands, affecting both Chinese and foreign smartphone companies selling in China. <br class="" /><br class="" />Furthermore, &#8220;entrepreneurial” retailers may add malware and adware to these devices, and even go to the extent of pre-installing modified copies of popular benchmarking software such as CPU-Z and Antutu, which will run &#8220;tests&#8221; showing the hardware is legitimate — fooling even very discerning buyers.<br class="" /><br class="" />Xiaomi takes all necessary measures to crack down on the manufacturers of fake devices or anyone who tampers with our software, supported by all levels of law enforcement agencies in China. However, for the safety of our users, Xiaomi and all smartphone brands always recommend buying phones through authorised channels. Xiaomi only sells via <a class="" title="Click to open in a new window or tab&lt;br /&gt;<br />
http://Mi.com" href="http://Mi.com">Mi.com</a>, and a small number of Xiaomi trusted partners including mobile operators and select authorised retailers, such as Flipkart in India. <br class="" /><br class="" />In addition, contrary to what Bluebox has claimed, MIUI is true Android, which means MIUI follows exactly Android CDD, Google&#8217;s definition for compatible Android devices, and it passes all Android CTS tests, the process used by the industry to make sure a given device is fully Android compatible. All Xiaomi devices sold in China and international markets are fully Android compatible.</div>
</blockquote>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/03/09/xiaomi-hits-back-hard-bluebox-labs-claims/">Updated: Xiaomi Hits Back Hard at Bluebox Labs’ Claims</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2015/03/09/xiaomi-hits-back-hard-bluebox-labs-claims/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Bluebox Labs: Xiaomi Phones a Major Security Risk</title>
		<link>http://www.vrworld.com/2015/03/06/bluebox-labs-xiaomi-phones-major-security-risk/</link>
		<comments>http://www.vrworld.com/2015/03/06/bluebox-labs-xiaomi-phones-major-security-risk/#comments</comments>
		<pubDate>Fri, 06 Mar 2015 06:58:29 +0000</pubDate>
		<dc:creator><![CDATA[Sam Reynolds]]></dc:creator>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Mobile Computing]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Operating Systems]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Bluebox]]></category>
		<category><![CDATA[Bluebox Labs]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[security flaws]]></category>
		<category><![CDATA[Xiaomi]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=49208</guid>
		<description><![CDATA[<p>Xiaomi devices ship with a number of security flaws due to the use of a forked version of Android. </p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/03/06/bluebox-labs-xiaomi-phones-major-security-risk/">Bluebox Labs: Xiaomi Phones a Major Security Risk</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="3182" height="2273" src="http://cdn.vrworld.com/wp-content/uploads/2014/10/Xiaomi-logo.jpg" class="attachment-post-thumbnail wp-post-image" alt="Xiaomi logo" /></p><p>Xiaomi devices have taken Asia by storm, providing fierce competition to established players such as Samsung (<a href="http://www.google.com/finance?cid=151610035517112">KRX: 005930</a>). Recently Xiaomi has been under the microscope for security issues, as it has <a href="http://www.vrworld.com/2014/09/24/xiaomi-fire-taiwan-security-issues/">been alleged</a> that these devices serve as a conduit that allows Chinese intelligence services to siphon user&#8217;s data. However a <a href="https://bluebox.com/technical/popular-xiaomi-phone-could-put-data-at-risk/">new report</a> by security consultancy Bluebox Labs shows that the real threat might come from sloppy coding.</p>
<p>The device tested by Bluebox researchers was the Xiaomi Mi 4. Like many smartphones from Chinese vendors, it ships with a forked (non official) version of Android branded as MIUI. Forked versions of Android do not undergo the same security vetting procedures from Google (<a href="http://www.google.com/finance?cid=694653">NASDAQ: GOOGL</a>) as official versions do.</p>
<p>Being a forked version of Android means that Google services are not available on the device. For example, the phone ships with a Google Play alternative called Mi Market. However the researchers found that this version of Android appeared to be a combination of 4.4.4 and older versions. Doing a deep dive into the OS the researchers found some conflicts at the API level. The devices contains a mixture of API keys from Android 4.4 and Android 4.2 that are both test-keys (not for public use) and release-keys. As test-keys are not finalized they ship with more security bugs than their final counterparts. However the combination of both test and release keys could be incredibly problematic as bugs will no doubt arise just by combining the two.</p>
<p><a href="http://cdn.vrworld.com/wp-content/uploads/2015/03/xiaomi-mi-4-6.jpg" rel="lightbox-0"><img class="aligncenter size-medium wp-image-49209" src="http://cdn.vrworld.com/wp-content/uploads/2015/03/xiaomi-mi-4-6-600x338.jpg" alt="xiaomi-mi-4-6" width="600" height="338" /></a></p>
<p>Bluebox researchers did on the device was a scan for suspicious apps &#8212; malware, spyware or adware. They found three apps considered to be risky. The most problematic of which was an app called Yt Service as it disguises its developer package to make it look like it came from Google &#8212; which is not the case. Next up were apps called PhoneGuardService which was identified as a Trojan and AppStats which is classified as riskware.</p>
<p>Bluebox gives the device a low trustable score of 2.6. By virtue of the fact that it runs a forked version of Android, Xiaomi devices ship with security flaws that have been long ago patched by Google.</p>
<p>For its part Xiaomi has not responded to Bluebox’s attempts for responsible disclosure &#8212; approaching the vendor first before going public.</p>
<p>Bluebox told <i>VR World</i> that it did not accept outside funding for this study.</p>
<p><strong>Update 4:50 China Standard Time:</strong></p>
<p>Xiaomi sent in this response:</p>
<blockquote><p>&#8220;We are investigating this matter now. There are glaring inaccuracies in the Bluebox blog post, as official Xiaomi devices do not come rooted and do not have any malware pre-installed. It is likely that the Mi 4 that Bluebox obtained has been tampered with.&#8221;</p></blockquote>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/03/06/bluebox-labs-xiaomi-phones-major-security-risk/">Bluebox Labs: Xiaomi Phones a Major Security Risk</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2015/03/06/bluebox-labs-xiaomi-phones-major-security-risk/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Lenovo Faces Lawsuits Over Superfish</title>
		<link>http://www.vrworld.com/2015/02/25/lenovo-faces-lawsuits-superfish/</link>
		<comments>http://www.vrworld.com/2015/02/25/lenovo-faces-lawsuits-superfish/#comments</comments>
		<pubDate>Wed, 25 Feb 2015 06:40:23 +0000</pubDate>
		<dc:creator><![CDATA[Sam Reynolds]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Lenovo]]></category>
		<category><![CDATA[Superfish]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=47855</guid>
		<description><![CDATA[<p>Suit alleges installing Superfish was a “fraudulent” business practice. </p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/02/25/lenovo-faces-lawsuits-superfish/">Lenovo Faces Lawsuits Over Superfish</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1200" height="675" src="http://cdn.vrworld.com/wp-content/uploads/2015/01/Lenovo-building.jpeg" class="attachment-post-thumbnail wp-post-image" alt="Lenovo-building" /></p><p>The Superfish that swam into many user’s PCs is proving to be a nightmare for Lenovo (<a href="http://www.google.com/finance?cid=674788">HKG:0992</a>).</p>
<p>The PC giant is facing two lawsuits over the Superfish adware (or malware depending on your definition) that it <a href="http://www.vrworld.com/2015/02/19/lenovo-shipped-pcs-adware/">included </a>with some computers it shipped earlier this year.</p>
<p>The first, a <a href="http://www.businesswire.com/news/home/20150220005737/en/CONSUMER-COMPUTER-SECURITY-ALERT-Rosen-Law-Firm#.VO1pjPmUeX3">class-action suit</a>, alleges that Superfish negatively impacted the performance of plaintiff’s computers through injecting ads into browsers. The lawsuit says that affected individuals should receive compensation of $10,000 each.</p>
