<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>VR World &#187; security</title>
	<atom:link href="http://www.vrworld.com/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.vrworld.com</link>
	<description></description>
	<lastBuildDate>Fri, 10 Apr 2015 04:26:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1.1</generator>
	<item>
		<title>Bluebox Labs: Xiaomi Phones a Major Security Risk</title>
		<link>http://www.vrworld.com/2015/03/06/bluebox-labs-xiaomi-phones-major-security-risk/</link>
		<comments>http://www.vrworld.com/2015/03/06/bluebox-labs-xiaomi-phones-major-security-risk/#comments</comments>
		<pubDate>Fri, 06 Mar 2015 06:58:29 +0000</pubDate>
		<dc:creator><![CDATA[Sam Reynolds]]></dc:creator>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Mobile Computing]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Operating Systems]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Bluebox]]></category>
		<category><![CDATA[Bluebox Labs]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[security flaws]]></category>
		<category><![CDATA[Xiaomi]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=49208</guid>
		<description><![CDATA[<p>Xiaomi devices ship with a number of security flaws due to the use of a forked version of Android. </p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/03/06/bluebox-labs-xiaomi-phones-major-security-risk/">Bluebox Labs: Xiaomi Phones a Major Security Risk</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="3182" height="2273" src="http://cdn.vrworld.com/wp-content/uploads/2014/10/Xiaomi-logo.jpg" class="attachment-post-thumbnail wp-post-image" alt="Xiaomi logo" /></p><p>Xiaomi devices have taken Asia by storm, providing fierce competition to established players such as Samsung (<a href="http://www.google.com/finance?cid=151610035517112">KRX: 005930</a>). Recently Xiaomi has been under the microscope for security issues, as it has <a href="http://www.vrworld.com/2014/09/24/xiaomi-fire-taiwan-security-issues/">been alleged</a> that these devices serve as a conduit that allows Chinese intelligence services to siphon user&#8217;s data. However a <a href="https://bluebox.com/technical/popular-xiaomi-phone-could-put-data-at-risk/">new report</a> by security consultancy Bluebox Labs shows that the real threat might come from sloppy coding.</p>
<p>The device tested by Bluebox researchers was the Xiaomi Mi 4. Like many smartphones from Chinese vendors, it ships with a forked (non official) version of Android branded as MIUI. Forked versions of Android do not undergo the same security vetting procedures from Google (<a href="http://www.google.com/finance?cid=694653">NASDAQ: GOOGL</a>) as official versions do.</p>
<p>Being a forked version of Android means that Google services are not available on the device. For example, the phone ships with a Google Play alternative called Mi Market. However the researchers found that this version of Android appeared to be a combination of 4.4.4 and older versions. Doing a deep dive into the OS the researchers found some conflicts at the API level. The devices contains a mixture of API keys from Android 4.4 and Android 4.2 that are both test-keys (not for public use) and release-keys. As test-keys are not finalized they ship with more security bugs than their final counterparts. However the combination of both test and release keys could be incredibly problematic as bugs will no doubt arise just by combining the two.</p>
<p><a href="http://cdn.vrworld.com/wp-content/uploads/2015/03/xiaomi-mi-4-6.jpg" rel="lightbox-0"><img class="aligncenter size-medium wp-image-49209" src="http://cdn.vrworld.com/wp-content/uploads/2015/03/xiaomi-mi-4-6-600x338.jpg" alt="xiaomi-mi-4-6" width="600" height="338" /></a></p>
<p>Bluebox researchers did on the device was a scan for suspicious apps &#8212; malware, spyware or adware. They found three apps considered to be risky. The most problematic of which was an app called Yt Service as it disguises its developer package to make it look like it came from Google &#8212; which is not the case. Next up were apps called PhoneGuardService which was identified as a Trojan and AppStats which is classified as riskware.</p>
<p>Bluebox gives the device a low trustable score of 2.6. By virtue of the fact that it runs a forked version of Android, Xiaomi devices ship with security flaws that have been long ago patched by Google.</p>
<p>For its part Xiaomi has not responded to Bluebox’s attempts for responsible disclosure &#8212; approaching the vendor first before going public.</p>
<p>Bluebox told <i>VR World</i> that it did not accept outside funding for this study.</p>
<p><strong>Update 4:50 China Standard Time:</strong></p>
<p>Xiaomi sent in this response:</p>
<blockquote><p>&#8220;We are investigating this matter now. There are glaring inaccuracies in the Bluebox blog post, as official Xiaomi devices do not come rooted and do not have any malware pre-installed. It is likely that the Mi 4 that Bluebox obtained has been tampered with.&#8221;</p></blockquote>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/03/06/bluebox-labs-xiaomi-phones-major-security-risk/">Bluebox Labs: Xiaomi Phones a Major Security Risk</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2015/03/06/bluebox-labs-xiaomi-phones-major-security-risk/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>IT: It’s the Place to be for Job Hunting</title>
		<link>http://www.vrworld.com/2015/02/11/place-job-hunting/</link>
		<comments>http://www.vrworld.com/2015/02/11/place-job-hunting/#comments</comments>
		<pubDate>Wed, 11 Feb 2015 02:45:10 +0000</pubDate>
		<dc:creator><![CDATA[Darleen Hartley]]></dc:creator>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Mobile Computing]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Anthem Blue Cross]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[CompTIA]]></category>
		<category><![CDATA[employee benefits]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[IT industry]]></category>
		<category><![CDATA[job hunting]]></category>
		<category><![CDATA[mobile]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=46970</guid>
		<description><![CDATA[<p>As unemployment waivers, people with IT skills are sought after.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/02/11/place-job-hunting/">IT: It’s the Place to be for Job Hunting</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="980" height="533" src="http://cdn.vrworld.com/wp-content/uploads/2015/02/Chart_IT-Unemployment-980.jpg" class="attachment-post-thumbnail wp-post-image" alt="Chart_IT Unemployment 980" /></p><p>Job seekers, Rejoice. While unemployment tries to recover from stagnation, the IT industry has a bright outlook. <a href="http://www.comptia.org/resources/it-industry-outlook-2015">CompTIA</a>, a professional IT certification company, predicts a worldwide expansion in the industry of around five percent with only Canada and the UK lagging behind.</p>
<p>Companies are understaffed already in the technology department and 70 percent of managers report they expect to have a shortage of IT professionals to draw from to fill the gaps. The CompTIA report pegs unemployment in the IT industry lower than that of other fields nationally. In 2012, the Bureau of Labor Statistics averaged the unemployment rate for technology professionals at 4.4, about half the national average at that time. The image breaks that down by position. The picture hasn’t changed much.</p>
<p>A shifting environment due to acquisitions and mergers adds to the complexity of staffing. Not surprisingly, top on the list for growth are areas that make headlines: cloud computing, mobile, and as indicated by events such as <a href="http://www.wsj.com/articles/investigators-eye-china-in-anthem-hack-1423167560">Anthem Blue Cross’s hack attack</a>, security. Established entities with familiar names have cash flow to entice employees with salaries and uncommon benefits that go beyond such traditional subsidies as health insurance.</p>
<p>If you plan to go job hunting, you might want to arm yourself with some hardware and software skills. That’s what companies continue to search for when interviewing applicants.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/02/11/place-job-hunting/">IT: It’s the Place to be for Job Hunting</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2015/02/11/place-job-hunting/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Japan Estimates Further Growth of its Security Market</title>
		<link>http://www.vrworld.com/2015/01/06/japan-estimates-growth-security-market/</link>
		<comments>http://www.vrworld.com/2015/01/06/japan-estimates-growth-security-market/#comments</comments>
		<pubDate>Mon, 05 Jan 2015 17:13:49 +0000</pubDate>
		<dc:creator><![CDATA[Christian Crisostomo]]></dc:creator>
				<category><![CDATA[Japan]]></category>
		<category><![CDATA[CAGR]]></category>
		<category><![CDATA[IDC Japan]]></category>
		<category><![CDATA[market analysis]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[security market]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=41712</guid>
		<description><![CDATA[<p>IDC Japan announces its latest market analysis, which estimates the potential growth of Japan's local security business sector through the years 2015 to 2018.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/01/06/japan-estimates-growth-security-market/">Japan Estimates Further Growth of its Security Market</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="800" height="600" src="http://cdn.vrworld.com/wp-content/uploads/2015/01/20152018.jpg" class="attachment-post-thumbnail wp-post-image" alt="20152018" /></p><p>IDC Japan&#8217;s <a href="http://cloud.watch.impress.co.jp/docs/news/20150105_682379.html">latest market analysis</a> has just revealed that Japan&#8217;s estimated compound annual growth rate for its security business sector from 2015 to 2018 will be at around 4.0%, at an equivalent value of about $2.5 billion. This is primarily based from an earlier report last 2014 that revealed an average annual growth rate within the same business sector of 4.7%, or about $2.1 billion.</p>
<p>Following the general growth of cloud-based businesses and enterprises during the past few years in Japan, demand for security services, such as access administration, endpoint protection, and general network security have also increased. During the last year, the combined annual growth rate of business related to these services was 4.1%, or equivalent to about $1.8 billion. The growth rate is expected to go even further with the introduction of more security services aimed at the mobile device market, which IDC Japan expects to contribute to the previously mentioned 4.0% growth rate throughout the years 2015 to 2018.</p>
<p>In addition, the analysis also included the steadily growing security market for SaaS (Software as a Service) businesses within the country. Its security market is expected to have an estimated compound annual growth rate of 11.6%, or equivalent to about $154 million. This also based from a comparison made from 2013 and 2014&#8217;s growth rates, which were $89 million and $100 million respectively.</p>
