128
128
Mar 14, 2014
03/14
by
BLOOMBERG
tv
eye 128
favorite 0
quote 0
three years later the malware was spotted. target had paid $1.6 million because of its ability to detect hacking in real-time. a security worker in india saudi fire eye alarm and send it to the minneapolis center. the alert is overlooked. december second, security tools detected another version. this red flag also goes undetected. had target acted on the alerts at this point they would have been able to prevent one of the biggest data thefts in history. instead, for more than two weeks the hackers collected credit card information i bounced around the globe to places like moscow. federal law enforcement notifies target they are seeing suspicious activity involving card payments at its stores. the retailer hires an independent team to run a forensic investigation and on december 15, target confirms it has been hacked and removes the malware. target issues its first public statement on december 19th, revealing that up to 40 million cards may have been compromised. 22 days later on january 10, target notifies customers that in ad
three years later the malware was spotted. target had paid $1.6 million because of its ability to detect hacking in real-time. a security worker in india saudi fire eye alarm and send it to the minneapolis center. the alert is overlooked. december second, security tools detected another version. this red flag also goes undetected. had target acted on the alerts at this point they would have been able to prevent one of the biggest data thefts in history. instead, for more than two weeks the...
128
128
Mar 13, 2014
03/14
by
BLOOMBERG
tv
eye 128
favorite 0
quote 0
worked, and they spotted the malware in time and they did not do anything to stop it.rom do have a response target and i want to read the full statement. they came back to you with a statement from the ceo, saying target was certified as meeting the standard for the payment card industry september 2013. we are still in the midst of an ongoing investigation. we have already taken significant steps, including beginning the overhaul of our information security structure. target is facing some 90 different lawsuits. like you guys saw pass the mystery here about how this happened. that caughtfire eye this before anything was even stolen. >> what they are trying to do is figure out what actually went wrong on the human level. these findings were known to target as they went back, once they were notified by federal authorities that they had been hacked, they went back to see why all this expensive equipment and costly system they put together did not work. they did thatd as investigation is in fact that it did work. at least on the technology level. the question is, where was
worked, and they spotted the malware in time and they did not do anything to stop it.rom do have a response target and i want to read the full statement. they came back to you with a statement from the ceo, saying target was certified as meeting the standard for the payment card industry september 2013. we are still in the midst of an ongoing investigation. we have already taken significant steps, including beginning the overhaul of our information security structure. target is facing some 90...
131
131
Mar 13, 2014
03/14
by
BLOOMBERG
tv
eye 131
favorite 0
quote 0
three days later, sophisticated security spotted the malware. target had paid $1.6 million for it because of its ability to detect hacking and real-time. soon the security worker in india solvate fire eye alarm and the. operationcenter and the alarms overlooked on december 2, security tools detected another version and this red flag also went undetected. at target act on the alerts at this point, they would have been able to prevent one of the biggest data theft in history. instead, for more than two weeks, the hackers collected credit card information and bounce around the globe to place like moscow. on december 12, federal law enforcement notified target that there is suspicious activity involving card payments. the retailer hires an independent team to run a forensic investigation and on december 15, target confirms it has been hacked and removes the malware. publices the first statement revealing that up to 40 million cards of and compromise. 20 days later, they notify customers that an addition to credit card theft, personal information for
three days later, sophisticated security spotted the malware. target had paid $1.6 million for it because of its ability to detect hacking and real-time. soon the security worker in india solvate fire eye alarm and the. operationcenter and the alarms overlooked on december 2, security tools detected another version and this red flag also went undetected. at target act on the alerts at this point, they would have been able to prevent one of the biggest data theft in history. instead, for more...
115
115
Mar 15, 2014
03/14
by
BLOOMBERG
tv
eye 115
favorite 0
quote 0
alert and allthe that technology and money spent itually found the malware as was coming in, the malware that would have been used to take the data out, the alert was recognized in bangalore. he went to minneapolis and nothing happened. there is a human failure at the core of this. it is a little unclear why the react. not there's an issue of how the security teams deal with all of these alerts in a timely manner. what we do know is that their tools worked and they spotted the malware in time and they did not do anything to stop it. >> we do have a response from target. i want to read the full statement. they came back here a statement from the ceo, saying, target was certified as meeting the standards for the payment card industry in september 2013. target is facing some 90 different lawsuits. michael, it seemed like you guys solved half the mystery here about how this happened. eye, theof fire security outfit that target had caught it before anything was stolen. >> clearly, what they're trying to do is figure out what went wrong on the human level. these findings were known to target a
alert and allthe that technology and money spent itually found the malware as was coming in, the malware that would have been used to take the data out, the alert was recognized in bangalore. he went to minneapolis and nothing happened. there is a human failure at the core of this. it is a little unclear why the react. not there's an issue of how the security teams deal with all of these alerts in a timely manner. what we do know is that their tools worked and they spotted the malware in time...
39
39
Mar 29, 2014
03/14
by
CSPAN
tv
eye 39
favorite 0
quote 0
we immediately removed the malware from our system. we close the portal that created the access point print we narrow the scope of who has access to the system. the scope of who has access to the system. we have a review of our entire data security, processes, and controls. from that we will have additional earnings and we have taken steps that we have learned from their. we have in hazard data segmentation. perimeterrdened our and we have increased malware detection was something called white listing. -- with something called whitelisting. we have accelerated investment in chip and pin technology. we will be rolling out cards early next year. we have taken many steps and will continue to have learnings from our end to end review. you state in your testimony that although most states have rich notifications in place, having a strong national compliant would signify compliance by businesses while insuring all businesses are protected. i agree with that statement. i'm wondering if you could elaborate on the advantages of a consistent nat
we immediately removed the malware from our system. we close the portal that created the access point print we narrow the scope of who has access to the system. the scope of who has access to the system. we have a review of our entire data security, processes, and controls. from that we will have additional earnings and we have taken steps that we have learned from their. we have in hazard data segmentation. perimeterrdened our and we have increased malware detection was something called white...