<p>The second suit is an <a href="https://www.documentcloud.org/documents/1674514-gov-uscourts-casd-467335-1-0.html">individual suit</a> by blogger Jessica Bennett, that seeks the option to also be pursued as a class action suit and seeks a jury trial.</p>
<p>Bennet alleges in her suit:</p>
<blockquote><p>Defendants&#8217; Spyware and popup advertisements decrease productivity by requiring that hours be spent figuring out how to get them off of a computer, closing advertising windows, and waiting for a slower machine to operate. Furthermore, computer users are forced to keep their computers running longer (due to the slowed performance) which utilizes more electricity, decreases the useful life of a computer, and causes increased Internet access charges. The cumulative impact of not only multiple ads, but also the threat of future ads and monitoring, impedes computer usage.</p></blockquote>
<p>For its part Lenovo has apologized and has offered users a tool to remove Superfish altogether.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/02/25/lenovo-faces-lawsuits-superfish/">Lenovo Faces Lawsuits Over Superfish</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2015/02/25/lenovo-faces-lawsuits-superfish/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Qihoo’s 360 Security Also Claims 100 Million Record</title>
		<link>http://www.vrworld.com/2015/02/20/qihoos-360-security-also-claims-100-million-record/</link>
		<comments>http://www.vrworld.com/2015/02/20/qihoos-360-security-also-claims-100-million-record/#comments</comments>
		<pubDate>Fri, 20 Feb 2015 02:22:02 +0000</pubDate>
		<dc:creator><![CDATA[Sam Reynolds]]></dc:creator>
				<category><![CDATA[Asia Pacific (APAC)]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Global Politics]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[360 Security]]></category>
		<category><![CDATA[Cheetah Mobile]]></category>
		<category><![CDATA[Qihoo]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=47641</guid>
		<description><![CDATA[<p>Cheetah Mobile has some competition in the race to 100 million. </p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/02/20/qihoos-360-security-also-claims-100-million-record/">Qihoo’s 360 Security Also Claims 100 Million Record</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="600" height="376" src="http://cdn.vrworld.com/wp-content/uploads/2015/02/qihoo-360.jpg" class="attachment-post-thumbnail wp-post-image" alt="qihoo-360" /></p><p>Earlier this month Cheetah Mobile &#8212; a China-based mobile app company with a sizable presence in Taipei &#8212; <a href="http://www.vrworld.com/2015/02/10/cheetah-mobile-hits-100-million-downloads-cm-security-suite/">announced</a> that its CM Security suite hit the 100 million download mark in a year and a day, beating many well-known apps such as Line and Instagram. Not to be outdone by its rival, Qihoo announced Friday that its 360 Security App had also hit the 100 million milestone &#8212; but all from international users.</p>
<p>“We’re thrilled that 100 million users internationally are embracing 360 Security and supporting our mission to secure mobile live worldwide,” said Huang Yan, Head of Product at 360 Security Group, in a press release. “It’s clear that our rejuvenated focus on delivering critical features that quickly and easily keep 360 Security users’ Android smartphones in top shape is satisfying the market’s growing demand for optimization and security apps.”</p>
<p>According to data from <a href="http://www.appannie.com/">App Annie</a>, a mobile app analytics firm, 360 Security is the most downloaded Google Play app in five countries, and the top 10 most downloaded app in 34 countries globally.</p>
<p>However, 360 Security did not say how long it took for its app to reach the 100 million mark. It could be that Cheetah Mobile’s CM Security still has the record for growth.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/02/20/qihoos-360-security-also-claims-100-million-record/">Qihoo’s 360 Security Also Claims 100 Million Record</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2015/02/20/qihoos-360-security-also-claims-100-million-record/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Lenovo Shipped PCs with Adware</title>
		<link>http://www.vrworld.com/2015/02/19/lenovo-shipped-pcs-adware/</link>
		<comments>http://www.vrworld.com/2015/02/19/lenovo-shipped-pcs-adware/#comments</comments>
		<pubDate>Thu, 19 Feb 2015 10:52:11 +0000</pubDate>
		<dc:creator><![CDATA[Sam Reynolds]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Adware]]></category>
		<category><![CDATA[Lenovo]]></category>
		<category><![CDATA[Superfish]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=47586</guid>
		<description><![CDATA[<p>Superfish is more of a badfish with the security threat it poses. </p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/02/19/lenovo-shipped-pcs-adware/">Lenovo Shipped PCs with Adware</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1200" height="675" src="http://cdn.vrworld.com/wp-content/uploads/2015/01/Lenovo-building.jpeg" class="attachment-post-thumbnail wp-post-image" alt="Lenovo-building" /></p><p>Recently buy a PC from Lenovo (<a href="http://www.google.com/finance?cid=674788">HKG: 0992</a>)? It might have shipped with a nasty piece of adware &#8212; which borderlines on malware &#8212; called Superfish.</p>
<p>Superfish is piece of manufacturer bloatware that dubs itself as a “visual search engine”.</p>
<p>However many users have complained that it has been injecting ads into a user&#8217;s web browser.</p>
<p>According to company representatives, it instantly analyses images on the web and presents identical and similar product offers that may have lower prices, helping users search for images without knowing exactly what an item is.</p>
<p>While most software like this is passed over and ignored by customers, this nasty piece of code does more: its ad injection is done via user’s web browser via a man-in-the-middle root certificate, effectively hijacking the pathway between the browser and the server. This poses a potential security risk if Superfish is somehow compromised, the SSL connection between a user’s browser and a secure website, like a bank, would be vulnerable to eavesdropping by a third party.</p>
<blockquote class="twitter-tweet" lang="en"><p>This is a problem. <a href="https://twitter.com/hashtag/superfish?src=hash">#superfish</a> <a href="http://t.co/jKDfSo99ZR">pic.twitter.com/jKDfSo99ZR</a></p>
<p>— Kenn White (@kennwhite) <a href="https://twitter.com/kennwhite/status/568270748638318593">February 19, 2015</a></p></blockquote>
<p>Superfish has been categorized by nearly a <a href="https://www.virustotal.com/en/file/dc937aec71daf6ebcb5876c3e9ba26846d6c4678cb95c60fc9dde6ff81b5323a/analysis/">dozen </a>antivirus providers as adaware, a trojan, or an otherwise potentially harmful and unwanted program.</p>
<p>A Lenovo representative said on a customer support forum that the software will be removed from future Lenovo machines, and work is underway to create a patch to remove the ad injection.</p>
<p><strong>Update: Lenovo sent in this statement:</strong></p>
<blockquote><p>Superfish has completely disabled server side interactions (since January) on all Lenovo products so that the product is no longer active.  This disables Superfish for all products in market.</p>
<p>2)      Lenovo stopped preloading the software in January.</p>
<p>3)      We will not preload this software in the future.</p>
<p>&nbsp;</p>
<p>We have thoroughly investigated this technology and do not find any evidence to substantiate security concerns.  But we know that users reacted to this issue with concern, and so we have taken direct action to stop shipping any products with this software.  We will continue to review what we do and how we do it in order to ensure we put our user needs, experience and priorities first.</p>
<p>&nbsp;</p>
<p>To be clear, Superfish technology is purely based on contextual/image and not behavioral. It does not profile nor monitor user behavior.  It does not record user information. It does not know who the user is. Users are not tracked nor re-targeted.   Every session is independent. Users are given a choice whether or not to use the product.  The relationship with Superfish is not financially significant; our goal was to enhance the experience for users.  We recognize that the software did not meet that goal and have acted quickly and decisively.</p>