<p>On the other side of Japan&#8217;s security market, demand for intrusion prevention/detection and unified threat management systems, as well as related security hardware for other access and authorization systems, have also increased in the past two years. IDC Japan reports its growth rate at 7.5% ($367 million) from 2013 to 2014. As more security issues in Japan are focused towards unauthorized access and data theft, it is expected that the growth of these sectors would also directly affect other major digital security markets within the country, at least during the time period estimated by the market analysis.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/01/06/japan-estimates-growth-security-market/">Japan Estimates Further Growth of its Security Market</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2015/01/06/japan-estimates-growth-security-market/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Intel Acquires PasswordBox</title>
		<link>http://www.vrworld.com/2014/12/02/intel-acquires-passwordbox/</link>
		<comments>http://www.vrworld.com/2014/12/02/intel-acquires-passwordbox/#comments</comments>
		<pubDate>Tue, 02 Dec 2014 07:14:47 +0000</pubDate>
		<dc:creator><![CDATA[Jimmy Chuang]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[Intel]]></category>
		<category><![CDATA[passwordbox]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=40861</guid>
		<description><![CDATA[<p>Intel and PasswordBox offer more security solutions after the acquisition.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/12/02/intel-acquires-passwordbox/">Intel Acquires PasswordBox</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="2048" height="2048" src="http://cdn.vrworld.com/wp-content/uploads/2014/12/intel-1.png" class="attachment-post-thumbnail wp-post-image" alt="intel-1" /></p><p>Intel (<a href="www.google.com/finance?cid=284784">NASDAQ:INTC</a>) began to give users a convenient way to log into all of its websites and applications from any device without having to type or remember passwords while it announced the acquisition of PasswordBox on Dec. 1.</p>
<p>PasswordBox is a Montreal-based and award-winning provider of a cross-platform identity management service. PasswordBox became a part of the Safe Identity organization within Intel Security Group after the acquisition. Intel’s Safe Identity organization is committed to delivering solutions that reduce the pain of passwords, simplify and strengthen security and providing consumers with easy access to their digital lives.</p>
<p>“Everyone can relate to password fatigue. The PasswordBox service has already brought relief to millions of consumers who now enjoy simple, instant login,” said Chris Young, senior vice president and general manager of Intel Security Group.</p>
<p>Young said that Intel Security and PasswordBox share the same goal of improving digital identity protection across all devices and platforms.</p>
<p>“We believe we have the technology, expertise and reach to bring simple, secure access to consumers worldwide,” he said.</p>
<p>A recent report by Deloitte, a consulting firm, said that more than 90% of user-generated passwords are vulnerable to hacking, citing that the 10,000 most common passwords could access close to 98% of all accounts.</p>
<p>Intel Security combines the security expertise of McAfee, with the innovation, performance, and trust of Intel. The department is focused on solving some of the largest challenges in digital security. Along with PasswordBox, Intel Security will reduce password fatigue, simplify security mechanisms and offer the chances to experience next generation solutions to their consumers, Young said.</p>
<p>“PasswordBox has spent the last two years building a product that people love, trust, and use around the world every day,” said Daniel Robichaud, CEO and co-founder for PasswordBox. “We share Intel Security’s vision of simple, secure access and identity protection across all platforms and devices. Together, we believe we can offer our customers world-class technology, expertise and support to bring such access anywhere, all backed by Intel.”</p>
<p>PasswordBox currently possesses 44 employees and was established in Montreal in 2012. All current employees have joined Intel Security.</p>
<p>Since is debut 12 months ago, PasswordBox secured VC funding, led by OMERS Ventures, won best mobile app at CES 2014, and has been downloaded 14 million times worldwide. Intel’s acquisition of PasswordBox is effective immediately. Terms of the transaction were not disclosed and are not material to Intel’s operations. The acquisition is expected to support future innovations that will be announced at a later date.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/12/02/intel-acquires-passwordbox/">Intel Acquires PasswordBox</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/12/02/intel-acquires-passwordbox/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Walkman A event, Cloud Direct, 6-Second Camera: The Headlines in Tokyo for Nov. 27</title>
		<link>http://www.vrworld.com/2014/11/27/walkman-event-cloud-direct-6-second-camera-headlines-tokyo-nov-27/</link>
		<comments>http://www.vrworld.com/2014/11/27/walkman-event-cloud-direct-6-second-camera-headlines-tokyo-nov-27/#comments</comments>
		<pubDate>Thu, 27 Nov 2014 13:13:52 +0000</pubDate>
		<dc:creator><![CDATA[Christian Crisostomo]]></dc:creator>
				<category><![CDATA[Asia Pacific (APAC)]]></category>
		<category><![CDATA[camera]]></category>
		<category><![CDATA[Cloud Direct]]></category>
		<category><![CDATA[demo]]></category>
		<category><![CDATA[Mitsubishi-Tokyo UFJ]]></category>
		<category><![CDATA[online banking]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Sony]]></category>
		<category><![CDATA[Takara Tomy]]></category>
		<category><![CDATA[toys]]></category>
		<category><![CDATA[Walkman]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=40758</guid>
		<description><![CDATA[<p>Here is the daily roundup from Japanese consumer tech and tech business websites for November 27, 2014.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/27/walkman-event-cloud-direct-6-second-camera-headlines-tokyo-nov-27/">Walkman A event, Cloud Direct, 6-Second Camera: The Headlines in Tokyo for Nov. 27</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="640" height="480" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/wlkmana.jpg" class="attachment-post-thumbnail wp-post-image" alt="wlkmana" /></p><p>Here is the daily roundup from Japanese consumer tech and tech business websites for November 27, 2014.</p>
<h2>Sony to hold Walkman A demo event</h2>
<p>Sony <a href="http://news.mynavi.jp/news/2014/11/27/467/">plans to hold a demonstration event</a> for its recently unveiled Walkman A hi-res music players. The event will start on December 4, and will end two days later on December 6. The chosen venue will be at Tokyo Midtown Canopy Square.</p>
<p>Last September, Sony had announced the new Walkman A series, it&#8217;s next upcoming line up of hi-res digital music players. The event will mainly showcase the Walkman A units for testing by the event&#8217;s visitors. However, it will also demonstrate the unit&#8217;s &#8220;sound art&#8221; feature, which will be an event-exclusive display of water vibrations functioning as digital synthesizers.</p>
<p>The models that will be showcased in the event are the NW-A16 and the NW-A17, both of which are hi-res models, can expand their default storage via SD cards, and uses Sony&#8217;s proprietary DSEE HX audio up-scaling technology.</p>
<h2>Tokyo-Mitsubishi UFJ introduces new network banking service</h2>
<p>The Bank of Tokyo-Mitsubishi UFJ, in an effort to mitigate internet-based illegal and unauthorized banking remittance activities, <a href="http://news.mynavi.jp/news/2014/11/27/264/">has introduced yesterday</a> a new network banking service, which is named as the Cloud Direct.</p>
<p>The Cloud Direct online banking service will be used as an alternative transaction platform for the bank&#8217;s Mitsubishi-Tokyo UFJ Direct service. Instead of directly logging into its servers, the new service will instead simply guide its user to several transaction forms, using a software keyboard input to log onto the service itself. The banking company claims that the new service can considerably lessen the risk of third party programs intercepting sensitive private banking data, helping the user conduct online transactions safely and more conveniently.</p>
<p>The service requires no registration, and will be available for free at no extra cost for its customers.</p>
<h2>Takara Tomy unveils its &#8216;6-second&#8217; toy camera</h2>
<p>Takara Tomy <a href="http://techon.nikkeibp.co.jp/article/NEWS/20141127/391161/">announces its new</a> Magical Six toy camera. This small camera is capable of recording short 6-second videos, and is designed as an easy-to-use, point-and-click camera for children.</p>
<p>The <a href="http://www.takaratomy.co.jp/products/jobaca/magical6/">Magical Six</a> camera features a very simplistic design, only having three buttons, and a small screen as its interface. Its design theme is &#8220;giving even small children the opportunity to feel like a video editor&#8221;. Using the device is advertised as straightforward, with the large right button instantly allowing its user to record, edit, and put together short 6-second videos.</p>
<p>Aside from recording 6-second videos, the camera also features continuous snapshots, audio recording, reverse playback and basic frame editing.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/27/walkman-event-cloud-direct-6-second-camera-headlines-tokyo-nov-27/">Walkman A event, Cloud Direct, 6-Second Camera: The Headlines in Tokyo for Nov. 27</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/11/27/walkman-event-cloud-direct-6-second-camera-headlines-tokyo-nov-27/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>One Fifth of Japanese Have Lost a Smartphone, According to Survey</title>
		<link>http://www.vrworld.com/2014/11/26/one-fifth-japanese-lost-smartphone-according-survey/</link>
		<comments>http://www.vrworld.com/2014/11/26/one-fifth-japanese-lost-smartphone-according-survey/#comments</comments>
		<pubDate>Wed, 26 Nov 2014 04:00:59 +0000</pubDate>
		<dc:creator><![CDATA[Christian Crisostomo]]></dc:creator>
				<category><![CDATA[Japan]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Lookout]]></category>
		<category><![CDATA[lost phone]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[smartphone]]></category>
		<category><![CDATA[survey]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=40721</guid>
		<description><![CDATA[<p>A small sample research done by Lookout Inc. Japan reveals that at least one out of five people in Japan have experienced losing their smartphones.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/26/one-fifth-japanese-lost-smartphone-according-survey/">One Fifth of Japanese Have Lost a Smartphone, According to Survey</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="650" height="337" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/lookoutjapanlostphone.jpg" class="attachment-post-thumbnail wp-post-image" alt="lookoutjapanlostphone" /></p><p>A <a href="http://androwire.jp/articles/2014/11/18/04/index.html">research survey recently published</a> by the Japanese branch of San Francisco-based security firm Lookout Inc. indicates that Japanese users may actually lose their smartphones quite frequently. The survey revealed that at least one in every five smartphone users had experienced losing their smartphone at one time.</p>