126
126
Mar 13, 2014
03/14
by
BLOOMBERG
tv
eye 126
favorite 0
quote 0
that round-the-clock service saw up alert, so i was picking malware. they forwarded that alert to very sophisticated ticky operation center in minneapolis. the problem is, the security operations center did not do anything. >> can you put into context, simon security office, how many of these type of alerts and my getting? one would think if you ran as a business, maybe you're getting the message is all the time and it would be easy to miss. >> there is a huge number of different products out there as a security boom. every one is selling something different. but there is the quality of alerts. antivirus put out 10 or cap without tens of thousands of alerts on a big system like this every day. the system used by the cia and that is aon, however, very sophisticated tool and the number of alerts it sends out is small and the false positive ratio is really small. when it picked up a sign that said, you have malware on your network, and they did not respond, that is a pretty serious security fail. >> why are we hearing about any of this from target itself
that round-the-clock service saw up alert, so i was picking malware. they forwarded that alert to very sophisticated ticky operation center in minneapolis. the problem is, the security operations center did not do anything. >> can you put into context, simon security office, how many of these type of alerts and my getting? one would think if you ran as a business, maybe you're getting the message is all the time and it would be easy to miss. >> there is a huge number of different...
140
140
Mar 13, 2014
03/14
by
BLOOMBERG
tv
eye 140
favorite 0
quote 0
a setting to eradicate any malware it detects.or some reason, target had turned off that setting. >> is that unusual? >> there are people that use fireeye. they want the decision of eradicating malware in the hands of people. opportunities to stop it. we found no one who said this was any sort of cover-up. it is just gross incompetence. >> what i found fascinating is that what you're reporters uncovered as this is a run-of-the-mill operation. this is not a special type of cyber attack on a company. >> this is a normal hack. the hackers inserted a bit of malware, bad software, at the cash register. as soon as you swipe, they get your data, it goes through, but they get your data and they send it off to a storage server where they hold onto it and eventually exported to savor servers for them. this goes on all the time. instance, andthis we know a lot more about the possible identity of the hacker. they made a ton of mistakes. they left clues to identity behind. somebody -- the identity of the person is difficult for our reporters t
a setting to eradicate any malware it detects.or some reason, target had turned off that setting. >> is that unusual? >> there are people that use fireeye. they want the decision of eradicating malware in the hands of people. opportunities to stop it. we found no one who said this was any sort of cover-up. it is just gross incompetence. >> what i found fascinating is that what you're reporters uncovered as this is a run-of-the-mill operation. this is not a special type of...
144
144
Mar 24, 2014
03/14
by
FBC
tv
eye 144
favorite 0
quote 0
in either situation you want to make sure your organization is protected from malware and the virusesng your security perimeter. gerri: i am not sure the people are actually upbeat, a lot of brackets are already busted. thank you for coming on the show, thank you so much. >> thank you so much. gerri: we will be right back with my two cents more and the answer to the question of the day. as obamacare turns four, are you better or worse off? stay with us. understand my charts, and spend more time trading. their quick trade bar lets my account follow me online so i can react in real-time. plus, my local scottrade office is there to help. because they know i don't trade like everybody i trade like me. i'm with scottrade. (announcer) ranked highest in investor satisfaction with self-directed services by j.d. power and associates. if ...hey breathing's hard... know the feeling? copd includes emphysema and chronic bronchitis. spiriva is a once-daily inhaled copd maintenance treatment that helps open my obstructed airways for a full 24 hours. spiriva helps me breathe easier. spiriva handihale
in either situation you want to make sure your organization is protected from malware and the virusesng your security perimeter. gerri: i am not sure the people are actually upbeat, a lot of brackets are already busted. thank you for coming on the show, thank you so much. >> thank you so much. gerri: we will be right back with my two cents more and the answer to the question of the day. as obamacare turns four, are you better or worse off? stay with us. understand my charts, and spend...
142
142
Mar 13, 2014
03/14
by
BLOOMBERG
tv
eye 142
favorite 0
quote 0
they have this product that could have deleted the malware without any intervention. see a big company, i would why you want your team to make the final decision, but you have to be able to depend on that team to catch it. where the human failure was. it escalated from india up to the security operations center in minneapolis and we don't know exactly why, but we know it did not get the attention it needed to. then all the credit card numbers got out. >> and it had a big effect on the company. company sales thereafter, logically as a customer you think twice about going to target these days. and thehat reflected company fell down 46% from the year before. what is going to be the overall toll this takes on target? >> as an analyst, i see the toll on to front. from a consumer perception standpoint, we have seen reductions in traffic to the store and once someone stops going to the store, it is hard to capture them back. habit andut of the it's not that target lacks for competition. you see amazon making greater and greater inroads. second, this could cost target a lot o
they have this product that could have deleted the malware without any intervention. see a big company, i would why you want your team to make the final decision, but you have to be able to depend on that team to catch it. where the human failure was. it escalated from india up to the security operations center in minneapolis and we don't know exactly why, but we know it did not get the attention it needed to. then all the credit card numbers got out. >> and it had a big effect on the...
