Category Archives: Technology

silicon valley & technology news

FBI: Foreign Hackers Have Compromised Home Router Devices

The FBI warned on Friday that foreign cybercriminals had compromised “hundreds of thousands” of home and small-office router devices around the world which direct traffic on the internet by forwarding data packets between computer networks.

In a public service announcement, the FBI has discovered that the foreign cybercriminals used a VPNFilter malware that can collect peoples’ information, exploit their devices and block network traffic.

The announcement did not provide any details about where the criminals might be based, or what their motivations could be.

“The size and scope of the infrastructure by VPNFilter malware is significant,” the FBI said, adding that it is capable of rendering people’s routers “inoperable.”

It said the malware is hard to detect, due to encryption and other tactics.

The FBI urged people to reboot their devices to temporarily disrupt the malware and help identify infected devices.

People should also consider disabling remote management settings, changing passwords to replace them with more secure ones, and upgrading to the latest firmware.

$1*/ mo hosting! Get going with us!

FBI: Foreign Hackers Have Compromised Home Router Devices

The FBI warned on Friday that foreign cybercriminals had compromised “hundreds of thousands” of home and small-office router devices around the world which direct traffic on the internet by forwarding data packets between computer networks.

In a public service announcement, the FBI has discovered that the foreign cybercriminals used a VPNFilter malware that can collect peoples’ information, exploit their devices and block network traffic.

The announcement did not provide any details about where the criminals might be based, or what their motivations could be.

“The size and scope of the infrastructure by VPNFilter malware is significant,” the FBI said, adding that it is capable of rendering people’s routers “inoperable.”

It said the malware is hard to detect, due to encryption and other tactics.

The FBI urged people to reboot their devices to temporarily disrupt the malware and help identify infected devices.

People should also consider disabling remote management settings, changing passwords to replace them with more secure ones, and upgrading to the latest firmware.

$1*/ mo hosting! Get going with us!

Amazon’s Alexa Accidentally Tapes, Shares Family Chat With Contact

A Portland, Oregon, family has learned what happens when Amazon.com Inc’s popular voice assistant Alexa is lost in translation.

Amazon on Thursday described an “unlikely … string of events” that made Alexa send an audio recording of the family to one of their contacts randomly. The episode underscored how Alexa can misinterpret conversation as a wake-up call and command.

A local news outlet, KIRO 7, reported that a woman with Amazon devices across her home received a call two weeks ago from her husband’s employee, who said Alexa had recorded the family’s conversation about hardwood floors and sent it to him.

“I felt invaded,” the woman, only identified as Danielle, said in the report. “A total privacy invasion. Immediately I said, ‘I’m never plugging that device in again, because I can’t trust it.'”

Alexa, which comes with Echo speakers and other gadgets, starts recording after it hears its name or another “wake word” selected by users. This means that an utterance quite like Alexa, even from a TV commercial, can activate a device.

That’s what happened in the incident, Amazon said. “Subsequent conversation was heard as a ‘send message’ request,” the company said in a statement. “At which point,

Alexa said out loud ‘To whom?’ At which point, the background conversation was interpreted as a name in the customer’s contact list.”

Amazon added, “We are evaluating options to make this case even less likely.”

Assuring customers of Alexa’s security is crucial to Amazon, which has ambitions for Alexa to be ubiquitous — whether dimming the lights for customers or placing orders for them with the world’s largest online retailer.

University researchers from Berkeley and Georgetown found in a 2016 paper that sounds unintelligible to humans can set off voice assistants in general, which raised concerns of exploitation by attackers. Amazon did not immediately comment on the matter, but it previously told The New York Times that it has taken steps to keep its devices secure.

Millions of Amazon customers have shopped with Alexa. Customers bought tens of millions of Alexa devices last holiday season alone, the company has said. That makes the incident reported Thursday a rare one. But faulty hearing is not.

“Background noise from our television is making it think we said Alexa,” Wedbush Securities analyst Michael Pachter said of his personal experience. “It happens all the time.”