<p>This conclusion made by the survey was based from the data collected from a small sample of about 1,000 users throughout the country. The approximate 23% within the group representing this figure reported having experienced losing at least one smartphone at some point. A considerable majority of the people within the group are users who live in busy cities, and are considerably young, averaging only to about 18 to 24 years of age.</p>
<p>As for where exactly do they lose their smartphones, the most common place was on public transportation mediums, especially on trains and subways, or on facilities and establishments that are near these vehicles. Second on the list was on commercial establishments, such as on shopping malls or market districts. Prefecture-wise, the region with the most users having lost their smartphones was on Okinawa Prefecture (44%).</p>
<p>The issue of lost mobile phones today holds more digital security risks than before, mainly because sensitive and private data are now being frequently and regularly used on smartphones. When questioned about data recovery, the general consensus of the entire sample was that they are willing to pay even 50,000 yen ($424.00), just so in order to recover and secure the lost data.</p>
<p>The data obtained from the survey will be used by Lookout Inc. to provide the appropriate security solutions and applications for future lost smartphones.</p>
<p>Weirdly enough, at least 11% from the entire sample have also reported losing their smartphones, however this group reported recovering their lost phones after a specific period of time.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/26/one-fifth-japanese-lost-smartphone-according-survey/">One Fifth of Japanese Have Lost a Smartphone, According to Survey</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/11/26/one-fifth-japanese-lost-smartphone-according-survey/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Synology releases DiskStation Manager 5.1</title>
		<link>http://www.vrworld.com/2014/11/10/synology-releases-diskstation-manager-5-1/</link>
		<comments>http://www.vrworld.com/2014/11/10/synology-releases-diskstation-manager-5-1/#comments</comments>
		<pubDate>Mon, 10 Nov 2014 06:08:35 +0000</pubDate>
		<dc:creator><![CDATA[Harish Jonnalagadda]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[DiskStation Manager 5.1]]></category>
		<category><![CDATA[DSM]]></category>
		<category><![CDATA[DSM 5.1]]></category>
		<category><![CDATA[NAS]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Synology]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=40285</guid>
		<description><![CDATA[<p>Synology's DSM receives an update that increases focus on security. </p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/10/synology-releases-diskstation-manager-5-1/">Synology releases DiskStation Manager 5.1</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="973" height="515" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Synology-DSM-5.1.jpg" class="attachment-post-thumbnail wp-post-image" alt="Synology DSM 5.1" /></p><p>After beta testing for over six weeks, Synology is ready to roll out its latest operating system, DiskStation Manager 5.1. The update is now available for the vendor’s range of NAS products.</p>
<p>The major addition is Security Advisor, which runs a diagnostic to check your network preferences, password strength and other system settings to determine if your NAS is vulnerable. Synology was quick to roll out a patch after it was found that a hack allows remote users to access a user’s DiskStation earlier this year, hence the focus on increased security with this update. There’s also a new tool that automatically blocks malicious programs from accessing system resources.</p>
<p>On the productivity side, Note Station is a new addition that allows you to write, centralize, sync and manage all your notes across devices. Along with the ability to password protect notes, the feature allows you to share and collaborate with others and revert to previous versions. All notes are saved in your private cloud, and there is also the option of importing existing notes from Evernote. All notes can be easily accessed through a mobile device via DS Note.</p>
<p>The built-in file manager, File Station, has also received numerous additions, and now comes with built-in FTP and email clients. With DSM 5.1 users now have the ability to monitor and manage SSD cache.</p>
<p>Entertainment utilities like Video Station, Audio Station and Photo Station have all picked up updates, and now come with a better search interface that allows you to easily find content. You can sync your content to external cloud services such as OneDrive, Box, and hubiC, and as for data backup, you can configure Microsoft Azure, SFR, and hicloud.</p>
<p>Synology’s DSM is by far the best OS in the NAS segment thanks to the sheer number of features on offer, and with verison 5.1, it has gotten even better.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/10/synology-releases-diskstation-manager-5-1/">Synology releases DiskStation Manager 5.1</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/11/10/synology-releases-diskstation-manager-5-1/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Google Discovers Vulnerability in SSL 3.0</title>
		<link>http://www.vrworld.com/2014/10/14/google-discovers-vulnerability-in-ssl-3-0/</link>
		<comments>http://www.vrworld.com/2014/10/14/google-discovers-vulnerability-in-ssl-3-0/#comments</comments>
		<pubDate>Tue, 14 Oct 2014 23:26:35 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Bodo Möller]]></category>
		<category><![CDATA[Fallback]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google Security]]></category>
		<category><![CDATA[Heartbleed]]></category>
		<category><![CDATA[Krzysztof Kotowicz]]></category>
		<category><![CDATA[OpenSSL]]></category>
		<category><![CDATA[POODLE]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[SSL 3.0]]></category>
		<category><![CDATA[Thai Duong]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=40072</guid>
		<description><![CDATA[<p>Google's security researchers have discovered a new bug within SSL, this time in SSL 3.0 that exploits the fallback to SSL 3.0 and its inherently insecurity</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/10/14/google-discovers-vulnerability-in-ssl-3-0/">Google Discovers Vulnerability in SSL 3.0</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1000" height="389" src="http://cdn.vrworld.com/wp-content/uploads/2014/06/Google-Logo1.png" class="attachment-post-thumbnail wp-post-image" alt="Google Logo" /></p><p>Remember when security researchers <a title="The NSA Exploited the OpenSSL Heartbleed Bug for 2 Years" href="http://www.brightsideofnews.com/2014/04/11/the-nsa-exploited-the-openssl-heartbleed-bug-for-2-years/">found a vulnerability in OpenSSL</a> that potentially put the entire world at risk of having their data compromised? Well, Heartbleed appears not to be the end of these vulnerabilities. Well, Google has found another <a href="http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html" target="_blank">vulnerability in an older version of SSL</a>, in SSL 3.0. Thankfully, SSL 3.0 has mostly been replaced by TLS 1.0, TLS 1.1 and TLS 1.2 but many of those systems still have SSL 3.0 as a backup in the event of a need to support this legacy protocol.</p>
<p>Three Google security researchers <a href="https://www.openssl.org/~bodo/ssl-poodle.pdf" target="_blank">published a paper</a> back in September called <em>This POODLE bites: Exploiting the SSL 3.0 Fallback </em>in that document, Bodo Möller, Thai Duong and Krzysztof Kotowicz from Google basically state upfront that SSL 3.0 is obsolete and insecure and that&#8217;s why most companies, websites and overall the world no longer uses it. However, because some implementations keep SSL 3.0 as a legacy support feature, there are some security vulnerabilities that can be exploited as a result of this. They also say, by simply disabling SSL 3.0 you can completely avoid this vulnerability as a whole. They call the attack that happens as a result of the downgrade to SSL 3.0 the POODLE (Padding Oracle On Downgraded Legacy Encryption) which allows them to steal &#8220;secure&#8221; HTTP cookies or any bearer tokens.</p>
<p>If you can&#8217;t disable SSL 3.0 for one reason or another in your setup, then they&#8217;ve provided for a detailed solution which helps work around this fallback vulnerability. Realistically this is nowhere near as scary as Heartbleed or Shellshock which are more broadly vulnerable on more systems and create a much greater effect on the victim&#8217;s data. But nonetheless, this is something that system administrators need to address on their own secure implementations in order to ensure that they do not become exposed to this SSL 3.0 Poodle attack.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/10/14/google-discovers-vulnerability-in-ssl-3-0/">Google Discovers Vulnerability in SSL 3.0</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/10/14/google-discovers-vulnerability-in-ssl-3-0/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Yahoo Hacked via Shellshock Vulnerability</title>
		<link>http://www.vrworld.com/2014/10/06/yahoo-hacked-via-shellshock-vulnerability/</link>
		<comments>http://www.vrworld.com/2014/10/06/yahoo-hacked-via-shellshock-vulnerability/#comments</comments>
		<pubDate>Tue, 07 Oct 2014 01:40:08 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Bash Bug]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Shellshock]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Yahoo]]></category>
		<category><![CDATA[Yahoo email]]></category>
		<category><![CDATA[Yahoo mail]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=39694</guid>
		<description><![CDATA[<p>The Shellshock bug, also known as the bash bug appears to already be taking some major tech companies as its first victims.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/10/06/yahoo-hacked-via-shellshock-vulnerability/">Yahoo Hacked via Shellshock Vulnerability</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="980" height="600" src="http://cdn.vrworld.com/wp-content/uploads/2014/10/YahooLogo1.jpg" class="attachment-post-thumbnail wp-post-image" alt="Yahoo Logo" /></p><p>A <a href="http://www.futuresouth.us/yahoo_hacked.html" target="_blank">security researcher has discovered</a> that Yahoo has become a victim of the newly discovered <a title="No, Kevin Mitnick is not Selling Zero Day Exploits to Hackers" href="http://www.brightsideofnews.com/2014/09/25/kevin-mitnick-selling-zero-day-exploits-hackers/">Shellshock vulnerability</a> (also known as bash bug) via Romanian hackers gaining access to Yahoo&#8217;s systems. There is already confirmation of the fact that Yahoo has been hacked <a href="http://www.futuresouth.us/yahoo_response.jpg" target="_blank" rel="lightbox-0">via an email from Yahoo&#8217;s security team</a>. This was originally submitted to Yahoo, but isn&#8217;t eligible for their bug bounty program, which for some reason doesn&#8217;t reward people for finding chinks in Yahoo&#8217;s armor for them before hackers do. This appears to be a significant flaw in Yahoo&#8217;s security policies and must be addressed by Marissa Mayer herself.</p>
<blockquote><p>He states:<br />