83
83
Mar 9, 2014
03/14
by
CSPAN2
tv
eye 83
favorite 0
quote 0
there will always be saboteurs and really strong malware. one of the thins i write about in the book is the nexus of malware and it is going to -- see more and more a.i. programs with bad programs that malware that is really, really powerful i'll worry about that in material was our energy grid and i write about that quite a bit. but, you know, are the guys who want to stop the a.i. developments smart enough to create programs that outsmart the programs by the guyses that have a lot of money? i would say, i don't know. have to be a gorilla campaign. but i think it is possible. >> misunderstood you, but you were looking for two types of safeguards for this development. is that right? >> i'm looking for well -- the ai community is getting this sense. this is a book about interviews with a.i. developers. they want fit cards. we want safeguards. people interested in a. i. risk wants safeguards. >> by definition was this singularity or expanding intelligence develops the cat out of bag? ant human created safeguards are irrelevant? >> once you get
there will always be saboteurs and really strong malware. one of the thins i write about in the book is the nexus of malware and it is going to -- see more and more a.i. programs with bad programs that malware that is really, really powerful i'll worry about that in material was our energy grid and i write about that quite a bit. but, you know, are the guys who want to stop the a.i. developments smart enough to create programs that outsmart the programs by the guyses that have a lot of money? i...
62
62
Mar 28, 2014
03/14
by
CSPAN2
tv
eye 62
favorite 0
quote 0
we are creating a national malware database -- >> what's the word speak was malware which we hope tobe like a fingerprint database, national resource so that if a company counter something that looks bad, they can send is that code. we will run it and tell them and say yes, we've seen this in this place or that. here's how you might address that. if we can create a big enough database and share information we can do better. >> my colleagues can help you with this. mike rogers, chairman of the intelligence committee, was the last year i think he had a piece of legislation that was designed to do that so the federal government would be a will to essentially create a database of malware, like whenever you log on, i use norton on my mr. kibble windows system. i love macintosh. and they use another one for my windows but whenever i turn the computer on, the first thing i do is update the operating system and the virus programs. if i remember quickly, chairman rogers legislation was designed to do essentially what you just said that the fbi is doing, so that businesses would be able to log
we are creating a national malware database -- >> what's the word speak was malware which we hope tobe like a fingerprint database, national resource so that if a company counter something that looks bad, they can send is that code. we will run it and tell them and say yes, we've seen this in this place or that. here's how you might address that. if we can create a big enough database and share information we can do better. >> my colleagues can help you with this. mike rogers,...
134
134
Mar 13, 2014
03/14
by
FBC
tv
eye 134
favorite 0
quote 0
this detection system also had in it an automatic quarantine system that would then wipe out the malware. and somebody flipped the switch. they kept -- gerri: what you're saying, saying it in such elegant language i'm not sure people like me can understand. but target had a system in place that would turn off malware, turn off bad software, software that would hurt us but they didn't let it do that. they overrode it. why? >> in circles this is not uncommon. often times security personnel will take closer look. they won't allow the software to do something automatically. they want to look at it. the only problem in this case. this was paul revere moment and basically let it pass them by. gerri: so here's what we've got. the timeline on this is really interesting, because november 30th is when fireeye told them they were having problems. the company didn't tell the public until december 23rd. you have this timeline here where even the government came to the company and said you've got a problem. you've got a problem. that was on december 12th. and finally on december 23rd, consumers are to
this detection system also had in it an automatic quarantine system that would then wipe out the malware. and somebody flipped the switch. they kept -- gerri: what you're saying, saying it in such elegant language i'm not sure people like me can understand. but target had a system in place that would turn off malware, turn off bad software, software that would hurt us but they didn't let it do that. they overrode it. why? >> in circles this is not uncommon. often times security personnel...
34
34
Mar 29, 2014
03/14
by
CSPAN
tv
eye 34
favorite 0
quote 0
given the circumstances we identified the malware on december 15 and provided public notice four days later. we were very focused. on speed, and doing so quickly. >> thank you. for my perspectives, prompt notices are critical. we understand it is important for companies who have been victims of a breach incident to assess what transpired. it is critical that they receive accurate information. it should be 60 days at the upside. of course, it is critical consumers have an opportunity to protect themselves if their cremation has been exposed. >> i want to thank you for your answers. my time has expired. i'm going to yield. i want to follow-up on this question of notification. anybody can be a victim of hacking. or intrusion. but, no one should in any way -- in any way delay notification. the ultimate cost often is borne by those consumers. >> in terms of the suffering and the pain, even if they are told by monitoring, or they get insurance. target has cooperated with my office and with this committee. i want to thank you for the comment you made today. >> thank you. i don't how you pull
given the circumstances we identified the malware on december 15 and provided public notice four days later. we were very focused. on speed, and doing so quickly. >> thank you. for my perspectives, prompt notices are critical. we understand it is important for companies who have been victims of a breach incident to assess what transpired. it is critical that they receive accurate information. it should be 60 days at the upside. of course, it is critical consumers have an opportunity to...