<p>&nbsp;</p>
<p>We are providing support on our forums for any user with concerns.  Our goal is to find technologies that best serve users.  In this case, we have responded quickly to negative feedback, and taken decisive actions to ensure that we address these concerns.  If users still wish to take further action, detail information is available at <a href="http://forums.lenovo.com">http://forums.lenovo.com</a>.</p></blockquote>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/02/19/lenovo-shipped-pcs-adware/">Lenovo Shipped PCs with Adware</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2015/02/19/lenovo-shipped-pcs-adware/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Kaspersky Lab Researchers Discover Malware That Lurks in HDD Firmware</title>
		<link>http://www.vrworld.com/2015/02/17/kaspersky-lab-researchers-discover-malware-lurks-hdd-firmware/</link>
		<comments>http://www.vrworld.com/2015/02/17/kaspersky-lab-researchers-discover-malware-lurks-hdd-firmware/#comments</comments>
		<pubDate>Tue, 17 Feb 2015 07:27:37 +0000</pubDate>
		<dc:creator><![CDATA[Sam Reynolds]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[equation group]]></category>
		<category><![CDATA[Kaspersky Lab]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[virus]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=47421</guid>
		<description><![CDATA[<p>Malware is traced back to the likely NSA-affiliated ‘Equation Group’.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/02/17/kaspersky-lab-researchers-discover-malware-lurks-hdd-firmware/">Kaspersky Lab Researchers Discover Malware That Lurks in HDD Firmware</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1302" height="625" src="http://cdn.vrworld.com/wp-content/uploads/2015/02/hd-classes.jpg" class="attachment-post-thumbnail wp-post-image" alt="hd-classes" /></p><p>Nearly a decade before Stuxnet and Flame were household words, malware that has some genetic similarities was infecting computers in targeted regions across the globe stealthily burrowing itself into hard disks and flash drives.</p>
<p>That was the topic of a <a href="https://securelist.com/files/2015/02/Equation_group_questions_and_answers.pdf">report</a> presented by Kaspersky Lab researchers at the group’s annual summit in Cancun, Mexico. Kaspersky Lab said that the malware is some of the most advanced it has ever seen, and has traced back its origins to as early as 2001. Resarchers from Kaspersky Lab have given the organization behind the malware platform the same “the Equation Group” (likely because of its preference for mathematically complex attacks) and the actual software names like EquationLaser, EquationDrug, DoubleFantasy, TripleFantasy, Fanny and GrayFish.</p>
<p>&#8220;The Equation group is probably one of the most sophisticated cyber attack groups in the world; and they are the most advanced threat actor we have seen,&#8221; Kaspersky Lab said in its report.</p>
<p>Out of the toolset discovered by Kaspersky Lab researchers, two items stand out for their complexity: Fanny and GrayFish.</p>
<p>According to researchers the purpose of Fanny is to map out air gapped networks, and allow for malicious commands sent from a master server to run on these networks.</p>
<p><a href="http://cdn.vrworld.com/wp-content/uploads/2015/02/Fanny-640x7841.png" rel="lightbox-0"><img class="aligncenter size-medium wp-image-47423" src="http://cdn.vrworld.com/wp-content/uploads/2015/02/Fanny-640x7841-490x600.png" alt="Fanny-640x7841" width="490" height="600" /></a></p>
<p>The bridge between the air gapped network and the internet is a USB stick with crippled firmware and a hidden storage volume. The name Fanny comes from a file, Fanny.bmp that has been found in all infected USB drives. The report says that the majority of these USB drives were found in the Middle East. Around the world the infected USB drives were found in 30 different countries.</p>
<p><a href="http://cdn.vrworld.com/wp-content/uploads/2015/02/Equation_1.jpg" rel="lightbox-1"><img class="aligncenter size-medium wp-image-47422" src="http://cdn.vrworld.com/wp-content/uploads/2015/02/Equation_1-600x199.jpg" alt="Equation_1" width="600" height="199" /></a></p>
<p>The other highlight of the malware discovered is GrayFish. GrayFish is able to burrow itself in the firmware of HDDs and SSDs. Deep rewrites and formatting of the drive do nothing to remove the malware and it’s stuck in the firmware of the drive itself. The only way to destroy GrayFish is to destroy the drive itself. Kaspersky said that the malware has been discovered in the firmware of 12 major manufactures of HDDs and SSDs.</p>
<p>Kaspersky Labs doesn’t directly suggest that the malware suite is the product of efforts by the NSA, but say that it’s definitely the outcome of efforts by a highly advanced electronic intelligence organization.</p>
<p>In 2012 <a href="http://www.wired.com/2012/07/ff_kaspersky/all/"><i>Wired</i></a> magazine published an interesting feature, outlining the relationship between the founder of Kaspersky Labs and Russian intelligence services. It’s worth a read considering the group’s report.</p>
<p><strong></p>
<p></strong></p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/02/17/kaspersky-lab-researchers-discover-malware-lurks-hdd-firmware/">Kaspersky Lab Researchers Discover Malware That Lurks in HDD Firmware</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2015/02/17/kaspersky-lab-researchers-discover-malware-lurks-hdd-firmware/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>IT: It’s the Place to be for Job Hunting</title>
		<link>http://www.vrworld.com/2015/02/11/place-job-hunting/</link>
		<comments>http://www.vrworld.com/2015/02/11/place-job-hunting/#comments</comments>
		<pubDate>Wed, 11 Feb 2015 02:45:10 +0000</pubDate>
		<dc:creator><![CDATA[Darleen Hartley]]></dc:creator>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Mobile Computing]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Anthem Blue Cross]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[CompTIA]]></category>
		<category><![CDATA[employee benefits]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[IT industry]]></category>
		<category><![CDATA[job hunting]]></category>
		<category><![CDATA[mobile]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=46970</guid>
		<description><![CDATA[<p>As unemployment waivers, people with IT skills are sought after.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/02/11/place-job-hunting/">IT: It’s the Place to be for Job Hunting</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="980" height="533" src="http://cdn.vrworld.com/wp-content/uploads/2015/02/Chart_IT-Unemployment-980.jpg" class="attachment-post-thumbnail wp-post-image" alt="Chart_IT Unemployment 980" /></p><p>Job seekers, Rejoice. While unemployment tries to recover from stagnation, the IT industry has a bright outlook. <a href="http://www.comptia.org/resources/it-industry-outlook-2015">CompTIA</a>, a professional IT certification company, predicts a worldwide expansion in the industry of around five percent with only Canada and the UK lagging behind.</p>
<p>Companies are understaffed already in the technology department and 70 percent of managers report they expect to have a shortage of IT professionals to draw from to fill the gaps. The CompTIA report pegs unemployment in the IT industry lower than that of other fields nationally. In 2012, the Bureau of Labor Statistics averaged the unemployment rate for technology professionals at 4.4, about half the national average at that time. The image breaks that down by position. The picture hasn’t changed much.</p>
<p>A shifting environment due to acquisitions and mergers adds to the complexity of staffing. Not surprisingly, top on the list for growth are areas that make headlines: cloud computing, mobile, and as indicated by events such as <a href="http://www.wsj.com/articles/investigators-eye-china-in-anthem-hack-1423167560">Anthem Blue Cross’s hack attack</a>, security. Established entities with familiar names have cash flow to entice employees with salaries and uncommon benefits that go beyond such traditional subsidies as health insurance.</p>
<p>If you plan to go job hunting, you might want to arm yourself with some hardware and software skills. That’s what companies continue to search for when interviewing applicants.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/02/11/place-job-hunting/">IT: It’s the Place to be for Job Hunting</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2015/02/11/place-job-hunting/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cheetah Mobile Hits 100 Million Downloads With CM Security Suite</title>