Disclosure and disclaimer: This document is being released due to several high profile companies being infiltrated using the recent Shellshock vulnerability, and what I have deemed as an improper response, or lack thereof, to resolving the issue from certain key companies contacted, as well as the FBI. Amongst the affected companies are Yahoo! and Lycos, major players and names in the technology world. This breach affects ALL of us in one way or another, and it’s crucial that this problem be resolved with haste. The FBI took the information down and went on their way. Yahoo! has not responded at all. I’ve attempted to email them, call them, and resorted to contacting Marissa Mayer directly via both email and Twitter, neither to which I have received a response as of yet. The ignoring of this issue is grossly negligent and even almost criminal. As such, I felt that for the safety of anyone using these services, it would be best to publicly disclose as much information as needed to get them moving and working towards resolving the issue before things get worse. All research and testing discussed in this paper was performed by Jonathan D. Hall of Future South Technologies.</p></blockquote>
<p>Yahoo has been struggling to gain back trust from users after their <a href="http://www.forbes.com/sites/jameslyne/2014/01/31/yahoo-hacked-and-how-to-protect-your-passwords/" target="_blank">email data breaches</a> and the overall meltdown of the company as an internet destination for most users. Under Marissa Mayer&#8217;s rule, the company has tried to become more of a content provider rather than a search or news destination. Their most popular applications like Flickr have struggled to really retain their audiences and regain the losses to other services like 500px due to simply being too unwilling to listen to the community and simply give them what they want. Flickr was once the default destination for professional and amateur photographers and since the service&#8217;s decline tons of viable competitors have cropped up to give people what they want.</p>
<p>The problem here for Yahoo is that they simply are not taking security risks seriously and continually find themselves the targets of hackers. Why? Because they appear not to take security as seriously as they say they do. And Yahoo still has a fairly large user base, especially Yahoo mail, which means that they become a big juicy target for hackers that know that Yahoo is slow to adapt and secure. The security game is an ever evolving one and if your security team is not constantly working to address new threats and actively working to prevent them, then you are going to end up like Yahoo, a sitting duck and popular target.</p>
<p>Yahoo <a href="http://www.businessweek.com/news/2014-10-06/yahoo-says-no-data-stolen-in-shellshock-hack" target="_blank">has said to Bloomberg</a> that three of their servers were compromised but that no data was taken, which may still need to be evaluated if only three servers were accessed.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/10/06/yahoo-hacked-via-shellshock-vulnerability/">Yahoo Hacked via Shellshock Vulnerability</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/10/06/yahoo-hacked-via-shellshock-vulnerability/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>No, Kevin Mitnick is not Selling Zero Day Exploits to Hackers</title>
		<link>http://www.vrworld.com/2014/09/25/kevin-mitnick-selling-zero-day-exploits-hackers/</link>
		<comments>http://www.vrworld.com/2014/09/25/kevin-mitnick-selling-zero-day-exploits-hackers/#comments</comments>
		<pubDate>Fri, 26 Sep 2014 00:43:12 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Rumors]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Kevin Mitnick]]></category>
		<category><![CDATA[Malicious]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Wired]]></category>
		<category><![CDATA[Zero Day]]></category>
		<category><![CDATA[Zero Day Expoit]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=39287</guid>
		<description><![CDATA[<p>There&#8217;s a very good chance that today&#8217;s Wired piece about Kevin Mitnick&#8217;s newest venture has a lot to do with the discovery of the Bash ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/09/25/kevin-mitnick-selling-zero-day-exploits-hackers/">No, Kevin Mitnick is not Selling Zero Day Exploits to Hackers</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="980" height="600" src="http://cdn.vrworld.com/wp-content/uploads/2014/09/GhostInTheWires.jpg" class="attachment-post-thumbnail wp-post-image" alt="Zero Day Kevin Mitnick" /></p><p>There&#8217;s a very good chance that today&#8217;s <em>Wired</em> piece about Kevin Mitnick&#8217;s newest venture has a lot to do with the discovery of the <a href="https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/" target="_blank">Bash Bug</a> within various Linux and Unix operating systems. This is a bug that could be considered a Zero Day exploit because of the fact that it is a security vulnerability within an application that is possible to exploit due to the fact that the software vendor has no knowledge of it yet or it has not been patched yet.</p>
<p>Either way, it is a vulnerability that someone can take advantage of. Now, <em>Wired</em> ran a piece about <a href="https://www.mitnicksecurity.com/" target="_blank">Kevin Mitnick and his security company</a> which does security consulting which includes a whole host of internet and non-net consulting all pertaining to security. The <a href="http://www.wired.com/2014/09/kevin-mitnick-selling-zero-day-exploits/" target="_blank"><em>Wired</em> piece</a> in question talks about one of Mitnick&#8217;s latest ventures which claims that his company is finding security researchers&#8217; and hackers&#8217; zero day exploits and selling them to the highest bidder.</p>
<p>&#8220;With his latest business venture, Mitnick has switched hats again: This time to an ambiguous shade of gray,&#8221; <em>Wired </em>wrote.</p>
<p>Late last week, Mitnick revealed a new branch of his security consultancy business he calls Mitnick’s Absolute Zero Day Exploit Exchange. Since its quiet inception six months ago, he says the service has offered to sell corporate and government clients high-end “zero-day” exploits, hacking tools that take advantage of secret bugs in software for which no patch yet exists. Mitnick says he’s offering exploits developed both by his own in-house researchers and by outside hackers, guaranteed to be exclusive and priced at no less than $100,000 each, including his own fee.</p>
<p>And what will his clients do with those exploits? “When we have a client that wants a zero-day vulnerability for whatever reason, we don’t ask, and in fact they wouldn’t tell us,” Mitnick tells <em>Wired</em> in an interview. “Researchers find them, they sell them to us for X, we sell them to clients for Y and make the margin in between.”</p>
<p>Mitnick declined to name any of his customers, and wouldn’t say how many, if any, exploits his exchange has brokered so far. But the <a href="https://www.mitnicksecurity.com/shopping/absolute-zero-day-exploit-exchange">website he launched to reveal the project last week</a> offers to use his company’s “unique positioning among security researchers and the hacker community” to connect exploit developers with “discerning government and corporate buyers.&#8221;</p>
<p>In fact, they interviewed Mitnick appearing to take many of his quotes out of context in order to sell their own agenda that he is selling these Zero Day exploits to whomever will pay him. In fact, it seems odd that they would include commentary from people on Twitter as part of their article when its merely an opinion and doesn&#8217;t actually add anything to the piece, other than mentioning that Mitnick responded to his tweet.</p>
<p>The reality of the situation is that for people that discover vulnerabilities in government and corporate infrastructure, there is a very difficult balance to strike. Many ethical hackers looking to notify companies of their security holes eventually become the targets of investigations and attacked for what they do. Sure, there are plenty of unethical hackers out there that might try to hold a company ransom for a fee to give them the Zero Day that they&#8217;ve found, but that has nothing to do with what Mitnick is doing. They are offering researchers and security minded people an intermediary to help those companies find and close Zero Day exploits and to reward the researchers for their work and at the same time protect them from frivolous lawsuits if they try to approach the company directly.</p>
<p>Mitnick&#8217;s company vigorously vets all of their potential clients and makes sure that no bad actors are being involved in the process. They are not selling Zero Day exploits to competitors of the companies that have the security holes and they aren&#8217;t selling Zero Day exploits to the government that might make a company vulnerable. The goal is to help companies see their problems and give them the opportunity to fix them before they become public.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/09/25/kevin-mitnick-selling-zero-day-exploits-hackers/">No, Kevin Mitnick is not Selling Zero Day Exploits to Hackers</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/09/25/kevin-mitnick-selling-zero-day-exploits-hackers/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>5 million Gmail Passwords Leaked, Google Says Don&#8217;t Panic</title>
		<link>http://www.vrworld.com/2014/09/11/5-million-gmail-passwords-leaked-google-says-dont-panic/</link>
		<comments>http://www.vrworld.com/2014/09/11/5-million-gmail-passwords-leaked-google-says-dont-panic/#comments</comments>
		<pubDate>Fri, 12 Sep 2014 00:28:48 +0000</pubDate>
		<dc:creator><![CDATA[Christian Crisostomo]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[gmail]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=38545</guid>
		<description><![CDATA[<p>5 million Gmail usernames and passwords were recently leaked through several Russian cybercrime web forums earlier this week. Google had already confirmed the issue yesterday, ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/09/11/5-million-gmail-passwords-leaked-google-says-dont-panic/">5 million Gmail Passwords Leaked, Google Says Don&#8217;t Panic</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="600" height="409" src="http://cdn.vrworld.com/wp-content/uploads/2014/09/gmail5million.jpg" class="attachment-post-thumbnail wp-post-image" alt="gmail5million" /></p><p>5 million Gmail usernames and passwords <a href="http://news.mynavi.jp/news/2014/09/11/183/">were recently leaked</a> through several Russian cybercrime web forums earlier this week. Google <a href="http://googleonlinesecurity.blogspot.com/2014/09/cleaning-up-after-password-dumps.html">had already confirmed</a> the issue yesterday, though it claims that no compromisation of its data systems was done that led to leakage of these user accounts.</p>
<p>The leaked Gmail accounts were first published on <a href="https://forum.btcsec.com/">a Bitcoin forum</a>, and were submitted in the form of a standard listed text. The forum user who posted the account credentials claims that most of the data in the text are still usable. However, the administrators of the forum have already deleted the passwords, and only left the usernames for verification. Most of the account access data on the list are written in English, Spanish and Russian.</p>