$1*/ mo hosting! Get going with us!

Jury: Samsung Owes Apple $539M for Copying iPhone

A jury has decided Samsung must pay Apple $539 million in damages for illegally copying some of the iPhone’s features to lure people into buying its competing products.

The verdict reached Thursday is the latest twist in a legal battle that began in 2011. Apple contends Samsung wouldn’t have emerged as the world’s leading seller of smartphones if it hadn’t ripped off the technology powering the pioneering iPhone in developing a line of similar devices running on Google’s Android software.

Patents infringed

Previous rulings had determined that Samsung infringed on some of Apple’s patents, but the amount of damages owed has been in legal limbo. Another jury convened for a 2012 trial had determined Samsung should pay Apple $1.05 billion, but U.S. District Judge Lucy Koh reduced that amount to $548 million.

The issue escalated to the U.S. Supreme Court , which determined in 2016 that a lower court needed to re-examine $399 million of the $548 million. That ruling was based on the concept that the damages shouldn’t be based on all the profits that the South Korean electronics giant rung up from products that copied the iPhone because its infringement may only have violated a few patents.

$1 billion or $28 million?

Apple had argued it was owed more than $1 billon while Samsung contended the $399 million should be slashed to $28 million. The revised damages figure represents a victory for Apple, even though it isn’t as much as the Cupertino, California, company had sought.

“Today’s decision flies in the face of a unanimous Supreme Court ruling in favor of Samsung on the scope of design patent damages,” Samsung said in a statement. “We will consider all options to obtain an outcome that does not hinder creativity and fair competition for all companies and consumers.”

An eight-person jury came up with the new amount following a one-week trial and four days of deliberation in a San Jose, California, federal courthouse.

Apple expressed gratitude to the jury for agreeing “that Samsung should pay for copying our products.”

“This case has always been about more than money,” a company statement said. “Apple ignited the smartphone revolution with iPhone and it is a fact that Samsung blatantly copied our design.”

$1*/ mo hosting! Get going with us!

Jury: Samsung Owes Apple $539M for Copying iPhone

A jury has decided Samsung must pay Apple $539 million in damages for illegally copying some of the iPhone’s features to lure people into buying its competing products.

The verdict reached Thursday is the latest twist in a legal battle that began in 2011. Apple contends Samsung wouldn’t have emerged as the world’s leading seller of smartphones if it hadn’t ripped off the technology powering the pioneering iPhone in developing a line of similar devices running on Google’s Android software.

Patents infringed

Previous rulings had determined that Samsung infringed on some of Apple’s patents, but the amount of damages owed has been in legal limbo. Another jury convened for a 2012 trial had determined Samsung should pay Apple $1.05 billion, but U.S. District Judge Lucy Koh reduced that amount to $548 million.

The issue escalated to the U.S. Supreme Court , which determined in 2016 that a lower court needed to re-examine $399 million of the $548 million. That ruling was based on the concept that the damages shouldn’t be based on all the profits that the South Korean electronics giant rung up from products that copied the iPhone because its infringement may only have violated a few patents.

$1 billion or $28 million?

Apple had argued it was owed more than $1 billon while Samsung contended the $399 million should be slashed to $28 million. The revised damages figure represents a victory for Apple, even though it isn’t as much as the Cupertino, California, company had sought.

“Today’s decision flies in the face of a unanimous Supreme Court ruling in favor of Samsung on the scope of design patent damages,” Samsung said in a statement. “We will consider all options to obtain an outcome that does not hinder creativity and fair competition for all companies and consumers.”

An eight-person jury came up with the new amount following a one-week trial and four days of deliberation in a San Jose, California, federal courthouse.

Apple expressed gratitude to the jury for agreeing “that Samsung should pay for copying our products.”

“This case has always been about more than money,” a company statement said. “Apple ignited the smartphone revolution with iPhone and it is a fact that Samsung blatantly copied our design.”