		<link>http://www.vrworld.com/2015/02/10/cheetah-mobile-hits-100-million-downloads-cm-security-suite/</link>
		<comments>http://www.vrworld.com/2015/02/10/cheetah-mobile-hits-100-million-downloads-cm-security-suite/#comments</comments>
		<pubDate>Tue, 10 Feb 2015 15:00:08 +0000</pubDate>
		<dc:creator><![CDATA[Sam Reynolds]]></dc:creator>
				<category><![CDATA[Asia Pacific (APAC)]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Global Politics]]></category>
		<category><![CDATA[Mobile Computing]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[CM Security Suite]]></category>
		<category><![CDATA[Taiwan]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=46960</guid>
		<description><![CDATA[<p>Cross Strait mobile app team beats Line and Instagram to the 100 million mark with the CM Security Suite, but can it continue growing?</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/02/10/cheetah-mobile-hits-100-million-downloads-cm-security-suite/">Cheetah Mobile Hits 100 Million Downloads With CM Security Suite</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1600" height="1067" src="http://cdn.vrworld.com/wp-content/uploads/2015/02/Cheetah-Mobile-Executives-Taiwan.jpg" class="attachment-post-thumbnail wp-post-image" alt="Cheetah Mobile Executives -Taiwan" /></p><p>Cheetah Mobile’s (<a href="http://www.google.com/finance?cid=60490336657357">NYSE: CMCM</a>) suite of mobile utility apps &#8212; anchored by the CM Security Suite &#8212; is not a household name for many outside of China but it should be considering the popularity of its app suite. China’s Cheetah Mobile had an impressive period of growth during the last year, opening an office in Taipei and launching the CM Security Suite &#8212; which has beaten better known apps to the 100 million mark in record time.</p>
<p>While Line &#8212; a popular instant messaging app in Japan, Taiwan and Southeast Asia &#8212; took a year-and-a-half to hit the 100 million mark, and Instagram took just over a year, Cheetah Mobile’s CM Suite his that critical mark in only 357 days and maintains a rating of 4.7 on Google Play. The growth in user data backs this up: according to Fu the company’s user base has grown by 900% since 2013. As of Q3 2014, the company has 340 million active users with 70% from outside China (and a big presence in the US and EU). On Google Play, the CM Security Suite is holding steady at number 3, behind Facebook. Revenue, says Fu, has grown by 140% per year, three years in a row.</p>
<p>At a press event in Taipei, Cheetah Mobile CEO Sheng Fu credited the success of CM Suite to the company’s policy of being hyper-reactive to the needs of customers. He pointed to the frequent updates his company pushes out for CM Security &#8212; three per-week &#8212; as proof.</p>
<p>While Cheetah Mobile has had success with impressive growth in its user base and revenue, like many Internet companies with a mobile focus sustaining profitability continues to be a concern. Its Q3 2014 earnings <a href="http://seekingalpha.com/article/2668635-cheetah-mobile-q3-2014-review-that-doesnt-impress-me-much?page=1">came in flat</a>, and analysts were bearish about continued growth prospects in light of increased competition from the likes of Baidu (<a href="http://www.google.com/finance?cid=700029">NASDAQ: BIDU</a>) and Qihoo (<a href="http://www.google.com/finance?cid=15984519">NYSE: QIHU</a>). That being said, the stock has been on something of a rally throughout February.</p>
<p>Cheetah Mobile and its CM Security Suite is an impressive achievement in the up and coming market for mobile security apps, as well as cross-strait cooperation in software development. Getting to 100 million downloads so quickly is a testament to the quality of its products. However, China’s internet industry is not immune to the bubbles that have frequently popped in the US meaning that Cheetah Mobile will have to work hard to sustain such impressive growth in the future.</p>
<p><em>Photo caption: Executives from Cheetah Mobile&#8217;s Beijing and Taipei offices at a press event in Taipei&#8217;s Beitou suburb. </em></p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/02/10/cheetah-mobile-hits-100-million-downloads-cm-security-suite/">Cheetah Mobile Hits 100 Million Downloads With CM Security Suite</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2015/02/10/cheetah-mobile-hits-100-million-downloads-cm-security-suite/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Uber Android App Watches Your Every Move</title>
		<link>http://www.vrworld.com/2014/12/01/uber-android-app-watches-every-move/</link>
		<comments>http://www.vrworld.com/2014/12/01/uber-android-app-watches-every-move/#comments</comments>
		<pubDate>Tue, 02 Dec 2014 04:42:30 +0000</pubDate>
		<dc:creator><![CDATA[Sam Reynolds]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[privacy concerns]]></category>
		<category><![CDATA[Uber]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=42318</guid>
		<description><![CDATA[<p> Security researcher picks apart Uber’s app and finds it resembles something out of 1984.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/12/01/uber-android-app-watches-every-move/">Uber Android App Watches Your Every Move</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="640" height="427" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/uberlogo_large_verge_medium_landscape.png" class="attachment-post-thumbnail wp-post-image" alt="uberlogo_large_verge_medium_landscape" /></p><p>Uber has not had a great month for publicity, with all sorts of accusations being directed at the company for its business model and behaviour. Now, the company faces another PR challenge as a security researcher has found that the company’s Android app hoovers up all sorts of data on its users.</p>
<p>According to security researcher Joe Giron, Uber’s app sends back a litany of data from the user’s phone &#8212; most of it unrelated to the apps functionality. Below is a list of the data that Uber sends back from the user’s phone:</p>
<blockquote><p>– <b>Accounts log</b></p>
<p>– <b>App Activity</b></p>
<p>– <b>App Data Usage</b></p>
<p>– <b>App Install</b></p>
<p>– <b>Battery</b></p>
<p>– <b>Device</b></p>
<p>– <b>GPS</b></p>
<p>– <b>NetData</b></p>
<p>– <b>PhoneCall</b></p>
<p>– <b>SMS</b></p>
<p>– <b>TelephonyInfo</b></p>
<p>– <b>WifiConnection</b></p>
<p>– <b>WifiNeighbors</b></p>
<p>– <b>Root Check</b></p>
<p>– <b>Malware Info</b></p></blockquote>
<p>For Uber, having this data is advantageous, but its collection &#8212; especially without clearly informing the user &#8212; is unethical. Uber’s business model requires the company to have strong analytics data to plot its next moves, but this appears to be coming at the expense of user’s privacy.</p>
<p>Uber, for its part, has shifted blame to Google when confronted by the press on the issue.</p>
<p>“Access to permissions including Wi-Fi networks and camera are included so that users can experience full functionality of the Uber app. This is not unique to Uber, and downloading the Uber app is of course optional,” the company said in a public statement.</p>
<p>Technology blog <i>Re/Code</i> notes that Uber competitor Lyft also has an extensive permissions set.</p>
<p>But unless Uber, or Lyft, comes out with a satisfactory explanation of why it needs all this data users will be rightfully skeptical of the company’s intentions<strong>.</strong></p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/12/01/uber-android-app-watches-every-move/">Uber Android App Watches Your Every Move</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/12/01/uber-android-app-watches-every-move/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>One Fifth of Japanese Have Lost a Smartphone, According to Survey</title>
		<link>http://www.vrworld.com/2014/11/26/one-fifth-japanese-lost-smartphone-according-survey/</link>
		<comments>http://www.vrworld.com/2014/11/26/one-fifth-japanese-lost-smartphone-according-survey/#comments</comments>
		<pubDate>Wed, 26 Nov 2014 04:00:59 +0000</pubDate>
		<dc:creator><![CDATA[Christian Crisostomo]]></dc:creator>
				<category><![CDATA[Japan]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Lookout]]></category>
		<category><![CDATA[lost phone]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[smartphone]]></category>