169
169
Mar 27, 2014
03/14
by
CSPAN2
tv
eye 169
favorite 0
quote 0
we've enhanced our data segmentation, hardened our perimeter, and we've increased malware detection with something called white listing. we accelerated the investment in that. and that, essentially, allows only the programs we want to run on our point of sale terminals to run. we've spent $100 million to complete the installation of guest payment devices this year and roll out the cards in early next year. so we've taken many steps, and we will continue to have learnings and expect to continue to pick changes. >> okay. ms. ramirez, you state in your testimony that, and i quote, although most states have breach note few case laws in place, having a strong and consistent national requirement would simplify compliance by businesses while insuring all consumers are protected, end quote. i agree with that statement. and i'm wondering maybe if you can elaborate on the advantages of a count national requirement for -- consistent national requirement for breach notification. >> we see a need for legislation for various reasons, and i think that's one. i think it's very critical that there be com
we've enhanced our data segmentation, hardened our perimeter, and we've increased malware detection with something called white listing. we accelerated the investment in that. and that, essentially, allows only the programs we want to run on our point of sale terminals to run. we've spent $100 million to complete the installation of guest payment devices this year and roll out the cards in early next year. so we've taken many steps, and we will continue to have learnings and expect to continue...
77
77
Mar 27, 2014
03/14
by
CSPAN
tv
eye 77
favorite 0
quote 0
there was the uploading of photographs, but instead, they uploaded malware. once they got into the website, they were able to peer into central systems, and they were to do that, and they were able to get to the directory of the management. passwords, and then change their passwords in order to issue orders, so they , socialed 310,000 names security numbers, university ids, and they intentionally left out photographs and so forth, that kind of information, because that would have a slow situation with the data, and they did it because they were and we were just flying by the seat of our pants. and with regard to notification, and weunced it within and thisll centers, was affecting students. there were e-mails and calls, and we were sending letters to everybody else, a total of 310,000, and some of them are alumni going back for 20 years, the country was using social security numbers as identification, and we have thousands of databases, and they just took that one database, where we have both the university id and the social security, so in terms of notificat
there was the uploading of photographs, but instead, they uploaded malware. once they got into the website, they were able to peer into central systems, and they were to do that, and they were able to get to the directory of the management. passwords, and then change their passwords in order to issue orders, so they , socialed 310,000 names security numbers, university ids, and they intentionally left out photographs and so forth, that kind of information, because that would have a slow...
169
169
tv
eye 169
favorite 0
quote 0
neil: don't we, starting to -- you always talk about malware type of devices some wear. have the equivalent of that to ward off this. >> believe it or not the, what we say, benjamin netanyahu, the former israeli prime minister, and davos, switzerland, at ecomiconference called cybersecurity the arms race wiou end. that is because cybersecuritys not a destination. it is a journey. it is evolution. neil: what do the bad guys want to do, michael? >> what they have been doing, they steal, exfiltration of data. they take money. they take, intellectual capital. not only from terrorists this is nation states. these are criminals. so they're stealing things. they're implanting capabilities so they come back in, what they call back doors, trojan horses. things lie in wait until a computerized system until they receive an instruction, now move forward, execute this order. they're also taking information as you type. something known as key logging. you put a malware program on the system downloads keystrokes, information you're putting out, e-mails. the things that you send to diff
neil: don't we, starting to -- you always talk about malware type of devices some wear. have the equivalent of that to ward off this. >> believe it or not the, what we say, benjamin netanyahu, the former israeli prime minister, and davos, switzerland, at ecomiconference called cybersecurity the arms race wiou end. that is because cybersecuritys not a destination. it is a journey. it is evolution. neil: what do the bad guys want to do, michael? >> what they have been doing, they...
78
78
Mar 27, 2014
03/14
by
CSPAN
tv
eye 78
favorite 0
quote 0
first, we identified malware honor system on this ar-15. >> should you have discovered it earlier? >> that is a reasonable question. it is asking a lot of hard questions. simply thatst state there should have been earlier discoveries. whether you could have prevented the intrusion and stopped it a subjecthat may be of debate. it should've been discovered. and notified. >> we are understanding that. our team assessed them. they assess hundreds of alerts every day and may judgments based on those. given the circumstances we identified the malware on december 15 and provided public notice four days later. we were very focused. on speed, and doing so quickly. >> thank you. perspectives, prompt notices are critical. we understand it is important for companies who have been victims of a breach incident to assess what transpired. receiveitical that they accurate information. it should be 60 days at the upside. of course, it is critical consumers have an opportunity to protect themselves if their cremation has been exposed. >> i want to thank you for your answers. my time has expired. i'm
first, we identified malware honor system on this ar-15. >> should you have discovered it earlier? >> that is a reasonable question. it is asking a lot of hard questions. simply thatst state there should have been earlier discoveries. whether you could have prevented the intrusion and stopped it a subjecthat may be of debate. it should've been discovered. and notified. >> we are understanding that. our team assessed them. they assess hundreds of alerts every day and may...
74
74
Mar 29, 2014
03/14
by
ALJAZAM
tv
eye 74
favorite 0
quote 0
our nation confronts the proliferation of malware and reality of steady and ongoing aggressive efforts to probe, and disrupt public and private networks and the industrial control systems that mag our water and energy and food supplies. >> three weeks since the disappearance of malaysia airlines flight mh370 better weather conditions are helping search crews scour the southern indian ocean. military aircrafts and ships are looking for debris, spotted by satellites off australia west coast coast. the australian maritime safety authority says various items are spotted, none from the missing jet. the search area covers 319,000 square kilometres. teams have been looking for more than 1,000km away this week. >> australia prime minister says crews are doing the best they can in difficult circumstances. >> yesterday was a better day for searching. today i understand is a good day for searching. weather conditions are benign for that inhospitable part of the world. yesterday, as i understand it, there were visuals from five aircraft of debris in the o. unfortunately, despite the appearance of
our nation confronts the proliferation of malware and reality of steady and ongoing aggressive efforts to probe, and disrupt public and private networks and the industrial control systems that mag our water and energy and food supplies. >> three weeks since the disappearance of malaysia airlines flight mh370 better weather conditions are helping search crews scour the southern indian ocean. military aircrafts and ships are looking for debris, spotted by satellites off australia west coast...