$1*/ mo hosting! Get going with us!

FBI Taps Private Industry to Bring Down Hacker Clearinghouse

When a federal jury in Alexandria, Virginia, convicted a Latvian software developer last week of running an underground clearinghouse for computer hackers, U.S. prosecutors highlighted it as an example of their commitment to combating cybercrime.

“This verdict demonstrates our commitment to holding such actors accountable,” said acting U.S. Attorney Tracey Doherty-McCormick. “I commend the work of the agents and prosecutors both in the United States and in Latvia, who worked together to bring him to justice.”

Not mentioned was the role played by Trend Micro, a Japanese cybersecurity firm that collaborated with the FBI to hunt down the developer, Ruslans Bondars, and an accomplice, Jurijs Martisevs, who jointly operated Scan4You, a site that helped hackers test their malware.

In a report released after the verdict, Trend Micro offered an inside look at how it identified Scan4You in 2012, took a trove of data about the site to the FBI in 2014, and then worked closely with agents as they built a case against the two men.

Trend Micro says it has supported nearly 20 law enforcement cases around the world.

“In this case, our global threat intelligence network and team of researchers provided an invaluable resource for the FBI as it homed in on this notorious [counter antivirus] service,” said Ed Cabrera, chief security officer for Trend Micro.

The case highlights how the FBI and private cybersecurity firms, once wary of working together, have in recent years started teaming up to combat cybercrime, a problem that costs the world an estimated $600 billion a year. 

“The value that the private sector brings to law enforcement investigations is almost incalculable,” said John Boles, a director at consulting firm Navigant who previously worked as an assistant FBI director and led the bureau’s global cyberoperations.

A decade ago “there was almost hesitation on both sides of the fence to cooperate, but somewhere along the line as the scales have tipped, everybody realized it’s a global issue,” Boles said.

In 2011, the FBI created the Office of the Private Sector within the Cyber Division, making private-sector collaboration a key pillar of its cybercrime-fighting strategy.

Since then, the bureau has made more than a dozen major arrests in cybercrime cases, many with help from the private sector, according to Boles. While cybercrime investigations are often initiated by the bureau, some start with a tip from the private sector.

Unusual activity

That was the case with the Scan4You investigation.

In 2012, Trend Micro researchers, while investigating a hacker group, noticed a flurry of unusual activity on their threat radar: Somebody using Latvia IP addresses kept checking the company’s web reputation system, a program that blocks malicious websites.

That led them to another discovery: regular checks of Scan4You URLs against Trend Micro’s web reputation system emanating from Latvia. The goal: to determine whether Scan4You’s scanning scripts could detect malware.

“By 2014, we had a deeper understanding [of Scan4You] and began that relationship with the FBI,” Cabrera said.

The collaboration would continue for the next three years as Trend Micro researchers and FBI agents gathered evidence about Scan4You, its operators and its users.

Scan4You was an underground service that allowed hackers to upload their malware to see whether it could be detected by more than 35 antivirus engines. At its peak in 2016, Scan4You was the largest service of its kind, boasting more than 30,000 customers.

The service allowed cyber scofflaws to test all manner of malicious software, ranging from so-called crypters, a type of software used to conceal malicious files, to remote access trojans, programs that allow a remote operator backdoor access to a computer.

‘World’s most destructive hackers’

Among Scan4You’s customers were “some of the world’s most destructive hackers,” according Doherty-McCormick, the Virginia prosecutor.

One customer used Scan4You to test malware that was later used to steal about 40 million credit card and debit card numbers, costing one U.S. retailer $292 million, according to court documents.

A Russian hacker used Scan4You to develop Citadel, an infamous botnet used by cybercriminals to steal $500 million from bank accounts. The FBI worked with Microsoft to break up the network.

But Scan4You was not a very lucrative operation. As researchers dug deeper, they discovered that Bondars and Martisevs were affiliated with “some of the longest-running cybercriminal businesses” and “involved with one of the largest and oldest pharmaceutical spam gangs known as Eva Pharmacy,” according to Trend Micro.