		<category><![CDATA[survey]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=40721</guid>
		<description><![CDATA[<p>A small sample research done by Lookout Inc. Japan reveals that at least one out of five people in Japan have experienced losing their smartphones.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/26/one-fifth-japanese-lost-smartphone-according-survey/">One Fifth of Japanese Have Lost a Smartphone, According to Survey</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="650" height="337" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/lookoutjapanlostphone.jpg" class="attachment-post-thumbnail wp-post-image" alt="lookoutjapanlostphone" /></p><p>A <a href="http://androwire.jp/articles/2014/11/18/04/index.html">research survey recently published</a> by the Japanese branch of San Francisco-based security firm Lookout Inc. indicates that Japanese users may actually lose their smartphones quite frequently. The survey revealed that at least one in every five smartphone users had experienced losing their smartphone at one time.</p>
<p>This conclusion made by the survey was based from the data collected from a small sample of about 1,000 users throughout the country. The approximate 23% within the group representing this figure reported having experienced losing at least one smartphone at some point. A considerable majority of the people within the group are users who live in busy cities, and are considerably young, averaging only to about 18 to 24 years of age.</p>
<p>As for where exactly do they lose their smartphones, the most common place was on public transportation mediums, especially on trains and subways, or on facilities and establishments that are near these vehicles. Second on the list was on commercial establishments, such as on shopping malls or market districts. Prefecture-wise, the region with the most users having lost their smartphones was on Okinawa Prefecture (44%).</p>
<p>The issue of lost mobile phones today holds more digital security risks than before, mainly because sensitive and private data are now being frequently and regularly used on smartphones. When questioned about data recovery, the general consensus of the entire sample was that they are willing to pay even 50,000 yen ($424.00), just so in order to recover and secure the lost data.</p>
<p>The data obtained from the survey will be used by Lookout Inc. to provide the appropriate security solutions and applications for future lost smartphones.</p>
<p>Weirdly enough, at least 11% from the entire sample have also reported losing their smartphones, however this group reported recovering their lost phones after a specific period of time.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/26/one-fifth-japanese-lost-smartphone-according-survey/">One Fifth of Japanese Have Lost a Smartphone, According to Survey</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/11/26/one-fifth-japanese-lost-smartphone-according-survey/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Regin: Stuxnet&#039;s Best Spying Malware Cousin</title>
		<link>http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin/</link>
		<comments>http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin/#comments</comments>
		<pubDate>Tue, 25 Nov 2014 00:21:36 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Backdoor.Regin]]></category>
		<category><![CDATA[Espionage]]></category>
		<category><![CDATA[GSM]]></category>
		<category><![CDATA[ISP]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[McAfee]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[Regin]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Spy]]></category>
		<category><![CDATA[Symantec]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=42133</guid>
		<description><![CDATA[<p>Regin is a new type of sophisticated malware that deeply embeds itself within a country, company or organization for the purpose of espionage.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin/">Regin: Stuxnet&#039;s Best Spying Malware Cousin</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1280" height="800" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Regin-graph-two.png" class="attachment-post-thumbnail wp-post-image" alt="Regin Graph Kaspersky" /></p><ol>
<li class="mod">
<div class="_oDd _YXc" data-hveid="31">
<div class="_Tgc"><b>Regin</b>. /ˈreɪɡɪn/ 1. (Norse myth) a dwarf smith, tutor of Sigurd, whom he encouraged to kill Fafnir for the gold he guarded.</div>
</div>
</li>
</ol>
<p>Regin is essentially a murderous dwarf who is caught/killed by his own greed. This Norse mythology is at the core a description of the Regin virus that has injected itself across the globe and today has finally been brought to light by Symantec and Kaspersky researchers. The Regin cybvervirus is a virus that has been tracked over the course of the past few years by security firms like Symantec, Kaspersky and McAfee, but they simply did not have enough data to build the whole picture of the computer virus&#8217; scope nor its target. As a result, this research has been going on for quite some time and today multiple security companies have published their findings on the Regin malware and what it seeks to accomplish once it has infected a system.</p>
<p><img class="aligncenter size-full wp-image-42138" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Sectors.png" alt="Sectors" width="380" height="327" /></p>
<p>According to <a href="http://www.symantec.com/connect/blogs/regin-top-tier-espionage-tool-enables-stealthy-surveillance" target="_blank">Symantec&#8217;s research</a>, Regin is being used as a covert espionage tool to go after very specific targets and infect them at a very deep level to either gain access to information or to gain access to a user of that network&#8217;s information. They say that Regin is a very complicated and highly encrypted piece of malware that hides its final form from anyone looking to find it unless they have access to all five stages of the malware&#8217;s unpacking. They detail the process <a href="http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/regin-analysis.pdf" target="_blank">in their technical whitepaper</a> but it is essentially a multi-stage virus that hides its ultimate target and execution unless users can obtain every form/stage of the virus&#8217; unpacking until it becomes the final payload.</p>
<p><a href="http://cdn.vrworld.com/wp-content/uploads/2014/11/Regin-graph-three.png" rel="lightbox-0"><img class="aligncenter size-full wp-image-42136" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Regin-graph-three.png" alt="Regin-graph-three" width="1671" height="858" /></a></p>
<p>This multi-stage approach is similar to what was seen from Duqu and Stuxnet and is once again very likely to be a sovereign-built piece of malware from some government. And as you can see, the targets that it goes after are very broad and appear to be focused mostly developing countries with Russia, Belgium and Germany being the exceptions. Those countries according to Kaspersky are:</p>
<p>Algeria<br />
Afghanistan<br />
Belgium<br />
Brazil<br />
Fiji<br />
Germany<br />
Iran<br />
India<br />
Indonesia<br />
Kiribati<br />
Malaysia<br />
Pakistan<br />
Russia<br />
Syria</p>
<p>However, if you use Symantec&#8217;s data, the list of countries actually expands to include Saudi Arabia, Austria, Ireland and Mexico.</p>
<div id="attachment_42134" style="width: 454px" class="wp-caption aligncenter"><a href="http://cdn.vrworld.com/wp-content/uploads/2014/11/Countries.png" rel="lightbox-1"><img class="size-full wp-image-42134" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Countries.png" alt="Regin Countries" width="444" height="366" /></a><p class="wp-caption-text">Regin Countries</p></div>
<p>Additionally, <a href="http://securelist.com/blog/research/67741/regin-nation-state-ownage-of-gsm-networks/" target="_blank">Kaspersky discovered</a> a strong attack on GSM networks, especially in the case of Belgium where an entire operator was infiltrated by this malware and had publicly announced that they had been attacked, but were not aware of the perpetrator nor the target. What&#8217;s interesting, however, is that both Kaspersky and Symantec had discovered that this malware&#8217;s structure and payload delivery system (the mutli-stage approach) were specifically designed to obscure the malware&#8217;s existence and once it had infected a system it was designed to be inconspicuous as it continued to linger on the infected system, making detection incredibly difficult.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin/">Regin: Stuxnet&#039;s Best Spying Malware Cousin</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Regin: Stuxnet&#039;s Best Spying Malware Cousin</title>