158
158
Mar 3, 2014
03/14
by
CSPAN2
tv
eye 158
favorite 0
quote 0
. -- malware. we will see more and more a.i. programmers creating bad programs. i worry about that with relationship to our energy grid. but i read the guys who want to stop the a.i. smart enough to create programs to outsmart the programs from those from a lot of money? i think it is possible. >> i may have misunderstood but you are looking for two types of safeguards? >> the a.i. community this is about interviews with a.i. developers. we want safeguards. >> but by definition the similarities are rapidly expanding intelligence? >> once you get the super intelligence yes. there is a group the machine intelligence research the is trying to have safe a.i. that those programs that creates the lead dna. that tries to learn lessons from the industrial process built in from the inception. right now and advanced cognitive architecture but we will put a condom on its. but you have to start from scratch. there is a book called normal accidents about the development in to learn a lesson for labatt -- from that and gets $20,000 in donations per year with the digit long das
. -- malware. we will see more and more a.i. programmers creating bad programs. i worry about that with relationship to our energy grid. but i read the guys who want to stop the a.i. smart enough to create programs to outsmart the programs from those from a lot of money? i think it is possible. >> i may have misunderstood but you are looking for two types of safeguards? >> the a.i. community this is about interviews with a.i. developers. we want safeguards. >> but by...
264
264
Mar 14, 2014
03/14
by
KQEH
tv
eye 264
favorite 0
quote 0
now say that a team of indian security experts working for the discount retailer and using a new malware detection tool alerted target about a possible data breach on november 30th but that officials blew off the warning that. same team found more evidence of a hack attack on december 2nd and again there was no action taken at corporate headquarters in minnesota for weeks to come. investors, however, did take notice today. they sent shares of target more than 2% lower. shares of fire eye up about 3% on this down day for stocks. >>> and here's another crucial security issue that poses big risks to the u.s. we could suffer a national blackout that could last for months if attackers knocked out the country's electric transmission substations. that warning came from a frightening new report from the government. so just how vulnerable is our electricity grid? eamon javers takes a look. >> reporter: a relatively small attack on u.s. electrical substations could render the country powerless for as long as 18 months. the u.s. government report was first revealed by the "wall street journal" this
now say that a team of indian security experts working for the discount retailer and using a new malware detection tool alerted target about a possible data breach on november 30th but that officials blew off the warning that. same team found more evidence of a hack attack on december 2nd and again there was no action taken at corporate headquarters in minnesota for weeks to come. investors, however, did take notice today. they sent shares of target more than 2% lower. shares of fire eye up...
118
118
Mar 27, 2014
03/14
by
KPIX
tv
eye 118
favorite 0
quote 0
. >> at some point, potential viruses and malware and things like that can start affecting xp. >> reporter: allen low runs a computer resorts program for the elderly and disabled in san francisco. he warns, don't ignore the warnings, upgrade now. >> we try to be reassuring. it isn't end of everything. there are options. >> reporter: but many of those options will cost you. you will either have to buy a new operating system or depending on the age of your machine, you may have to buy a new computer that can handle the new operating systems. but whatever you do, don't count on xp at least not for long. >> now is the time. stay more secure with -- >> reporter: you'll find more information about making the change on our website, kpix.com. click on "links and numbers." >> thank you. >> we have been warned. >>> a star-studded event at oakland's oracle arena is meant to inspire children to make a difference. it was free to get into me day. but really they all earned their tickets. they had to take part in a year long community service program. they got to see celebrities if they completed the pro
. >> at some point, potential viruses and malware and things like that can start affecting xp. >> reporter: allen low runs a computer resorts program for the elderly and disabled in san francisco. he warns, don't ignore the warnings, upgrade now. >> we try to be reassuring. it isn't end of everything. there are options. >> reporter: but many of those options will cost you. you will either have to buy a new operating system or depending on the age of your machine, you may...
120
120
Mar 26, 2014
03/14
by
WRC
tv
eye 120
favorite 0
quote 0
the report says there was no indication that the retailer responded to warnings that malware was being installed on its systems. target declined to comment ahead of the hearing. >>> mark your calendar. the national parks service will reopen finally the washington monument on monday, may 12th. the monument has been closed for repairs since the east coast earthquake caused major damage in 2011. those repairs cost $15 million. you can start making your tour reservations on line april 16th. go to nbcwashington.com, and search "washington monument" for more information on the extended hours. >>> a local emt received a special honor for his actions during the navy yard shooting. [ applause ] >> that is noah smith. he was one of two people from the department of transportation who stopped and helped a victim amid the chaos. last night the american ambulance association awarded him with the recognition of valor. the department of transportation is right next to the navy yard, and that building 197 where gunman aaron alexis shot and killed 12 people last september. >> of all the chaos, there we
the report says there was no indication that the retailer responded to warnings that malware was being installed on its systems. target declined to comment ahead of the hearing. >>> mark your calendar. the national parks service will reopen finally the washington monument on monday, may 12th. the monument has been closed for repairs since the east coast earthquake caused major damage in 2011. those repairs cost $15 million. you can start making your tour reservations on line april...