Bondars, a longtime Latvian resident of Ukrainian citizenship, designed and maintained the site.

Martisevs, a Russian national living in Latvia, provided customer service and promoted the site on cybercriminal forums.

The pair’s deep involvement in an assortment of criminal activities gave them something that helped with their scanning service: cyber-cred.

“These threat actors gained the respect of many other cybercriminals who trusted them and used their malware scanning service,” the report says.

The end for Scan4You came with the 2017 arrests and extradition of Bondars and Martisevs to the United States. Shortly after their arrest, Scan4You went dark.

In March, Martisevs pleaded guilty and agreed to testify against Bondars. Last week, Bondars was convicted of three counts related to his role in Scan4You.

Scan4You’s downfall has taken the biggest service of its kind out of commission, but just how big a blow to cybercrime it represents remains to be seen.

Typically, when a site like Scan4You goes offline, its users flee to copycat sites. That has yet to happen, Cabrera said.

“This is a big blow to cybercrime, helping to disrupt countless threat actors and prove there are consequences to their actions,” he said.

$1*/ mo hosting! Get going with us!

FBI Taps Private Industry to Bring Down Hacker Clearinghouse

When a federal jury in Alexandria, Virginia, convicted a Latvian software developer last week of running an underground clearinghouse for computer hackers, U.S. prosecutors highlighted it as an example of their commitment to combating cybercrime.

“This verdict demonstrates our commitment to holding such actors accountable,” said acting U.S. Attorney Tracey Doherty-McCormick. “I commend the work of the agents and prosecutors both in the United States and in Latvia, who worked together to bring him to justice.”

Not mentioned was the role played by Trend Micro, a Japanese cybersecurity firm that collaborated with the FBI to hunt down the developer, Ruslans Bondars, and an accomplice, Jurijs Martisevs, who jointly operated Scan4You, a site that helped hackers test their malware.

In a report released after the verdict, Trend Micro offered an inside look at how it identified Scan4You in 2012, took a trove of data about the site to the FBI in 2014, and then worked closely with agents as they built a case against the two men.

Trend Micro says it has supported nearly 20 law enforcement cases around the world.

“In this case, our global threat intelligence network and team of researchers provided an invaluable resource for the FBI as it homed in on this notorious [counter antivirus] service,” said Ed Cabrera, chief security officer for Trend Micro.

The case highlights how the FBI and private cybersecurity firms, once wary of working together, have in recent years started teaming up to combat cybercrime, a problem that costs the world an estimated $600 billion a year. 

“The value that the private sector brings to law enforcement investigations is almost incalculable,” said John Boles, a director at consulting firm Navigant who previously worked as an assistant FBI director and led the bureau’s global cyberoperations.

A decade ago “there was almost hesitation on both sides of the fence to cooperate, but somewhere along the line as the scales have tipped, everybody realized it’s a global issue,” Boles said.

In 2011, the FBI created the Office of the Private Sector within the Cyber Division, making private-sector collaboration a key pillar of its cybercrime-fighting strategy.

Since then, the bureau has made more than a dozen major arrests in cybercrime cases, many with help from the private sector, according to Boles. While cybercrime investigations are often initiated by the bureau, some start with a tip from the private sector.

Unusual activity

That was the case with the Scan4You investigation.

In 2012, Trend Micro researchers, while investigating a hacker group, noticed a flurry of unusual activity on their threat radar: Somebody using Latvia IP addresses kept checking the company’s web reputation system, a program that blocks malicious websites.

That led them to another discovery: regular checks of Scan4You URLs against Trend Micro’s web reputation system emanating from Latvia. The goal: to determine whether Scan4You’s scanning scripts could detect malware.

“By 2014, we had a deeper understanding [of Scan4You] and began that relationship with the FBI,” Cabrera said.

The collaboration would continue for the next three years as Trend Micro researchers and FBI agents gathered evidence about Scan4You, its operators and its users.