		<link>http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin-2/</link>
		<comments>http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin-2/#comments</comments>
		<pubDate>Tue, 25 Nov 2014 00:21:36 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Backdoor.Regin]]></category>
		<category><![CDATA[Espionage]]></category>
		<category><![CDATA[GSM]]></category>
		<category><![CDATA[ISP]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[McAfee]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[Regin]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Spy]]></category>
		<category><![CDATA[Symantec]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=42133</guid>
		<description><![CDATA[<p>Regin is a new type of sophisticated malware that deeply embeds itself within a country, company or organization for the purpose of espionage.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin-2/">Regin: Stuxnet&#039;s Best Spying Malware Cousin</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1280" height="800" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Regin-graph-two.png" class="attachment-post-thumbnail wp-post-image" alt="Regin Graph Kaspersky" /></p><ol>
<li class="mod">
<div class="_oDd _YXc" data-hveid="31">
<div class="_Tgc"><b>Regin</b>. /ˈreɪɡɪn/ 1. (Norse myth) a dwarf smith, tutor of Sigurd, whom he encouraged to kill Fafnir for the gold he guarded.</div>
</div>
</li>
</ol>
<p>Regin is essentially a murderous dwarf who is caught/killed by his own greed. This Norse mythology is at the core a description of the Regin virus that has injected itself across the globe and today has finally been brought to light by Symantec and Kaspersky researchers. The Regin cybvervirus is a virus that has been tracked over the course of the past few years by security firms like Symantec, Kaspersky and McAfee, but they simply did not have enough data to build the whole picture of the computer virus&#8217; scope nor its target. As a result, this research has been going on for quite some time and today multiple security companies have published their findings on the Regin malware and what it seeks to accomplish once it has infected a system.</p>
<p><img class="aligncenter size-full wp-image-42138" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Sectors.png" alt="Sectors" width="380" height="327" /></p>
<p>According to <a href="http://www.symantec.com/connect/blogs/regin-top-tier-espionage-tool-enables-stealthy-surveillance" target="_blank">Symantec&#8217;s research</a>, Regin is being used as a covert espionage tool to go after very specific targets and infect them at a very deep level to either gain access to information or to gain access to a user of that network&#8217;s information. They say that Regin is a very complicated and highly encrypted piece of malware that hides its final form from anyone looking to find it unless they have access to all five stages of the malware&#8217;s unpacking. They detail the process <a href="http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/regin-analysis.pdf" target="_blank">in their technical whitepaper</a> but it is essentially a multi-stage virus that hides its ultimate target and execution unless users can obtain every form/stage of the virus&#8217; unpacking until it becomes the final payload.</p>
<p><a href="http://cdn.vrworld.com/wp-content/uploads/2014/11/Regin-graph-three.png" rel="lightbox-0"><img class="aligncenter size-full wp-image-42136" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Regin-graph-three.png" alt="Regin-graph-three" width="1671" height="858" /></a></p>
<p>This multi-stage approach is similar to what was seen from Duqu and Stuxnet and is once again very likely to be a sovereign-built piece of malware from some government. And as you can see, the targets that it goes after are very broad and appear to be focused mostly developing countries with Russia, Belgium and Germany being the exceptions. Those countries according to Kaspersky are:</p>
<p>Algeria<br />
Afghanistan<br />
Belgium<br />
Brazil<br />
Fiji<br />
Germany<br />
Iran<br />
India<br />
Indonesia<br />
Kiribati<br />
Malaysia<br />
Pakistan<br />
Russia<br />
Syria</p>
<p>However, if you use Symantec&#8217;s data, the list of countries actually expands to include Saudi Arabia, Austria, Ireland and Mexico.</p>
<div id="attachment_42134" style="width: 454px" class="wp-caption aligncenter"><a href="http://cdn.vrworld.com/wp-content/uploads/2014/11/Countries.png" rel="lightbox-1"><img class="size-full wp-image-42134" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Countries.png" alt="Regin Countries" width="444" height="366" /></a><p class="wp-caption-text">Regin Countries</p></div>
<p>Additionally, <a href="http://securelist.com/blog/research/67741/regin-nation-state-ownage-of-gsm-networks/" target="_blank">Kaspersky discovered</a> a strong attack on GSM networks, especially in the case of Belgium where an entire operator was infiltrated by this malware and had publicly announced that they had been attacked, but were not aware of the perpetrator nor the target. What&#8217;s interesting, however, is that both Kaspersky and Symantec had discovered that this malware&#8217;s structure and payload delivery system (the mutli-stage approach) were specifically designed to obscure the malware&#8217;s existence and once it had infected a system it was designed to be inconspicuous as it continued to linger on the infected system, making detection incredibly difficult.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin-2/">Regin: Stuxnet&#039;s Best Spying Malware Cousin</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Jolla Announces Open Source Jolla Tablet with Intel Inside</title>
		<link>http://www.vrworld.com/2014/11/19/jolla-announces-open-source-jolla-tablet-with-intel-inside/</link>
		<comments>http://www.vrworld.com/2014/11/19/jolla-announces-open-source-jolla-tablet-with-intel-inside/#comments</comments>
		<pubDate>Wed, 19 Nov 2014 19:27:59 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Mobile Computing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Crowdfunded]]></category>
		<category><![CDATA[Crowdfunding]]></category>
		<category><![CDATA[Jolla]]></category>
		<category><![CDATA[Jolla Tablet]]></category>
		<category><![CDATA[Open Source]]></category>
		<category><![CDATA[Sailfish OS]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=41920</guid>
		<description><![CDATA[<p>Jolla has announced their own crowdfunded open source tablet based on their open source Sailfish OS 2 operating system powered by Intel mobile processors.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/19/jolla-announces-open-source-jolla-tablet-with-intel-inside/">Jolla Announces Open Source Jolla Tablet with Intel Inside</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="980" height="600" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Jolla-Tablet.jpg" class="attachment-post-thumbnail wp-post-image" alt="Jolla Tablet" /></p><p>Today, Jolla, the open source operating system and phone, announced it is now going to have its own tablet as well.</p>
<p><a href="http://jolla.com/tablet" target="_blank">The Jolla Tablet</a> is the company&#8217;s first tablet, featuring a 7.85&#8243; screen and an Intel quad Core mobile SoC. This tablet is going to sell for under $200, which may make it one of the best deals in the tablet world next year. While the Jolla tablet runs the open source Sailfish OS, it also has some awesome aspects to it that make it more consumer friendly, like the fact that it has 32 GB of storage as well as an SD card slot. Something that the iPad, Nexus 9 and <a title="Nokia Returns with Nokia N1 Tablet by Foxconn" href="http://www.brightsideofnews.com/2014/11/18/nokia-returns-nokia-n1-tablet-foxconn/" target="_blank">the newly announced Nokia N1</a> don&#8217;t have.</p>
