Daily Tech Briefing: Oct. 3, 2014

 
 
By Eweek Staff  |  Posted 2014-10-03 Print this article Print
 
 
 
 
 
 
 

Shellshock vulnerability spreads to NAS devices; Microsoft invites 'insiders' to preview windows 10; ARM develops free OS for Internet of Things; and more.

 
Avalanche Botnet Shut Down by International Law Enforcement Action

DAILY VIDEO: Avalanche botnet disabled by law enforcement; Google launches continuous testing service...

More than 1 Million Android Devices Infected by 'Gooligan' Trojan

DAILY VIDEO: 'Gooligans' malware infects more than 1.3 million Android devices; Firefox patched for...

Azure Cloud Flaw Posed Hacking Risk to RHEL Virtual Machines

DAILY VIDEO: Microsoft Azure flaw posed RHEL hacking risk; Google explores use of machine learning to...

Microsoft Readying New Smartphone Models for Late 2017, Reports Say

DAILY VIDEO: Microsoft readying new mobile device push in 2017, reports say; Cisco extends security...

San Francisco Transit Agency Gets Back Online After Ransomware Attack

DAILY VIDEO: Cyber-attack knocks out San Francisco transit system fare terminals; Cisco extends...

Recount in Wisconsin Unlikely to Reveal Vote System Fraud, Hacking

DAILY VIDEO: Election recount unlikely to reveal evidence of vote system hacking; Mimecast brings...

Microsoft Sets Sights on Building Practical Quantum Computer

DAILY VIDEO: Microsoft Starts Quantum Computer Development Program; Cerber Ransomware Expands...

Symantec Buys Out Identity Protection Firm LifeLock for $2.3 Billion

DAILY VIDEO: Symantec acquires identity protection vendor LifeLock for $2.3 Billion; Oracle acquires...

Nvidia, OpenAI to Collaborate With Microsoft's AI Efforts

DAILY VIDEO: Microsoft's AI efforts get a boost from Nvidia, Elon Musk's OpenAI; Mozilla introduces...

IBM Launches Security Services Headquarters in Massachusetts

DAILY VIDEO: IBM opens global headquarters for security services; IoT devices evolving rapidly as...



Read more about the stories in today's news:

 
 
 

Shellshock, the vulnerability in the Bourne Again Shell, also known as Bash, is now being actively exploited in network-attached storage or NAS devices, according to a new report from FireEye.

Bash is widely deployed on Linux operating systems, which are found in a wide variety of embedded devices, including NAS appliances. Currently, FireEye is only aware of attacks targeting the products of a single NAS vendor, QNAP, which has already issued a patch. The attacks monitored by FireEye were against universities and research institutes in Korea, Japan and the United States.

Microsoft has introduced pre-release builds of Windows 10 ahead of the operating system's expected 2015 launch to members of what the company calls the Windows Insider community.

These "insiders," which includes software developers, technical analysts, corporate IT staff and other likely early adopters of the operating system, can now download Windows 10 Technical Preview, and the Enterprise edition. As with most pre-release software, those who choose to adopt the software early should be prepared for bugs.

ARM is flexing its software muscles with a new platform and operating system for the Internet of things. The company is leveraging the work it has done over the past several years with the mbed hardware and software ecosystem to create the ARM mbed IoT Device Platform, which includes a free operating system for devices powered by systems-on-a-chip.

This platform is based on the vendor's Cortex-M design and the mbed Device Server to help connect the devices and send the data they generate to the cloud for analysis

U.S. law enforcement officials have caught four hackers that were accused of infiltrating the networks of Microsoft; video game makers Epic Games, Valve and Zombie Studios, and even the U.S. Army, according to the U.S. Department of Justice.

The 18-count indictment charged the hackers with stealing more than $100 million in intellectual property. An FBI-led investigation showed that the hackers employed methods such as SQL injection and the use of stolen usernames and passwords of company employees and their software development partners to gain access to victims' computers.

 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Rocket Fuel