<p>Though a substantial number of the listed usernames are legit, Google says there is no reason to panic. Reports highly suggest that the source of that data did not come from Google at all, but rather accumulated from hundreds of other websites and online sources (which are unrelated to Google&#8217;s own services) that might have used the same username and password.</p>
<p><a href="http://googleonlinesecurity.blogspot.com/2014/09/cleaning-up-after-password-dumps.html">Google&#8217;s own security blog</a> even claims that only less than 2% of the username and password combinations on the leaked list actually worked. Furthermore, the time span of the accumulated passwords stretches as far as three to five years ago, which may mean that even if your account is on the list, the password may already be completely different to the one you have now.</p>
<p>Nevertheless, Google still advises Gmail users to at least check their accounts for possible security holes, and stay vigilant against phishing, malware and spam websites. Taking the necessary steps to prevent accounts from being accessed illegally goes a long way. Google&#8217;s 2-Step Authentication is also a plus, and can prevent unauthorized access even if your username and password becomes exposed.</p>
<p><em>This post originally appeared on <a href="http://www.brightsideofnews.com/2014/09/11/5-million-gmail-passwords-leaked-gmail-says-dont-panic/">Bright Side of News</a>*, VR World&#8217;s sister site. </em></p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/09/11/5-million-gmail-passwords-leaked-google-says-dont-panic/">5 million Gmail Passwords Leaked, Google Says Don&#8217;t Panic</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/09/11/5-million-gmail-passwords-leaked-google-says-dont-panic/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Don&#039;t Panic: 5 Million Gmail Passwords Leaked</title>
		<link>http://www.vrworld.com/2014/09/11/5-million-gmail-passwords-leaked-gmail-says-dont-panic/</link>
		<comments>http://www.vrworld.com/2014/09/11/5-million-gmail-passwords-leaked-gmail-says-dont-panic/#comments</comments>
		<pubDate>Thu, 11 Sep 2014 15:11:23 +0000</pubDate>
		<dc:creator><![CDATA[Christian Crisostomo]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[gmail]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=38730</guid>
		<description><![CDATA[<p>5 million Gmail usernames and passwords were recently leaked through several Russian cybercrime web forums earlier this week. Google had already confirmed the issue yesterday, ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/09/11/5-million-gmail-passwords-leaked-gmail-says-dont-panic/">Don&#039;t Panic: 5 Million Gmail Passwords Leaked</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="600" height="409" src="http://cdn.vrworld.com/wp-content/uploads/2014/09/gmail5million1.jpg" class="attachment-post-thumbnail wp-post-image" alt="gmail5million" /></p><p>5 million Gmail usernames and passwords <a href="http://news.mynavi.jp/news/2014/09/11/183/">were recently leaked</a> through several Russian cybercrime web forums earlier this week. Google <a href="http://googleonlinesecurity.blogspot.com/2014/09/cleaning-up-after-password-dumps.html">had already confirmed</a> the issue yesterday, though it claims that no compromisation of its data systems was done that led to leakage of these user accounts.</p>
<p>The leaked Gmail accounts were first published on <a href="https://forum.btcsec.com/">a Bitcoin forum</a>, and were submitted in the form of a standard listed text. The forum user who posted the account credentials claims that most of the data in the text are still usable. However, the administrators of the forum have already deleted the passwords, and only left the usernames for verification. Most of the account access data on the list are written in English, Spanish and Russian.</p>
<p>Though a substantial number of the listed usernames are legit, Google says there is no reason to panic. Reports highly suggest that the source of that data did not come from Google at all, but rather accumulated from hundreds of other websites and online sources (which are unrelated to Google&#8217;s own services) that might have used the same username and password.</p>
<p><a href="http://googleonlinesecurity.blogspot.com/2014/09/cleaning-up-after-password-dumps.html">Google&#8217;s own security blog</a> even claims that only less than 2% of the username and password combinations on the leaked list actually worked. Furthermore, the time span of the accumulated passwords stretches as far as three to five years ago, which may mean that even if your account is on the list, the password may already be completely different to the one you have now.</p>
<p>Nevertheless, Google still advises Gmail users to at least check their accounts for possible security holes, and stay vigilant against phishing, malware and spam websites. Taking the necessary steps to prevent accounts from being accessed illegally goes a long way. Google&#8217;s 2-Step Authentication is also a plus, and can prevent unauthorized access even if your username and password becomes exposed.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/09/11/5-million-gmail-passwords-leaked-gmail-says-dont-panic/">Don&#039;t Panic: 5 Million Gmail Passwords Leaked</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/09/11/5-million-gmail-passwords-leaked-gmail-says-dont-panic/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Data Sovereignty: Is Big Brother Over-Reaching?</title>
		<link>http://www.vrworld.com/2014/09/09/data-sovereignty-big-brother-reaching/</link>
		<comments>http://www.vrworld.com/2014/09/09/data-sovereignty-big-brother-reaching/#comments</comments>
		<pubDate>Tue, 09 Sep 2014 14:30:28 +0000</pubDate>
		<dc:creator><![CDATA[J. Angelo Racoma]]></dc:creator>
				<category><![CDATA[Opinion]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Legal]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=38498</guid>
		<description><![CDATA[<p>A US judge has ordered Microsoft to hand over email data stored in foreign servers. How will this affect data privacy among users around the world?</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/09/09/data-sovereignty-big-brother-reaching/">Data Sovereignty: Is Big Brother Over-Reaching?</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1000" height="750" src="http://cdn.vrworld.com/wp-content/uploads/2014/09/Globe-and-Cloud.jpg" class="attachment-post-thumbnail wp-post-image" alt="Globe and Cloud" /></p><p>Think your online privacy is free from prying eyes outside of sovereign jurisdiction? Think again. In late July, Microsoft was ordered by a US judge to disclose email data of a customer, even with the actual data being stored on servers in Dublin, Ireland. The court ruled that control, not physical jurisdiction, determined whether data can be turned over for investigation. This has been challenged by Microsoft through an appeal, and other technology companies and privacy advocates have likewise expressed that this will set a bad precedent for international business relations.</p>
<p><strong>Control, not physical location</strong><br />
In an August 2014 ruling, US District Judge Loretta Preska affirmed the earlier decision that required Microsoft to lawfully hand over email data pertaining to a certain account regardless of where it is actually stored. Data jurisdiction is dependent on the control of the company, regardless of the physical location of the servers, said <a href="www.scribd.com/doc/238413669/Microsoft-Warrant-Ruling">the ruling by Judge Preska</a>. Thus, service providers like Microsoft are legally bound to turn over data to government in the event of an inquiry, even if these are stored in a foreign country.</p>
<p>Said warrant was issued in light of the Stored Communications Act, requiring the service provider to disclose records under its control. It is necessary to note that the earlier court order stemmed from a criminal case involving narcotics, and government lawyers intend to use email records as evidence. Government has since sought for the judge to hold Microsoft in contempt in view of the company&#8217;s firm resolve against turning over the email data. In a statement, the Redmond firm says it &#8220;<span style="color: #263034;">will not be turning over the e-mail.&#8221; General counsel Brad Smith stressed that in its appeal, Microsoft will &#8220;continue to advocate that people’s emails deserve strong privacy protection in the US and around the world.&#8221;</span></p>
<p><strong>Data jurisdiction in question</strong><br />
This particular case will set a precedent among future court cases that involve data retrieval from cloud service companies. Cloud providers and telecom firms have actually weighed in on the issue, challenging the ruling. AT&amp;T, Verizon and Apple, among others, have filed amicus briefs in court expressing their stance.</p>
<p>If anything, this legal battle puts into light the validity of data sovereignty, as well as conflicting legal frameworks in different countries. In its amicus brief in support of Microsoft, Verizon said such a ruling &#8220;would have an enormous detrimental impact on the international business of American companies, on international relations, and on privacy.&#8221; In fact, some governments, such as Germany, are already banning the use of cloud services run by American providers in order to mitigate the risk of data being accessed by authorities in the US.</p>
<p>And even if companies like Microsoft were to comply with the US court ruling, turning over data might, in turn, constitute an illegal breach of privacy in other jurisdictions. This has become the central argument in a so-called Umbrella Agreement for data sharing that the US and the EU are trying to work out.</p>
<p>Cloud computing has changed the dynamic of data storage and information storage, particularly with respect to jurisdiction, legal oversight and compliance. Data sovereignty is certainly among the key concerns for individuals or institutions who require a certain level of privacy and security. But if a country&#8217;s government can claim control over data that is supposedly physically stored in another country&#8217;s jurisdiction, then it&#8217;s a whole new ball game. With data being in the cloud, does control take precedence over physical jurisdiction? This argument will need threshing out amongst stakeholders, including governments, foreign policy-making bodies, technology providers and privacy advocates, among others.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/09/09/data-sovereignty-big-brother-reaching/">Data Sovereignty: Is Big Brother Over-Reaching?</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/09/09/data-sovereignty-big-brother-reaching/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Rogue Cell Towers Are The Industrial Espionage Threat of The Decade</title>
		<link>http://www.vrworld.com/2014/09/06/rogue-cell-towers-are-the-industrial-espionage-threat-of-the-decade/</link>
		<comments>http://www.vrworld.com/2014/09/06/rogue-cell-towers-are-the-industrial-espionage-threat-of-the-decade/#comments</comments>
		<pubDate>Sun, 07 Sep 2014 03:42:11 +0000</pubDate>
		<dc:creator><![CDATA[Sam Reynolds]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[cryptophone]]></category>
