
<?phpxml version="1.0" encoding="utf-8"?>
<rss version="2.0" 
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
>
<channel>
<title>Haaze.com / trubogaz / All</title>
<link>http://www.haaze.com</link>
<description>Test Web 2.0 Content Management System</description>
<pubDate>Fri, 20 May 2011 07:10:36 +0000</pubDate>
<language>en</language>
<item>
<title><![CDATA[Sony subsidiary So-net reports data breach]]></title>
<link>http://www.haaze.com/story.php?title=sony-subsidiary-so-net-reports-data-breach</link>
<comments>http://www.haaze.com/story.php?title=sony-subsidiary-so-net-reports-data-breach</comments>
<pubDate>Fri, 20 May 2011 07:10:36 +0000</pubDate>
<dc:creator>trubogaz</dc:creator>
<category>Technology</category>
<guid>http://www.haaze.com/story.php?title=sony-subsidiary-so-net-reports-data-breach</guid>
<description><![CDATA[Someone broke into the network of Japanese Internet service provider So-net Entertainment, a subsidiary of Sony Corp., compromised e-mail accounts, and stole customer rewards points earlier this week, The Wall Street Journal reported today.  It's unknown if the breach is related to recent attacks on Sony that exposed personal data from more than 100 million accounts at Sony Online Entertainment and thePlayStation Network (PSN). And earlier today, a security firm said it found that the Sony Thailand site had been compromised and was being used in a phishing attack designed to steal information, ZDNet UK reported.  &quot;Although we can't completely rule out the possibility that there is a connection with the PSN issue, the likelihood is low,&quot; the Journal quoted So-net Entertainment spokesman Keisuke Watabe as saying. Watabe added that it was unlikely, because the attack methods used were different.Related link &amp;149' PSN breach exposes records of millions (roundup) So-net Entertainment warned users yesterday about the breach, and said a computer from one IP address tried 10,000 times to get into the customer rewards service. The intruder was able to access more than 200 accounts, stole about $1,200 worth of points from 128 of those accounts, and redeemed them, according to the report. In addition, 90 e-mail accounts on the So-net network were compromised.  The attack took place Monday and Tuesday and was discovered on Wednesday after customers complained, So-net said. There is no evidence that personal data such as names, addresses, and phone numbers were viewed, according to the company.<br/><br/>0 Vote(s) ]]></description>
</item>

<item>
<title><![CDATA[Google updates finance search for Android, iPhone]]></title>
<link>http://www.haaze.com/story.php?title=google-updates-finance-search-for-android-iphone</link>
<comments>http://www.haaze.com/story.php?title=google-updates-finance-search-for-android-iphone</comments>
<pubDate>Thu, 31 Mar 2011 07:10:05 +0000</pubDate>
<dc:creator>trubogaz</dc:creator>
<category>Mobile &amp; Electronics</category>
<guid>http://www.haaze.com/story.php?title=google-updates-finance-search-for-android-iphone</guid>
<description><![CDATA[(Credit:Google)Google made a few tweaks today to the way it presents financial information in its mobile search results.Now, typing a stock symbol into the Google.com search bar in on youriPhone or Android smartphone (2.1 or above) returns useful data in a glance, including the stock's share price and an interactive graph you can click on to see fluctuations over a day up to a five-year span.What's more, the results appear on four &quot;cards,&quot; or screens, that you can swipe through to see additional news, and a market overview. Those of you signed on to your Google account can also swipe to see a summarized view of your Google Finance stock portfolio.The new usability features are launching in English for now, with more language support to follow.<br/><br/>0 Vote(s) ]]></description>
</item>