Scan4You was an underground service that allowed hackers to upload their malware to see whether it could be detected by more than 35 antivirus engines. At its peak in 2016, Scan4You was the largest service of its kind, boasting more than 30,000 customers.

The service allowed cyber scofflaws to test all manner of malicious software, ranging from so-called crypters, a type of software used to conceal malicious files, to remote access trojans, programs that allow a remote operator backdoor access to a computer.

‘World’s most destructive hackers’

Among Scan4You’s customers were “some of the world’s most destructive hackers,” according Doherty-McCormick, the Virginia prosecutor.

One customer used Scan4You to test malware that was later used to steal about 40 million credit card and debit card numbers, costing one U.S. retailer $292 million, according to court documents.

A Russian hacker used Scan4You to develop Citadel, an infamous botnet used by cybercriminals to steal $500 million from bank accounts. The FBI worked with Microsoft to break up the network.

But Scan4You was not a very lucrative operation. As researchers dug deeper, they discovered that Bondars and Martisevs were affiliated with “some of the longest-running cybercriminal businesses” and “involved with one of the largest and oldest pharmaceutical spam gangs known as Eva Pharmacy,” according to Trend Micro.

Bondars, a longtime Latvian resident of Ukrainian citizenship, designed and maintained the site.

Martisevs, a Russian national living in Latvia, provided customer service and promoted the site on cybercriminal forums.

The pair’s deep involvement in an assortment of criminal activities gave them something that helped with their scanning service: cyber-cred.

“These threat actors gained the respect of many other cybercriminals who trusted them and used their malware scanning service,” the report says.

The end for Scan4You came with the 2017 arrests and extradition of Bondars and Martisevs to the United States. Shortly after their arrest, Scan4You went dark.

In March, Martisevs pleaded guilty and agreed to testify against Bondars. Last week, Bondars was convicted of three counts related to his role in Scan4You.

Scan4You’s downfall has taken the biggest service of its kind out of commission, but just how big a blow to cybercrime it represents remains to be seen.

Typically, when a site like Scan4You goes offline, its users flee to copycat sites. That has yet to happen, Cabrera said.

“This is a big blow to cybercrime, helping to disrupt countless threat actors and prove there are consequences to their actions,” he said.

$1*/ mo hosting! Get going with us!

Africa in Spotlight at Paris Tech Fair

French President Emmanuel Macron says his country will invest $76 million in African startups, saying innovation on the continent is key to meeting challenges ranging from climate change to terrorism. He spoke Thursday at a technology fair in Paris showcasing African talent this year.

It is hard to miss the African section of Viva Tech. There are gigantic signs pointing to stands from South Africa, Morocco and Rwanda. And there are lots of African entrepreneurs.

Omar Cisse heads a Senegalese startup called InTouch, which has developed an app making it easier to conduct financial transactions by mobile phone.

“Globally, you have more than $1 billion per day of transactions on mobile money, and more than 50 percent are done in sub-Saharan Africa,” he said.

Cisse says the challenges for African startups are tremendous, but so are the opportunities.

“In Africa, you have very huge potential. Everything needs to be done now, and with local people who know the realities,” he said.

Like Cisse, Cameroonian engineer Alain Nteff is breaking new ground. He and a doctor co-founded a startup called Gifted Mom, which provides health information to pregnant and nursing women via text messaging.

“I think the biggest problems today in Africa are going to be solved by business, and not by development and nonprofits,” he said.

Nteff gets some support from the United Nations and other big donors. But funding is a challenge for many. African startups reportedly raised $560 million last year, compared with more than $22 billion raised by European ventures.

Now they are getting a $76 million windfall, announced by President Emmanuel Macron here at the tech fair.

“When the startups decide to work together to deploy ad accelerate equipment in Africa, it is good for the whole continent, because that is how to accelerate everything and provide opportunities — which by the way, is the best way to fight against terrorism, jihadism … to provide another model to these young people,” he said.