<p>But there are some compromises here, it has a slower 1.8 GHz Intel chip, 2GB of RAM and a 4300 mAh battery, which is only 30% more than the current crop of smartphones. The Nexus 9 and iPad Mini 3 both have more than 50% more battery capacity than the Jolla Tablet, so I would suspect that battery life will not be this tablet&#8217;s strong suit, unfortunately. It also only has 802.11 a/b/g/n Wi-Fi and no MIMO, which means that battery life will likely be even worse due to weaker Wi-Fi signal. Battery life should be a major concern for this device and isn&#8217;t even mentioned once anywhere in Jolla&#8217;s documentation. It also sports a measly 5mp main camera and a 2mp front-facing camera. Once again, not a huge fan of tablet photography, but this is probably a way that Jolla is able to get the Jolla Tablet&#8217;s cost so far below its competitors while still having that &#8216;camera&#8217; tick box functionality.</p>
<div id="attachment_41922" style="width: 629px" class="wp-caption aligncenter"><a href="http://cdn.vrworld.com/wp-content/uploads/2014/11/JollaSpecs.jpg" rel="lightbox-0"><img class="size-full wp-image-41922" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/JollaSpecs.jpg" alt="Jolla Tablet Specs" width="619" height="782" /></a><p class="wp-caption-text">Jolla Tablet Specs</p></div>
<p>What is awesome about this tablet, however, is that it is <a href="https://www.indiegogo.com/projects/jolla-tablet-world-s-first-crowdsourced-tablet" target="_blank">completely crowdfunded on Indiegogo</a> and they have only opened up the campaign today and are already over 200% of their goal and are very likely to run out of tablets to sell within the day. So, this tablet is both open source and crowdfunded and not like <a title="Ubuntu Edge – An Ubuntu Based Phone on Indiegogo" href="http://www.brightsideofnews.com/2013/07/22/ubuntu-edge-a-dual-os-high-end-superphone-on-indiegogo/" target="_blank">the project from Canonical</a> where they wanted the public to completely fund the profitability of Canonical through a crowdsourcing campaign.</p>
<p>It also appears as though Intel&#8217;s success in the mobile space in 2015 looks to be much better than it was in 2014, even if they are only partnering with emerging brands. If Intel properly ties themselves to upcoming and upstarting projects and products, they may actually find a way into the market and test their capabilities with biggest customers later on. The expected delivery date is May 2015. After that, they will very likely start putting the tablet up for sale for around $200 (they said $189).</p>
<p>There&#8217;s almost a certain chance they will sell out, the question will be whether it will be today or not, which is currently looking very likely. Below, you can watch Jolla&#8217;s promotional video about the Jolla Tablet.</p>
<p><iframe src="//www.youtube.com/embed/jBQdfcLhts8" width="1280" height="720" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/19/jolla-announces-open-source-jolla-tablet-with-intel-inside/">Jolla Announces Open Source Jolla Tablet with Intel Inside</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/11/19/jolla-announces-open-source-jolla-tablet-with-intel-inside/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Ted Cruz Falsely Likens Net Neutrality to Obamacare</title>
		<link>http://www.vrworld.com/2014/11/10/ted-cruz-falsely-likens-net-neutrality-obamacare/</link>
		<comments>http://www.vrworld.com/2014/11/10/ted-cruz-falsely-likens-net-neutrality-obamacare/#comments</comments>
		<pubDate>Tue, 11 Nov 2014 01:31:27 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Opinion]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[AT&T]]></category>
		<category><![CDATA[cable]]></category>
		<category><![CDATA[comcast]]></category>
		<category><![CDATA[fcc]]></category>
		<category><![CDATA[ISP]]></category>
		<category><![CDATA[Lobbyist]]></category>
		<category><![CDATA[Net Neutrality]]></category>
		<category><![CDATA[Obama]]></category>
		<category><![CDATA[Ted Cruz]]></category>
		<category><![CDATA[time warner cable]]></category>
		<category><![CDATA[Tom Wheeler]]></category>
		<category><![CDATA[Verizon]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=41429</guid>
		<description><![CDATA[<p>In a new political move by the Senator, Ted Cruz has likened Net Neutrality to Obamacare after the President announced his support for a Title II status.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/10/ted-cruz-falsely-likens-net-neutrality-obamacare/">Ted Cruz Falsely Likens Net Neutrality to Obamacare</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="980" height="600" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Ted-Cruz-Net-Neutrality.jpg" class="attachment-post-thumbnail wp-post-image" alt="Ted Cruz Net Neutrality" /></p><p>In a very politically inflammatory statement today, Senator Ted Cruz likened Net Neutrality to Obamacare, which does more harm than good to the internet&#8217;s future as the hotly contested issue of Net Neutrality ping pongs around the IT industry and Capitol Hill.</p>
<p>Obviously, Cruz made his statement as a response to <a href="http://www.whitehouse.gov/net-neutrality" target="_blank">Obama&#8217;s instruction to the FCC</a> (including Chairman Tom Wheeler) that they need to preserve Net Neutrality by giving the FCC the regulatory powers to oversee the internet by classifying it as a Title II communications service, which would liken it to land line phone service.</p>
<p>The problem with such an analogy is that it likens a multi-faceted piece of legislation that Republicans oppose to a reclassification of a type of telecommunications so that it can be properly regulated (which it technically isn&#8217;t right now). The idea was not to regulate the internet in order to allow it to self-regulate, but that does not appear to have worked and now people are calling for a reclassification as a <a href="http://en.wikipedia.org/wiki/Common_carrier" target="_blank">Title II common carrier service</a>. This would require companies to treat all traffic equally and not to be able to pick and choose, which they&#8217;re technically already doing. Some may liken Obamacare to this reclassification because Obama now supports it or because it involves government regulation, but the truth is that the FCC has already been regulating internet service for quite some time, but hasn&#8217;t had the authority to enforce a truly equal internet.</p>
<blockquote class="twitter-tweet" lang="en"><p>&#8220;Net Neutrality&#8221; is Obamacare for the Internet; the Internet should not operate at the speed of government.</p>
<p>— Senator Ted Cruz (@SenTedCruz) <a href="https://twitter.com/SenTedCruz/status/531834493922189313">November 10, 2014</a></p></blockquote>
<p><script src="//platform.twitter.com/widgets.js" async="" charset="utf-8"></script></p>
<p>&nbsp;</p>
<p>Following his statement, some well known internet personalities including the creator of The Oatmeal online comic, Matthew Inman, <a href="http://theoatmeal.com/blog/net_neutrality" target="_blank">who broke down</a> Net Neutrality to the junior Senator in a comical, yet informed, way.</p>
<p>The real issue with Cruz&#8217;s tweet is that it very likely comes from a place where lobbyists are encouraging him to shoot down Net Neutrality, after all, he does take money from large telecom companies for his campaign donations. Additionally, Cruz has been emboldened by the recent election to stand up to Obama even more than he already has and to make Obamacare a central issue around next year&#8217;s Congress and to repeal it. Cruz may have gotten the attention of many by likening a conversion of internet service into a Title II telecommunications form, but by likening it to Obamacare, he has immediately turned a bi-partisan issue of Net Neutrality into a partisan issue and will encourage people to be against Net Neutrality even though it is in their best interest.</p>
<p>Even <a href="https://www.eff.org/deeplinks/2014/06/fcc-and-net-neutrality-way-forward" target="_blank">the EFF is behind the reclassification plan</a> that Obama now states that he also backs, because in the past Obama has remained silent on the topic and there&#8217;s actually a good chance that with a Republican House and Senate Obama may actually find some common ground with them on Net Neutrality. The problem is that the state of the internet is so horrible with all of the oligopolies that it is virtually impossible to allow the internet to exist in an unregulated manner, there is not enough competition among internet service providers, so there is no way that consumers can simply be the driving force behind innovation and Net Neutrality. We&#8217;ve covered this topic many times over the course of the past year, and some of the <a title="FCC Broadband Report Finds US ISPs Failing to Deliver on Many Levels" href="http://www.brightsideofnews.com/2014/06/19/fcc-broadband-report-finds-us-isps-failing-to-deliver-on-many-levels/" target="_blank">most recent talks by Tom Wheeler</a> about the lack of competition are possibly the most enlightening. Because of government intervention, these companies have been allowed to become too big and effectively have local monopolies or duopolies with very few to no places having three options for wired broadband.</p>