		<category><![CDATA[fake cell towers]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=38528</guid>
		<description><![CDATA[<p>Last week news broke that ESD America, which manufacturers the $3,500 Cryptophone (a security hardened Samsung Galaxy S3) has discovered 19 rogue cell towers across ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/09/06/rogue-cell-towers-are-the-industrial-espionage-threat-of-the-decade/">Rogue Cell Towers Are The Industrial Espionage Threat of The Decade</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="631" height="349" src="http://cdn.vrworld.com/wp-content/uploads/2014/09/cell-tower.png" class="attachment-post-thumbnail wp-post-image" alt="cell-tower" /></p><p>Last week news broke that ESD America, which manufacturers the $3,500 Cryptophone (a security hardened Samsung Galaxy S3) has discovered 19 rogue cell towers across the United States which were hoovering up SMS and data from phones as well as intercepting calls.</p>
<p>ESD America found these towers as its Cryptophone alerts users when calls are being forced over unencrypted bandwidth via 2G from a nameless cell tower (cell towers from big telcos are always named).</p>
<p>ESD America’s CEO, Les Goldsmith, is unsure of why there are so many rogue base stations (called interceptors) within the United States but is concerned about the high number of rogue base stations found by Cryptophone users.</p>
<p>“Interceptor use in the U.S. is much higher than people had anticipated,” Goldsmith said in an interview with <a href="http://www.popsci.com/article/technology/mysterious-phony-cell-towers-could-be-intercepting-your-calls"><i>Popular Science</i></a>.  “One of our customers took a road trip from Florida to North Carolina and he found 8 different interceptors on that trip.  We even found one [in the vicinity of] South Point Casino in Las Vegas.”</p>
<p>Goldsmith said that the placement of towers appears to be seemingly random, with the exception of two: the one mentioned near the casino and a few more near military bases around the country.</p>
<p><b>Who’s spying on whom?</b></p>
<p>For the most part, cell phones are an inherently secure way to communicate. Connections between cell phone and tower are usually encrypted, through the exact encryption protocol must be agreed upon during the initial connection (handshake). As with the communication standard, the quality of encryption varies wildly.</p>
<p>Rogue base stations simply broadcast their signal at a level higher than nearby base stations, thereby drowning them out and forcing nearby phones to connect to them. Once connected, the rogue base station will act as a man in the middle passing along calls and text messages to the network after intercepting all of them &#8212; or just a specific few from targeted phones.</p>
<p>One<a href="http://www.theregister.co.uk/2014/09/03/us_celltowers_pose_man_in_the_middle_threat/"> comment in the press dismissed </a>the idea that these towers had some sort of nefarious intention behind them. The most likely explanation, according to the source, was that these were simply towers purchased by private individuals or groups to boost cell reception in areas underserved by big telco.</p>
<p>But the possibility that these towers may be the tools of an intelligence agency or another group for industrial or state espionage should not be dismissed. The vast majority of people would dismiss their cell phone dropping to 2G, or many other irregularities, as simply the product of poor reception from their telco. While guardians of secrets would have protocols in place to avoid talking about them over the air, others within the military or academic industrial complex might also have access to this information that while not classified as secret is still sensitive and would aid those engaged in intelligence gathering against a target.</p>
<p>As the placement of towers across the United States is seemingly random, it’s difficult to discern a specific target. This could be, however, a trial run to see if it was an effective use of resources. While for most people things like the Cryptophone will be an unnecessary expense, but for those concerned about the safety of their information of the network security-hardened smartphones like the Cryptophone will be a necessary tool to do business.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/09/06/rogue-cell-towers-are-the-industrial-espionage-threat-of-the-decade/">Rogue Cell Towers Are The Industrial Espionage Threat of The Decade</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/09/06/rogue-cell-towers-are-the-industrial-espionage-threat-of-the-decade/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Security Researcher Claims iOS Devices Have a Backdoor</title>
		<link>http://www.vrworld.com/2014/07/23/security-researcher-claims-ios-devices-backdoor/</link>
		<comments>http://www.vrworld.com/2014/07/23/security-researcher-claims-ios-devices-backdoor/#comments</comments>
		<pubDate>Wed, 23 Jul 2014 19:29:35 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Rumors]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[CIA]]></category>
		<category><![CDATA[com.apple.mobile.pcapd]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Firmware]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[Jonathan Zdziarski]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Secure]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Vulnerability]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=36690</guid>
		<description><![CDATA[<p>A security researcher is claiming to have found a set of services in iOS that appear to be a firmware-level backdoor in iOS devices. What&#8217;s ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/07/23/security-researcher-claims-ios-devices-backdoor/">Security Researcher Claims iOS Devices Have a Backdoor</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="960" height="960" src="http://cdn.vrworld.com/wp-content/uploads/2014/05/AppleLogo1.jpg" class="attachment-post-thumbnail wp-post-image" alt="Apple Logo iMessage iWatch Backdoor" /></p><p>A <a href="http://www.zdziarski.com/blog/?p=3441" target="_blank">security researcher is claiming to have found</a> a set of services in iOS that appear to be a firmware-level backdoor in iOS devices. What&#8217;s more interesting is that Apple has, in a very non-Apple manner, responded to his claims by <a href="https://support.apple.com/kb/HT6331?viewlocale=en_US&amp;locale=en_US" target="_blank">posting a support page about it</a>. He claims that these are confirmations of the backdoors that he found in iOS and that Apple claims to use them for diagnostic and enterprise purposes. These backdoors can only be accessed by Apple (or anyone that has access to Apple&#8217;s services) so they&#8217;re mostly secure backdoors, but they are backdoors nonetheless. Most consumers are completely and wholly unaware that alternative pathways into their devices exist and can be exploited by ANYONE (in this case Apple) other than themselves. This is also why remote bricking and other &#8216;security&#8217; features being pushed through legislatures are also a problem, but at least we&#8217;re aware of their existence unlike these services on iOS.</p>
<p>The services in question, om.apple.mobile.pcapd, com.apple.mobile.file_relay, com.apple.mobile.house_arrest among others have been addressed in <a href="https://support.apple.com/kb/HT6331?viewlocale=en_US&amp;locale=en_US" target="_blank">Apple&#8217;s knowledge base article</a>. Apple does not directly address <a href="https://twitter.com/JZdziarski" target="_blank">Jonathan Zdziarski&#8217;</a>s claims but instead tries to illuminate their use of these services and what they&#8217;re supposed to be used for. Apple claims that some of these services are used for diagnostic purposes internally as well as for iTunes and Apple Care support. However, the fact that these supposed backdoor services exist without users&#8217; or developers&#8217; knowledge is a bit worrisome.</p>
<p>The real truth here is that no matter what happens, or is really happening, customers should be aware of how intrusive some of these services are or can be. Sure, some of them are limited in scope in terms of what they can access, but even so, Apple should notify customers when they use such services or sign up for the operating system that there are services running on their devices that give Apple access to their device. Backdoor systems are not a joke and some of them are open invitations to hackers to try to hack into a backdoor and use it for their own purposes. Backdoors are inherently insecure and consumers should be made aware of them, malicious or not.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/07/23/security-researcher-claims-ios-devices-backdoor/">Security Researcher Claims iOS Devices Have a Backdoor</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/07/23/security-researcher-claims-ios-devices-backdoor/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The NSA Gathers 90% Irrelevant Data</title>
		<link>http://www.vrworld.com/2014/07/08/nsa-gathers-90-irrelevant-data/</link>
		<comments>http://www.vrworld.com/2014/07/08/nsa-gathers-90-irrelevant-data/#comments</comments>
		<pubDate>Tue, 08 Jul 2014 23:14:12 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Mobile Computing]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Opinion]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Intercept]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Records]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Spying]]></category>
		<category><![CDATA[Washington Post]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=36381</guid>
		<description><![CDATA[<p>The Washington Post is reporting via documents obtained from Edward Snowden that the NSA is collection hundreds of thousands of records, upwards of 160,000 communications, ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/07/08/nsa-gathers-90-irrelevant-data/">The NSA Gathers 90% Irrelevant Data</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1200" height="698" src="http://cdn.vrworld.com/wp-content/uploads/2014/07/GreenpeaceSpying_12001.jpg" class="attachment-post-thumbnail wp-post-image" alt="NSA Spying" /></p><p>The Washington Post <a href="http://www.washingtonpost.com/world/national-security/in-nsa-intercepted-data-those-not-targeted-far-outnumber-the-foreigners-who-are/2014/07/05/8139adf8-045a-11e4-8572-4b1b969b6322_story.html" target="_blank">is reporting</a> via documents obtained from Edward Snowden that the NSA is collection hundreds of thousands of records, upwards of 160,000 communications, most of which are completely irrelevant to the target person or people. After spending four months analyzing the data which included 22,000 reports and 160,000 data intercepts, the Washington Post was able to discern that a whopping 89% of the total data collected was from non-targets or mere bystanders.</p>
<p>The records obtained by Edward Snowden and passed on to the Washington post spanned 4 years of records that started in 2009 and ended in 2012. Obviously, they are merely a sliver of what was actually collected, but gave a fairly good idea of what kind of net the NSA has been casting with their programs and how unabashedly they are collecting innocent people&#8217;s data.</p>