168
168
Mar 4, 2014
03/14
by
BLOOMBERG
tv
eye 168
favorite 0
quote 0
there is more targeted malware because of the growth in users of android.the biggest platforms out there, they both have their challenges. >> i wonder, fund the let -- fundamentally, when does the mcafee acquisition of intel show itself? we see intel with mcafee protection wired into it? >> the production of silicon, getting it into the industry, that was a slow process. the first couple of years was about running out of things that exist. now it is about designing products side-by-side to leverage security, like mcafee. operatingar the profits were zero. why intel is so excited about security. fast-growing, a highly profitable industry, that is definitely the propos kiss. >> do you think that operating profits from your division will increase? >> over the next couple of years security will become a bigger part of the picture overall. >> might i point out that intel brings down $.18 on the dollar to the dash to the bottom line? even if you are breaking even or at a loss, they are $.20 on the dollar. were the biggest security company when we were acquired ba
there is more targeted malware because of the growth in users of android.the biggest platforms out there, they both have their challenges. >> i wonder, fund the let -- fundamentally, when does the mcafee acquisition of intel show itself? we see intel with mcafee protection wired into it? >> the production of silicon, getting it into the industry, that was a slow process. the first couple of years was about running out of things that exist. now it is about designing products...
181
181
Mar 27, 2014
03/14
by
CSPAN2
tv
eye 181
favorite 0
quote 0
uploading photographs, but instead they uploaded this malware. wants they got into that website, they were able to pierce into central systems where they -- and they were actually coding in order to do that, and they were able to get to the directory of the management and find their passwords and then change the passwords in order to issue orders. so they downloaded 310,000 names, social security numbers, university ids. they intentionally left out photographs, so i support from that kind of thing because that would'vwould have slowed the exn of the data. and they did it using core from which means they're able to hide the point of origin of the attack. it turns out, because we never been hacked before, we were just flying by the seat of our pants. and it just so happens that we did exactly what you're bill proposes to do, with regard to notification. we simply said, we announced it within 24 hours. within 24 hours were also contacted credit rating agencies, set up call centers and notified the entire university community, all 38,000 student, all
uploading photographs, but instead they uploaded this malware. wants they got into that website, they were able to pierce into central systems where they -- and they were actually coding in order to do that, and they were able to get to the directory of the management and find their passwords and then change the passwords in order to issue orders. so they downloaded 310,000 names, social security numbers, university ids. they intentionally left out photographs, so i support from that kind of...
87
87
Mar 15, 2014
03/14
by
KCSM
tv
eye 87
favorite 0
quote 0
alleged nsa has said that the alleged nsa has infected millions of computers around the world with malware and the nsa is impersonating us social media or other websites are inaccurate and a state uses his technical capabilities on the to support lawful and appropriate foreign intelligence operations. all of which must be carried out in strict accordance with its authorities might say facebook says they knew nothing about it. marks out of it. however on his facebook page writes that he's been so confused and frustrated by the repeated reports of the behavior of the us government. i need goes on to say when facebook's engineers work tirelessly to improve security we imagined but protecting you against criminals not our own government. while many internet users now shaped chair mark zuckerberg is confusion. although it's not clear what they can do. if anything if they can do anything about it other than keeping their shirt on inside of their webcams home. now to chicago and big win for civil rights advocates there a state appeals court has ruled that the chicago police department can no long
alleged nsa has said that the alleged nsa has infected millions of computers around the world with malware and the nsa is impersonating us social media or other websites are inaccurate and a state uses his technical capabilities on the to support lawful and appropriate foreign intelligence operations. all of which must be carried out in strict accordance with its authorities might say facebook says they knew nothing about it. marks out of it. however on his facebook page writes that he's been...
116
116
Mar 13, 2014
03/14
by
BLOOMBERG
tv
eye 116
favorite 0
quote 0
it detects the malware the moment the hackers went in.hey send the alert to minneapolis and we asked target to respond specifically to the question, what happened? what we got back was a statement from the ceo -- they do not respond directly. >> while we are still in the midst of an ongoing investigation, we have taken significant steps, including be getting the overhaul of our information security structure and acceleration of our transition to chip enabled cards. however, as the investigation is not complete, we don't believe it is constructed to engage in speculation about the benefit of final analysis. >> when we came to them with everything we were reporting, they had nearly 100 lawsuits to protect themselves from. there is a limit to what they can respond to. we did ask them to participate in the story. they politely declined. it's hard to have any insight into what they have learned and how far they will go. >> for a hack to be this big and affect tens of millions of americans, you would think this would be very sophisticated. >> t
it detects the malware the moment the hackers went in.hey send the alert to minneapolis and we asked target to respond specifically to the question, what happened? what we got back was a statement from the ceo -- they do not respond directly. >> while we are still in the midst of an ongoing investigation, we have taken significant steps, including be getting the overhaul of our information security structure and acceleration of our transition to chip enabled cards. however, as the...