<p>Optimally, the best thing would be to have multiple internet service providers in each area, including a possible municipal broadband option, which would then compete with each other for consumers&#8217; business and improve in order to compete with those customers. After all, that&#8217;s sort of how it used to be until AT&amp;T bought up all of the land line companies and Comcast started gobbling up cable providers (<a title="Comcast Rumored to Buy Time Warner Cable for $44 Billion?" href="http://www.brightsideofnews.com/2014/02/12/comcast-rumored-to-buy-time-warner-cable-for-2444-billion/" target="_blank">and now wants to absorb TWC</a>).</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/10/ted-cruz-falsely-likens-net-neutrality-obamacare/">Ted Cruz Falsely Likens Net Neutrality to Obamacare</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/11/10/ted-cruz-falsely-likens-net-neutrality-obamacare/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>USPS Hacked, 800,000 Employees&#039; Info Accessed</title>
		<link>http://www.vrworld.com/2014/11/10/usps-hacked-800000-employees-info-accessed/</link>
		<comments>http://www.vrworld.com/2014/11/10/usps-hacked-800000-employees-info-accessed/#comments</comments>
		<pubDate>Mon, 10 Nov 2014 21:31:36 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Breaking]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Rumors]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[APWU]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Employee]]></category>
		<category><![CDATA[Hacked]]></category>
		<category><![CDATA[New York Times]]></category>
		<category><![CDATA[Social Security]]></category>
		<category><![CDATA[USPS]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=41417</guid>
		<description><![CDATA[<p>The USPS has stated that around 800,000 employees of the USPS have had their personal information, including social security numbers compromised by hackers</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/10/usps-hacked-800000-employees-info-accessed/">USPS Hacked, 800,000 Employees&#039; Info Accessed</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="980" height="600" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/USPS-980.jpg" class="attachment-post-thumbnail wp-post-image" alt="USPS 980" /></p><p>According <a href="http://about.usps.com/news/fact-sheets/scenario/media-statement-final.pdf" target="_blank">to the agency</a>, over 800,000 employees of the USPS have had their personal data stolen from the postal service&#8217;s servers. When you consider that the USPS <a href="https://about.usps.com/who-we-are/postal-history/employees-since-1926.pdf" target="_blank">employs just under 500,000 people (below 800,000 in the 90&#8217;s)</a> then you realize that the data stolen includes both current and former employees of the USPS. The data breach mostly affects employees of the USPS rather than customers who may have done business with them. They do state that the USPS&#8217; customers that have done business with them between the months of July and August may have had their contact information lost, but no credit card or payment data was obtained by the hackers.</p>
<p>The USPS has a <a href="http://about.usps.com/news/fact-sheets/scenario/customerFAQs_Final.pdf" target="_blank">long and detailed FAQ</a> that answers consumers questions about the data breach and whether or not their data has been compromised. The interesting thing about this breach is that it isn&#8217;t a typical breach where hackers are going after customer data or going after credit card data or passwords. The hackers in this specifically went after the employee data of the USPS and were able to gain access to what appears to be all of it. The USPS isn&#8217;t clearly saying what employee data had been stolen, but the USPS <a href="http://about.usps.com/news/fact-sheets/scenario/media-statement-final.pdf" target="_blank">official release</a> states that it the data stolen includes, &#8220;The employee information potentially compromised in the incident included some employee personally identifiable information (PII), such as names, dates of birth, Social Security numbers, addresses and other information including beginning and end dates of employment, and emergency contact information.&#8221;</p>
<p>The other huge problem with this breach is that the USPS did not communicate this breach, which occurred in mid-September until now, almost two whole months later. This would mean that the employees that got hacked have had their information out and about without their knowledge for the past two months which means anyone could have caused financial ruin for the employees of the USPS. The fact is that the <a href="http://www.apwu.org/" target="_blank">American Postal Workers Union</a> should be absolutely up in arms about this and should sue the USPS for breaching their duty to protect and properly notify their employees of such risks in a timely fashion. We&#8217;ve already gotten quite angry with retailers taking a month to tell us that our credit card numbers have been stolen, yet even more personal potentially ruining data was kept from USPS employees for nearly 2 months.</p>
<p>There are currently no official suspects or leads in the case, but some publications are indicating that the attack may have come from Chinese hackers.</p>
<p>There is one more interesting tidbit in this USPS story, and that&#8217;s the fact that the USPS has taken this event as an opportunity to take a dig at the New York Times for their piece about the USPS and their involvement in tracking Americans&#8217; mail. Here is the question and answer, verbatim.</p>
<p><strong>Q</strong>: I’m concerned about a New York Times article that mentioned “surveillance” of mail. Is this connected with the cyber-intrusion incident and what is meant by “mail covers”?</p>
<p><strong>A</strong>: The New York Times article is unrelated to the cyber breach. The New York Times article titled ‘Report Reveals Wider Tracking of Mail in U.S.’ published on Tuesday, October 28, 2014 is extremely disappointing. The article is inaccurate and unfairly presents a one-sided version of the facts. First and foremost, the United State Postal Service respects the privacy of its customers and the sanctity of the mail. Contrary to what is suggested in the article, the Postal Service does not monitor the mail behavior of its customers and it does not maintain any system or program of so-called “surveillance.” Unfortunately, and perhaps to create a news story where there is none, the New York Times article conflates three independent mail programs in order to create the wholly false impression that there is some vast mail monitoring system in operation. While such an assertion may make for a more interesting news article – it is not based on the facts. Mail covers are used for criminal investigations. The increased use of mail covers in 2013 and 2014 is connected to single packages investigated involving illegal drug shipments. Eighty percent of all mail covers in 2014 were related to these important investigations. All other mail covers have actually decreased by more than 30 percent since 2012. It is unfortunate that the New York Times presented such a distorted view of the facts. Its readership would have benefited from a more even-handed approach. The Postal Service processed and delivered 158 billion pieces of mail last year, of which only a tiny percentage was subjected to the mail cover process. The people who need to be concerned about mail covers are those who use the U.S. Mail to ship illegal drugs or who are otherwise breaking the law.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/10/usps-hacked-800000-employees-info-accessed/">USPS Hacked, 800,000 Employees&#039; Info Accessed</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/11/10/usps-hacked-800000-employees-info-accessed/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Content Delivery Network via Amazon Web Services: CloudFront: cdn.vrworld.com

 Served from: www.vrworld.com @ 2015-04-10 04:12:55 by W3 Total Cache -->