<div id="attachment_36384" style="width: 1666px" class="wp-caption aligncenter"><a href="http://cdn.vrworld.com/wp-content/uploads/2014/07/SnowdenCache1.jpg" rel="lightbox-0"><img class="size-full wp-image-36384" src="http://cdn.vrworld.com/wp-content/uploads/2014/07/SnowdenCache1.jpg" alt="NSA Snowden Cache" width="1656" height="1524" /></a><p class="wp-caption-text">Washington Post Diagram of Data Collection</p></div>
<p>The data above also shows a vast increase in spying on people as Obama took office, indicating that the NSA&#8217;s activities only increased under his presidency. This would make a lot of Obama&#8217;s own biggest supporters very worried as he was supposedly working to curtail such programs as a senator. Nonetheless, the Washington Post and Edward Snowden never disclosed that they had these reports and documents which detail the scope and detail of the NSA&#8217;s spying from 2009 to 2012.</p>
<p>Ultimately, these programs are a self-fullfilling prophecy where the government continues to spy on more and more people without any probable cause and doing so on such a scale that it becomes almost impossible to control. These programs, like many other government programs seek to enlarge themselves from year to year and in many cases result in larger and larger bureaucracies that seek to increase their own size regardless the cost. A good example of that is with the war on drugs, many agencies involved in such programs are become ever more militarized and as a result have stepped up the scale of the war on drugs which results in needing more funding to maintain competitiveness. The real truth is that the NSA spent $1.5 billion on a data center to warehouse all of the data they&#8217;re collecting on us and it won&#8217;t be the last either. If we continue to allow the NSA to spy with the use of FISA as a vehicle, they will only become more and more invasive and dangerous.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/07/08/nsa-gathers-90-irrelevant-data/">The NSA Gathers 90% Irrelevant Data</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/07/08/nsa-gathers-90-irrelevant-data/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>DHS Pushes New Ridiculous Security Measures</title>
		<link>http://www.vrworld.com/2014/07/07/dhs-pushes-new-ridiculous-security-measures/</link>
		<comments>http://www.vrworld.com/2014/07/07/dhs-pushes-new-ridiculous-security-measures/#comments</comments>
		<pubDate>Mon, 07 Jul 2014 20:43:35 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Mobile Computing]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Opinion]]></category>
		<category><![CDATA[Al Qaeda]]></category>
		<category><![CDATA[battery]]></category>
		<category><![CDATA[BBC]]></category>
		<category><![CDATA[charged]]></category>
		<category><![CDATA[Charging]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[electronics]]></category>
		<category><![CDATA[fear]]></category>
		<category><![CDATA[fear mongering]]></category>
		<category><![CDATA[Heathrow]]></category>
		<category><![CDATA[ISIS]]></category>
		<category><![CDATA[London]]></category>
		<category><![CDATA[Manchester]]></category>
		<category><![CDATA[Secretary Johnson]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[terrorism]]></category>
		<category><![CDATA[terrorist attack]]></category>
		<category><![CDATA[UK]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=36372</guid>
		<description><![CDATA[<p>The Department of Homeland Security (DHS) recently posted a &#8216;warning&#8217; to foreign airports that have direct flights into the US, with an apparent focus on ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/07/07/dhs-pushes-new-ridiculous-security-measures/">DHS Pushes New Ridiculous Security Measures</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1024" height="1024" src="http://cdn.vrworld.com/wp-content/uploads/2014/07/DHS1.jpg" class="attachment-post-thumbnail wp-post-image" alt="DHS" /></p><p>The Department of Homeland Security (DHS) <a href="http://www.dhs.gov/news/2014/07/02/statement-secretary-johnson" target="_blank">recently posted a &#8216;warning&#8217;</a> to foreign airports that have direct flights into the US, with an apparent focus on UK airports, namely Manchester and London&#8217;s Heathrow. In this posting, Secretary Johnson, the head of the DHS stated that elevated security measures were being implemented based on the ever changing security climate.</p>
<p>So, what exactly are these elevated security measures? <a href="http://www.bbc.com/news/technology-28193654" target="_blank">According to the BBC</a>, these new security measure being implemented in airports like Manchester and London are requiring users to have their electronic devices charged and to be able to power the device on when prompted to. Furthermore, if a device does not have charge or is &#8216;dead&#8217; a passenger may actually be prevented from boarding their flight without proof of an operational laptop or tablet.</p>
<p>British Airways <a href="http://www.britishairways.com/travel/flightops/public/en_gb?p_faqid=5047" target="_blank">released a statement</a> in regards to the issue at hand that advises that you not bring on any devices that are inoperable or depleted from charge. This includes people transferring from flights through the UK that may have had long flights. So, if you&#8217;re flying in economy and don&#8217;t have a charging plug, you no longer have the right to use your devices until they die because you might not get let onto your connecting flight.</p>
<p>The UK government also has <a href="https://www.gov.uk/hand-luggage-restrictions/electronic-devices-and-electrical-items" target="_blank">a travel advisory</a> that states,</p>
<blockquote>
<h2 style="color: #0b0c0c;">Flying to the US</h2>
<p style="color: #0b0c0c;">Make sure your electronic devices are charged before you travel. If your device doesn’t switch on, you won’t be allowed to bring it onto the aircraft.</p>
</blockquote>
<p style="color: #0b0c0c;">These new rules implemented by the DHS are absolutely ridiculous and put an undo burden on consumers. I have flown through Heathrow countless times and have had a few instances where I had a dead phone, dead tablet or a dead laptop. And when you look at the utter lack of charging stations in Heathrow and in planes, it seems absolutely insane for them to be pushing these requirements on consumers without trying to alleviate them. The DHS and the UK have once again made flying miserable again and they&#8217;re taking more of our rights away without any justifications.</p>
<p style="color: #0b0c0c;">There are going to be easy ways to get around this &#8216;power-on&#8217; requirement set by the DHS if you&#8217;re really trying to build a device that will cause harm. This is yet another pointless security measure being presented in airports to make traveling even more ridiculous and difficult than it already is.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/07/07/dhs-pushes-new-ridiculous-security-measures/">DHS Pushes New Ridiculous Security Measures</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/07/07/dhs-pushes-new-ridiculous-security-measures/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>OnePlus One Gets Delayed Due to an OpenSSL Security Update</title>
		<link>http://www.vrworld.com/2014/06/11/oneplus-one-gets-delayed-due-openssl-security-update/</link>
		<comments>http://www.vrworld.com/2014/06/11/oneplus-one-gets-delayed-due-openssl-security-update/#comments</comments>
		<pubDate>Wed, 11 Jun 2014 16:36:35 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Mobile Computing]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[CyanogenMod]]></category>
		<category><![CDATA[Cyanogenmod Update]]></category>
		<category><![CDATA[Delay]]></category>
		<category><![CDATA[Delayed]]></category>
		<category><![CDATA[Firmware]]></category>
		<category><![CDATA[OnePlus]]></category>
		<category><![CDATA[OnePlus One]]></category>
		<category><![CDATA[OpenSSL]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Update]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=35754</guid>
		<description><![CDATA[<p>The much awaited OnePlus One smartphone has hit yet another snag on its way to being delivered to those that could actually get ahold of ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/06/11/oneplus-one-gets-delayed-due-openssl-security-update/">OnePlus One Gets Delayed Due to an OpenSSL Security Update</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1000" height="544" src="http://cdn.vrworld.com/wp-content/uploads/2014/04/oneplus-one-official-image-91.jpg" class="attachment-post-thumbnail wp-post-image" alt="OnePlus Official Image" /></p><p>The much awaited <a title="OnePlus One Premium Smartphone Launches at $299" href="http://www.brightsideofnews.com/2014/04/23/oneplus-one-premium-smartphone-launches-299/">OnePlus One</a> smartphone has hit yet another snag on its way to being delivered to those that could actually get ahold of one. The $299 smartphone has it all, and for a reasonable price, but the catch is that they&#8217;re limiting production so that they don&#8217;t bankrupt themselves, or their parent company OPPO in the process. And since the device is running CyanogenMod as the OS, there are some things that need to be ironed out before the device ships to consumers as a &#8216;shipping&#8217; final device.</p>
<p>One of those things is that CyanogenMod recently had a major security update as a result of the new <a title="The Whitehouse Says They Have Right to Withhold a Security Vulnerability" href="http://www.brightsideofnews.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/">OpenSSL vulnerabilities</a> discovered <a href="https://www.openssl.org/news/secadv_20140605.txt" target="_blank">on June 5th</a>. Thankfully this new vulnerability was caught quickly and is nowhere near as damaging as the Heartbleed vulnerability which make essentially the entire internet with the exception of financial institutions insecure. Anyways, this new vulnerability got patched and since it is critical to CyanogenMod&#8217;s security suite, CyanogenMod needed updating, which meant the OnePlus One needed updating as well. So, they needed to do a new firmware update on the OnePlus One as well as confirm and test that it works, causing a delay.</p>
<p>Some sites are spinning this as a OnePlus problem, but the reality is that they have little to no control over it and its better that they delay it a bit and confirm its a working firmware update than ship the vulnerable devices out and then hope the patched version works on their phones. Its certainly commendable of OnePlus and CyanogenMod to make sure that this problem is resolved and done in a professional and methodical manner. But&#8230; that still doesn&#8217;t change the fact that its virtually impossible to get your hands on a OnePlus One to begin with.</p>
<p>And if you&#8217;re in line for one, don&#8217;t be disappointed that its been delayed. Just be glad that they&#8217;re doing the right thing.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/06/11/oneplus-one-gets-delayed-due-openssl-security-update/">OnePlus One Gets Delayed Due to an OpenSSL Security Update</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/06/11/oneplus-one-gets-delayed-due-openssl-security-update/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>80 Tech Companies Cooperating with NSA, Claims Wikileaks</title>