The funding comes from the Digital Africa Initiative, run by France’s AFD development agency (Agence Francaise de Developpement).

“I think the main challenge is access to funding, and the second is the coaching to grow. AFD wants them to find solutions,” said Jean-Marc Kadjo, who heads the project team.

There are plenty of exciting projects here. Reine Imanishimwe is a wood innovator from Rwanda.

“I try to use my wood in high technology. As you can see, my business card is wood, but I print it using a computer,” said Imanishimwe.

Abdou Salam Nizeyimana is also from Rwanda. He works for Zipline, an American startup that uses drones to fly blood to people and hospitals in Rwanda, cutting delivery times from hours to minutes.

“Now doctors can plan surgery right away and just say, ‘We need this type of blood,’ ” and it can be delivered in about a half hour or less, he said.

Rwandan President Paul Kagame toured the tech fair with Macron. Relations between Rwanda and France are warming, after years of tension over Rwanda’s 1994 genocide.

Entrepreneur Nizeyimana is happy about that. When politics are good, he says, it is good for technology transfer and Africa’s development.

$1*/ mo hosting! Get going with us!

Africa in Spotlight at Paris Tech Fair

French President Emmanuel Macron says his country will invest $76 million in African startups, saying innovation on the continent is key to meeting challenges ranging from climate change to terrorism. He spoke Thursday at a technology fair in Paris showcasing African talent this year.

It is hard to miss the African section of Viva Tech. There are gigantic signs pointing to stands from South Africa, Morocco and Rwanda. And there are lots of African entrepreneurs.

Omar Cisse heads a Senegalese startup called InTouch, which has developed an app making it easier to conduct financial transactions by mobile phone.

“Globally, you have more than $1 billion per day of transactions on mobile money, and more than 50 percent are done in sub-Saharan Africa,” he said.

Cisse says the challenges for African startups are tremendous, but so are the opportunities.

“In Africa, you have very huge potential. Everything needs to be done now, and with local people who know the realities,” he said.

Like Cisse, Cameroonian engineer Alain Nteff is breaking new ground. He and a doctor co-founded a startup called Gifted Mom, which provides health information to pregnant and nursing women via text messaging.

“I think the biggest problems today in Africa are going to be solved by business, and not by development and nonprofits,” he said.

Nteff gets some support from the United Nations and other big donors. But funding is a challenge for many. African startups reportedly raised $560 million last year, compared with more than $22 billion raised by European ventures.

Now they are getting a $76 million windfall, announced by President Emmanuel Macron here at the tech fair.

“When the startups decide to work together to deploy ad accelerate equipment in Africa, it is good for the whole continent, because that is how to accelerate everything and provide opportunities — which by the way, is the best way to fight against terrorism, jihadism … to provide another model to these young people,” he said.

The funding comes from the Digital Africa Initiative, run by France’s AFD development agency (Agence Francaise de Developpement).

“I think the main challenge is access to funding, and the second is the coaching to grow. AFD wants them to find solutions,” said Jean-Marc Kadjo, who heads the project team.

There are plenty of exciting projects here. Reine Imanishimwe is a wood innovator from Rwanda.

“I try to use my wood in high technology. As you can see, my business card is wood, but I print it using a computer,” said Imanishimwe.

Abdou Salam Nizeyimana is also from Rwanda. He works for Zipline, an American startup that uses drones to fly blood to people and hospitals in Rwanda, cutting delivery times from hours to minutes.

“Now doctors can plan surgery right away and just say, ‘We need this type of blood,’ ” and it can be delivered in about a half hour or less, he said.

Rwandan President Paul Kagame toured the tech fair with Macron. Relations between Rwanda and France are warming, after years of tension over Rwanda’s 1994 genocide.

Entrepreneur Nizeyimana is happy about that. When politics are good, he says, it is good for technology transfer and Africa’s development.

$1*/ mo hosting! Get going with us!
1 2 3 77