120
120
Mar 25, 2014
03/14
by
BLOOMBERG
tv
eye 120
favorite 0
quote 0
the biggest ticket item -- malware that attacks lesser-known software vulnerability. are made to order attacks. sometimes governments are the buyers. that was an interesting part of this report. there was one that targeted system.ios operating that one was interesting. and not just paying for the attacks, but people are being big bucks for the target attacks that we have talked so much about. those credit card numbers went for a big amount. it initially went from anywhere 100 $35.to with these large-scale data thefts, they only happen once every three years. that is a supply and demand issue. as the market became flooded by credit card numbers, the price of that data went down. pretty interesting stuff. >> bloomberg's washington correspondent, megan hughes joining us. megan, thanks. coming up, our roundtable discussion on the u.s. economy, the federal reserve, and a lot more when "bottom line" continues. ♪ >> we turn our focus now to the u.s. economy. consumer confidence in march line to its size level in six years. could this be a signal for stronger economic growth
the biggest ticket item -- malware that attacks lesser-known software vulnerability. are made to order attacks. sometimes governments are the buyers. that was an interesting part of this report. there was one that targeted system.ios operating that one was interesting. and not just paying for the attacks, but people are being big bucks for the target attacks that we have talked so much about. those credit card numbers went for a big amount. it initially went from anywhere 100 $35.to with these...
194
194
Mar 15, 2014
03/14
by
KTVU
tv
eye 194
favorite 0
quote 0
yesterday they broke the news that target security software defected the malware on november 30 but target security teams did not act on it. >>> our chief meteorologist is off, mark filling in. what can you say, great weather? >> yeah. temperatures trending up. this weekend will be the last weekend of winter because spring begins on thursday and weekend temperatures, you will notice the warm up tomorrow. temperatures today we cooled off with more clouds. santa rosa 76. san jose 71. oakland 70. san francisco warmed up to 66 degrees. on live storm tracker 2, clouds moving across the bay area. right now we are in the clear. we could have a patch or two of fog near the immediate coast line over night but we are expecting clear skies. 73 degrees in fairfield. hayward 65. san jose lower 70s. a chill towards half moon bay, upper 50s. 57 degrees. tonight we have clear skies out there. a breeze with winds around teen 15 miles per hour. looking towards alcatraz, golden gate bridge, sunny and warm. next week sun and clouds. temperatures trending down. st. patrick's day fraid in san francisco -- parad
yesterday they broke the news that target security software defected the malware on november 30 but target security teams did not act on it. >>> our chief meteorologist is off, mark filling in. what can you say, great weather? >> yeah. temperatures trending up. this weekend will be the last weekend of winter because spring begins on thursday and weekend temperatures, you will notice the warm up tomorrow. temperatures today we cooled off with more clouds. santa rosa 76. san jose...
259
259
Mar 13, 2014
03/14
by
KRON
tv
eye 259
favorite 0
quote 0
it has the very latest again somagainst malware. an incoming call you have a cleaner look for accepting or declining the call. siri received a major enhancement. it would automatically recognize when you spot but now it would pick up words that you did not want it to. this change make sure questions more precise. for parents, if you do not want your kids to rack up purchases, you can now change the restrictions and the settings. this will require a password to be entered every time. if you do not change the setting, the default setting is that after the password is entered for one, there has been is 15 minute grace. were any purchases can take place. so, kids could purchase 15 minutes worth of stuff. >> this next one, is a small change to one that i like. you can go to the keyboard on your device and you can go to the text of the too tight. on the left, the default settings but on the right, this is the new bold options. i know this seems so small but it really helps it pop out. the updates takes about 10 minutes, you could find the
it has the very latest again somagainst malware. an incoming call you have a cleaner look for accepting or declining the call. siri received a major enhancement. it would automatically recognize when you spot but now it would pick up words that you did not want it to. this change make sure questions more precise. for parents, if you do not want your kids to rack up purchases, you can now change the restrictions and the settings. this will require a password to be entered every time. if you do...
482
482
Mar 13, 2014
03/14
by
KPIX
tv
eye 482
favorite 0
quote 0
it suggests that the software worked, it detected this malware and the company didn't respond.e they were trying to hide something? >> that's the big question. i don't think there is evidence that they were trying to hide something because the the federal government is the ones that went to target two weeks later and said we have information that there is a massive data leak and we can see them on staging servers. >> they didn't even know they were breached. >> with their own system, they did not know they had been breached. >> they did the right thing and then everything went wrong after that. >> correct. >> most retailers just don't even have this kind of system. >> that's right. most of the time, target has 1800 stores in the u.s. and think about how many cash points there are in those stores and think about all of those access points online so most don't go through the trouble. >> what's the fallout for target? >> they were down 46% in profits in the holiday shopping period from the year before so it's huge. customers, we're all pretty used to the era of cyber crime. so cus
it suggests that the software worked, it detected this malware and the company didn't respond.e they were trying to hide something? >> that's the big question. i don't think there is evidence that they were trying to hide something because the the federal government is the ones that went to target two weeks later and said we have information that there is a massive data leak and we can see them on staging servers. >> they didn't even know they were breached. >> with their own...
64
64
Mar 27, 2014
03/14
by
CSPAN2
tv
eye 64
favorite 0
quote 0
a piece of legislation designed to do that so the federal government could create a data base of malware? i use norton on my miserable windows system but whenever i turn on the computer the first thing i do is operate the one dash open the operating system. chairman rogers legislation was designed to sell businesses could log on to the central data base to update the awareness of malware attacks then protection. does that ring a bell? >> there are some broad cyberlegislation to allow private companies to share data how they have been attacked and what they need to look for so what can benefit for the signatures. >> just like we do with their own personal. >> has not passed yet. >> we did that last year. maybe not the senate? >> that might be right. >> and if think it was critical infrastructure there are a
a piece of legislation designed to do that so the federal government could create a data base of malware? i use norton on my miserable windows system but whenever i turn on the computer the first thing i do is operate the one dash open the operating system. chairman rogers legislation was designed to sell businesses could log on to the central data base to update the awareness of malware attacks then protection. does that ring a bell? >> there are some broad cyberlegislation to allow...
