Daily Tech Briefing: May 30, 2014

 
 
By eWEEK Staff  |  Posted 2014-05-30 Print this article Print
 
 
 
 
 
 
 

Newscaster threat uses social media for intelligence gathering; intel intros tech platform for connected cars; Spam campaign plays on user fear over Heartbleed; and more.

 
Microsoft Closes $26 Billion LinkedIn Social Network Buyout

DAILY BRIEFING: Microsoft completes $26 Billion LinkedIn social network acquisition; Google develops...

Windows 10 Creators Updates Includes New Security Features

DAILY VIDEO: Microsoft bolsters security features in windows 10 creators update; Dynamics 365...

AT&T 5G Wireless Trial Handles Streaming 4K HD Video, Camera Feeds

DAILY VIDEO: AT&T's first 5G business trial handles new high speed mobile apps; SCOTUS trims...

Amazon Shows Off Grocery Store Without Checkout Counters

DAILY VIDEO: Amazon unveils no-checkout POS system for early 2017; Google patches Android for 74...

Avalanche Botnet Shut Down by International Law Enforcement Action

DAILY VIDEO: Avalanche botnet disabled by law enforcement; Google launches continuous testing service...

More than 1 Million Android Devices Infected by 'Gooligan' Trojan

DAILY VIDEO: 'Gooligans' malware infects more than 1.3 million Android devices; Firefox patched for...

Azure Cloud Flaw Posed Hacking Risk to RHEL Virtual Machines

DAILY VIDEO: Microsoft Azure flaw posed RHEL hacking risk; Google explores use of machine learning to...

Microsoft Readying New Smartphone Models for Late 2017, Reports Say

DAILY VIDEO: Microsoft readying new mobile device push in 2017, reports say; Cisco extends security...

San Francisco Transit Agency Gets Back Online After Ransomware Attack

DAILY VIDEO: Cyber-attack knocks out San Francisco transit system fare terminals; Cisco extends...

Recount in Wisconsin Unlikely to Reveal Vote System Fraud, Hacking

DAILY VIDEO: Election recount unlikely to reveal evidence of vote system hacking; Mimecast brings...



Read more about the stories in today's news:

 
 
 

For at least the past three years, Iran has been using social media to carry out a wide-ranging cyber-attack campaign against organizations in the United States, the United Kingdom and Israel, according to a report published by iSight Partners, a global provider of cyber-threat intelligence.

The company is calling the campaign "Newscaster," and it involves many layers of deception, since attackers are creating fake identities with careers in the defense industry, journalism and government. The attackers are friending, following and connecting to target victims with the ultimate goal of stealing login credentials, which allows them to gain access to their targets' personal information or to sensitive computer systems to gather intelligence.

Eric Cowperthwaite, vice president of advanced security and strategy at Core Security, explained that individuals should be more careful about who they are trusting on social media.

Intel officials have introduced the In-Vehicle Solutions family of hardware and software products, which are part of Intel's Internet of Things Group. These offerings are designed to make it easier and less expensive for automotive manufacturers and suppliers to build connected-vehicle technologies into their cars. The ultimate goal of the technology is to improve the user experience of the cars and help move the industry toward self-driving vehicles.

Juniper Networks and Palo Alto Networks have reached a settlement of their long-running legal dispute over patents related to next-generation firewall technologies. This litigation has stretched on for more than two years.

The final settlement involves Palo Alto making a one-time payment of $175 million to Juniper and both companies have agreed to cross-license the patents under dispute for the life of those patents. The vendors have also agreed to not sue each other over patent infringement for eight years.

Security software and services company, Symantec is warning people to look out for a spam campaign that's playing on people's fear of the Heartbleed Secure Sockets Layer vulnerability.

The spam masquerades as a well-meaning attempt to help users secure themselves from the security flaw. But the spam messages also include links to malware that Symantec identifies as Trojan.Dropper and Infostealer.

 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Rocket Fuel