<item>
<title><![CDATA[What the RSA breach means for you (FAQ)]]></title>
<link>http://www.haaze.com/story.php?title=what-the-rsa-breach-means-for-you-faq</link>
<comments>http://www.haaze.com/story.php?title=what-the-rsa-breach-means-for-you-faq</comments>
<pubDate>Fri, 18 Mar 2011 07:11:02 +0000</pubDate>
<dc:creator>trubogaz</dc:creator>
<category>Technology</category>
<guid>http://www.haaze.com/story.php?title=what-the-rsa-breach-means-for-you-faq</guid>
<description><![CDATA[An RSA SecurID key fob.(Credit:Via Wikimedia Commons)RSA warned its customers yesterday that its network had been breached and data had been stolen that could affect customers using its popular SecurID token authentication technology. Although details are scarce, here's what we know so far.What happenedSomeone launched an &quot;extremely sophisticated cyberattack&quot; on RSA in the form of an Advanced Persistent Threat and data was stolen related to the SecurID technology, the company said in a statement on its Web site. APT attacks are often used for espionage, targeting source code and other information within a company or government agency. They typically involve knowledge of a target's network, key employees, and operations, and can use multiple techniques to get insider information such as social engineering and exploits of unpatched holes in software. APT attacks against Google and other companies that were revealed last year used an exploit for a vulnerability in Internet Explorer that could have been delivered to insiders via e-mail. RSA has declined to provide more details on the incident at this time.What is SecurIDSecurID is a two-factor authentication system that organizations use to provide more protection for sensitive data and networks than just a password. With two-factor systems, someone accessing a network needs to provide something they know, which is a password or PIN, and something they have, which can be a thumbdrive-size hardware token or keyfob, or software on a mobile device. The token provides a one-time eight-digit number a user types in along with the password so that the system can verify that the person is authorized to access the network. A different number is used every time the user logs in.How serious is thisRSA said it is confident that the information stolen does not enable a successful direct attack on any SecurID customers. However, the data could be used to &quot;reduce the effectiveness&quot; of an implementation as part of a broader attack, the company said. There is no evidence that other products are affected or that personally identifiable data on customers or employees was compromised, according to RSA.  However, given that SecurID is the most popular form of two-factor authentication and is heavily used in government agencies and financial institutions, a compromise with customer systems could ultimately impact a lot of people. There are about 40 million SecurID hardware deployments and 250 million deployments on mobile devices.Who is behind the attackRSA has provided no information publicly as to the origin of the attack. However, sources told CNET that China is a likely bet. Google said the attack against it originated from China, which sources say is using whatever means it can to narrow the technology gap with the U.S. &quot;If this is really APT, it means China,&quot; said Rich Mogull, chief executive of Securosis. Likely targets would be in the defense and industrial markets and high-tech manufacturing, he said. &quot;If this is China they're not going to be trying to break into bank accounts.&quot; The big question is what data was stolen. Experts wondered if the attackers were able to access a database storing so-called seed data--including unique numbers for each token that, combined with the time of day, are used to generate the one-time passcodes that flash on the devices every 60 seconds. Attackers armed with that information could potentially use it to create their own pseudo-random numbers and pretend to be someone authorized to access a sensitive network. What should companies with SecurID deployments doWithout more information about what data was stolen, it's difficult for companies to assess the risk. However, high-profile targets should be prepared for anything. &quot;The safe bet is to assume that the system is completely compromised, although that doesn't mean everyone is going to be a target of attack,&quot; Mogull said.  Any organization using SecurID should make sure they have enabled passwords for accessing sensitive information, use strong passwords, and rotate them frequently, he said. They should also force a password change for accounts with high-level privileges, consider disabling accounts that don't use a password, and set password attempt lockouts so that they are blocked after three tries, he suggests in a blog post.  Companies might also want to monitor for multiple accounts that are repeatedly failing authentication attempts and remind users that the serial number of the token should be kept secret. And IT administrators should make sure they are running proper access control and firewall software, as well as updated security software and patch operating systems and other programs being used.  RSA issued recommendations to customers that include: focusing on security for social-media applications and Web sites accessed by anyone with access to their critical networks' reminding employees to avoid opening suspicious e-mails and providing usernames or other credentials to people without verifying the person's identity, as well as avoid complying with e-mail or phone-based requests for such information' paying special attention to securing active directories' watching closely for changes in user privilege levels and access rights' and hardening, monitoring, and limiting remote and physical access to infrastructure that hosts critical security software.Are there alternatives for authenticationThere are competing authentication products on the market, but Mogull said he would not advise changing systems, which is an expensive move, just yet. &quot;If this drags out and RSA doesn't tell us for a while what happened, then people maybe will need to switch products. It's way too early to start ripping SecurID out now.&quot; One source speculated that the breach will prompt increased interest for the open-source Google-Authenticator one-time passcode generators for mobile devices.  While the breach raises many questions for SecurID customers, it's not necessarily a huge black eye for RSA at this point, sources said. No company--security or other--is immune to these types of attacks, according to Mogull. &quot;This is the name of the game moving forward,&quot; he said.<br/><br/>0 Vote(s) ]]></description>
</item>

</channel>
</rss>