		<link>http://www.vrworld.com/2014/05/14/80-tech-companies-cooperating-nsa-claims-wikileaks/</link>
		<comments>http://www.vrworld.com/2014/05/14/80-tech-companies-cooperating-nsa-claims-wikileaks/#comments</comments>
		<pubDate>Wed, 14 May 2014 16:58:29 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Rumors]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[AT&T]]></category>
		<category><![CDATA[Centurylink]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[COMINT]]></category>
		<category><![CDATA[EDS]]></category>
		<category><![CDATA[HP]]></category>
		<category><![CDATA[IBM]]></category>
		<category><![CDATA[Intel]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Motorola]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Oracle]]></category>
		<category><![CDATA[PRISM]]></category>
		<category><![CDATA[Qualcomm]]></category>
		<category><![CDATA[Qwest]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Strategic Partnerships]]></category>
		<category><![CDATA[Verizon]]></category>
		<category><![CDATA[Wiki leaks]]></category>
		<category><![CDATA[Wikileaks]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=35115</guid>
		<description><![CDATA[<p>Since we&#8217;ve had quite a bit of time between Snowden disclosures of NSA activities, it appears as though Wikileaks has gotten ahold of some secret ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/05/14/80-tech-companies-cooperating-nsa-claims-wikileaks/">80 Tech Companies Cooperating with NSA, Claims Wikileaks</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="980" height="646" src="http://cdn.vrworld.com/wp-content/uploads/2014/05/Wikileaks1.jpg" class="attachment-post-thumbnail wp-post-image" alt="Wikileaks" /></p><p>Since we&#8217;ve had quite a bit of time between Snowden disclosures of NSA activities, it appears as though <a href="https://twitter.com/wikileaks/status/466354362902937600" target="_blank">Wikileaks has gotten ahold</a> of some secret NSA documents that name names as to whom has been cooperating with them. They claim that they have over 80 different companies in their strategic partnerships.</p>
<div id="attachment_35116" style="width: 610px" class="wp-caption aligncenter"><a href="http://cdn.vrworld.com/wp-content/uploads/2014/05/BnfzRoECUAAPiNw1.jpg" rel="lightbox-0"><img class="size-full wp-image-35116" src="http://cdn.vrworld.com/wp-content/uploads/2014/05/BnfzRoECUAAPiNw1.jpg" alt="Wikileaks Tech NSA" width="600" height="449" /></a><p class="wp-caption-text">Wikileaks Tech NSA</p></div>
<p>The Wikileaks obtained slide states that these 80 &#8220;Major Global Corporations&#8221; are supporting BOTH missions. However, the document doesn&#8217;t specify exactly what both of those missions are, exactly. However, since this slide is labelled as COMINT that means it specifically pertains to communications between people, which may narrow exactly what those missions might be.</p>
<p>They list that those 80 companies are in a long laundry list of businesses including:</p>
<p style="text-align: center;"><strong>Telecommunications and Network Service Providers</strong> &#8211; AT&amp;T, Verizon and Qwest (now part of Centurylink).</p>
<p style="text-align: center;"><strong>Network Infrastructure</strong> &#8211; Cisco and HP</p>
<p style="text-align: center;"><strong>Hardware Platforms Desktops/Servers</strong> &#8211; HP, Intel, Qualcomm, IBM, EDS (now HP)</p>
<p style="text-align: center;"><strong>Operating Systems</strong> &#8211; Microsoft</p>
<p style="text-align: center;"><strong>Applications Software</strong> &#8211; Oracle, EDS (now HP) and Microsoft</p>
<p style="text-align: center;"><strong>Security Hardware and Software</strong> &#8211; Cisco, Oracle, EDS (now HP)</p>
<p style="text-align: center;"><strong>System Integrators</strong> &#8211; HP, IBM, Cisco and EDS (now HP)</p>
<p>However, if you do look at this list, it only specifically names 12 of the 80 companies that they&#8217;re cooperating with. This is the first time that companies are specifically being named as cooperative partners in NSA activities. Back when the <a title="The Internet and Our Freedoms Are in Danger" href="http://www.brightsideofnews.com/2013/06/07/the-internet-and-our-freedoms-are-in-danger/" target="_blank">NSA&#8217;s PRISM activities were disclosed</a> most of the companies were able to feign their being victims of the NSA activities as completely unknowing as to the PRISM program. However, there have been numerous suspicions that many of these companies had been cooperating with the NSA on certain backdoors and such in order to obtain government contracts and such. Additionally, some executives even claimed that they were attacked by the government because they wouldn&#8217;t cooperate, namely <a href="http://rt.com/usa/qwest-ceo-nsa-jail-604/" target="_blank">Qwest&#8217;s former CEO Joseph Nacchio</a>.</p>
<p>While Wikileaks has been known to leak documents that the US government doesn&#8217;t particularly like being seen by the public, this is a rare disclosure by Wikileaks that doesn&#8217;t come with much more information. While we would like to know the full list of companies involved and the rest of the slides in this deck, we&#8217;ll have to go off of what we have now. However, we will be contacting our people at the companies mentioned above to see what they have to say about their involvement with NSA security programs. On the record.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/05/14/80-tech-companies-cooperating-nsa-claims-wikileaks/">80 Tech Companies Cooperating with NSA, Claims Wikileaks</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/05/14/80-tech-companies-cooperating-nsa-claims-wikileaks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Whitehouse Says They Have Right to Withhold a Security Vulnerability</title>
		<link>http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/</link>
		<comments>http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/#comments</comments>
		<pubDate>Thu, 01 May 2014 18:49:57 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[CIA]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Heartbleed]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[OpenSSL]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Whitehouse]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=34849</guid>
		<description><![CDATA[<p>On Monday, as a follow up to the awareness around the Heartbleed bug and all of the rumors that circulated around it, The Whitehouse posted ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/">The Whitehouse Says They Have Right to Withhold a Security Vulnerability</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="2000" height="1361" src="http://cdn.vrworld.com/wp-content/uploads/2014/05/WhiteHouse_Logo1.png" class="attachment-post-thumbnail wp-post-image" alt="Whitehouse Logo" /></p><p>On Monday, as a follow up to the awareness around <a title="The NSA Exploited the OpenSSL Heartbleed Bug for 2 Years" href="http://www.brightsideofnews.com/2014/04/11/the-nsa-exploited-the-openssl-heartbleed-bug-for-2-years/">the Heartbleed bug</a> and all of the rumors that circulated around it, <a href="http://www.whitehouse.gov/blog/2014/04/28/heartbleed-understanding-when-we-disclose-cyber-vulnerabilities" target="_blank">The Whitehouse posted a blog</a> clarifying their stance on how they approach vulnerabilities such as Heartbleed. In fact, the NSA categorically denied any knowledge of the<a href="https://twitter.com/NSA_PAO/status/454720059156754434" target="_blank"> Heartbleed bug officially on Twitter</a>, even though they have been known to lie to Congress and the American people without hesitation, so their honesty is a little more than at question.</p>
<p>So, what exactly are they going to disclose and when? Well, there&#8217;s a nifty little check list that the Whitehouse has provided us with so that we know when an agency should withhold information from the public and when it should make it public.</p>
<blockquote>
<p class="p1">We have also established a disciplined, rigorous and high-level decision-making process for vulnerability disclosure. This interagency process helps ensure that all of the pros and cons are properly considered and weighed. While there are no hard and fast rules, here are a few things I want to know when an agency proposes temporarily withholding knowledge of a vulnerability:</p>
</blockquote>
<ul>
<li class="p2">
<blockquote><p>How much is the vulnerable system used in the core internet infrastructure, in other critical infrastructure systems, in the U.S. economy, and/or in national security systems?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>Does the vulnerability, if left unpatched, impose significant risk?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>How much harm could an adversary nation or criminal group do with knowledge of this vulnerability?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>How likely is it that we would know if someone else was exploiting it?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>How badly do we need the intelligence we think we can get from exploiting the vulnerability?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>Are there other ways we can get it?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>Could we utilize the vulnerability for a short period of time before we disclose it?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>How likely is it that someone else will discover the vulnerability?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>Can the vulnerability be patched or otherwise mitigated?</p></blockquote>
</li>
</ul>
<p>&nbsp;</p>
<p>So, basically, The Whitehouse and the administration of Obama are basically saying that if a vulnerability doesn&#8217;t really affect us too much, but can gain us lots of valuable intelligence we should keep our mouths shut. What is interesting about this supposed &#8220;rigorous&#8221; process for vulnerability disclosure is that there is no time limit set for how long they are allowed to wait until they disclose a vulnerability. There is no limitation on how long they can leave a vulnerability open if it passes all of these checks that they&#8217;ve established. They mention utilizing the vulnerability for a short period of time, but that doesn&#8217;t actually mean anything because a short period of time could be a day, a week, a month, or a year.</p>
<p>With the Heartbleed bug and the public disclosure around it, there were a lot of companies scrambling to patch the bug and some attacks that utilized it immediately after its disclosure. However, if left unpatched, Heartbleed could have disasterous implications and would give any government with knowledge of it almost unlimited access across the web. As a result, many people simply don&#8217;t believe that The Whitehouse and the NSA were unaware of such a bug, especially since the NSA had quietly exploited countless other bugs continually without any concern.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/">The Whitehouse Says They Have Right to Withhold a Security Vulnerability</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Content Delivery Network via Amazon Web Services: CloudFront: cdn.vrworld.com

 Served from: www.vrworld.com @ 2015-04-10 15:23:55 by W3 Total Cache -->