232
232
Mar 20, 2014
03/14
by
FBC
tv
eye 232
favorite 0
quote 0
california leads the nation in computer systems hacked or infected by malware.ip dealerships and sell directly to customers. they are opposed to this bill a common theme, but a side story, arizona is one of four states fine for lithium-ion battery factory that was supplying the main california plant. mark cuban taking a swipe at silicon valley. in a lengthy blog post dallas mavericks owner says silicon valley has become too much like hollywood in the tv industry. no one wants to start something in a garage and build it, they are looking past the pitch to the next of capital. translation, it is all about the money, not the ideas. adam: jobs did it well. existing home sales falling flat hitting in a 19 month low. they blame the weather. but it is more than that. cheryl: one, two, three. and you are out at the old all game. a nightmare about one week to go until opening day. it's a growing trend in business: do more with less with ss energy.hp is help. soon, the world's most intelligent servers, designed by hp, will give ups over twice the performance, using forty
california leads the nation in computer systems hacked or infected by malware.ip dealerships and sell directly to customers. they are opposed to this bill a common theme, but a side story, arizona is one of four states fine for lithium-ion battery factory that was supplying the main california plant. mark cuban taking a swipe at silicon valley. in a lengthy blog post dallas mavericks owner says silicon valley has become too much like hollywood in the tv industry. no one wants to start something...
432
432
tv
eye 432
favorite 0
quote 0
. >>> a new study on computer viruses says pornography is no longer leading source of malware on mobilesecurity form blue coat hackers are more likely to use mobile ads to affect your smartphone than poor. the report said malicious ads made up 20% of attacks on smart phones from a whopping 20% in 2012. poor porn is responsible for 16%. the best thing to do is avoid vehicling on ads. >>> oakland raiders appear to be on the short list, usa sports report oakland raiders with o.co lease ends after 2014 season and the season of portland is waiting to just pounce on it as an opportunity. fans are petitioning the governor, who are on change.org to pursue the possibility. no specific team is named in the petition but it does ask the question, the oregon raiders? >> that doesn't sound right. >> portland raiders. so far 2,000 people signed it. >> they can stay here. trading under way on wall street. lets take a live look at the big board. you can see the dow up 61 points so far. >>> staples says it will close 225 stores by the end of next year as part of a plan to cut costs by $500 million. stapl
. >>> a new study on computer viruses says pornography is no longer leading source of malware on mobilesecurity form blue coat hackers are more likely to use mobile ads to affect your smartphone than poor. the report said malicious ads made up 20% of attacks on smart phones from a whopping 20% in 2012. poor porn is responsible for 16%. the best thing to do is avoid vehicling on ads. >>> oakland raiders appear to be on the short list, usa sports report oakland raiders with o.co...
68
68
Mar 20, 2014
03/14
by
CSPAN2
tv
eye 68
favorite 0
quote 0
for example every single second nine new pieces of malware, software designed to cause computer problems are discovered every second. nine every second. 97% of fortune 500 companies know that they have been hacked and the other 3% are willing to admit it to themselves. on the military side over 100 different nations have created some kind of cybermilitary command, a unit designed to fight wars in the space and beyond. indeed the very first pew poll of 2014 took a survey of americans about what they have feared most and it found that they feared cyberattacks more than iranian nuclear weapons, north korea and nuclear weapons, the rise of china, russia or climate change. what this means is the spheres of coalesced into a booming industry. one of the fastest growing bureaucracies where they were talking about the national level, the state level or the local level is constantly seen growth in the cybersecurity bureaucracies. they also mean for all the hope and promise of the digital age we also have to admit we are living through an air of what i would call cyber insecurity. it's at this poin
for example every single second nine new pieces of malware, software designed to cause computer problems are discovered every second. nine every second. 97% of fortune 500 companies know that they have been hacked and the other 3% are willing to admit it to themselves. on the military side over 100 different nations have created some kind of cybermilitary command, a unit designed to fight wars in the space and beyond. indeed the very first pew poll of 2014 took a survey of americans about what...
261
261
Mar 14, 2014
03/14
by
KTVU
tv
eye 261
favorite 0
quote 0
the report stated that the national security agency used phony facebook servers to install malware on computers and install information. zuckerberg said he phoned the president wednesday night telling president obama he was "frustrated over the damage the government is creating for all of our future." >>> it may soon be a lot easier to pass the time on those long flights. united will begin offering free tv shows and movies next month. the content can be streamed to laptops, tablets and smart phones. many airlines, including virgin american, already offer an in- flight tv. >>> connecting police with b.a.r.t. passengers. the new project involving smart phones aimed at -- that will have riders help keep the peace. >> reporter: an airline that started operating out of san jose less than a year ago will stop offering flights. we'll tell you which carrier and what we're learning from employees. >>> i don't want to jinx it but traffic looking pretty good on this friday morning as we take a look at 237 in milpitas. we'll also tell ulabout the contra costa county -- you about the contra costa
the report stated that the national security agency used phony facebook servers to install malware on computers and install information. zuckerberg said he phoned the president wednesday night telling president obama he was "frustrated over the damage the government is creating for all of our future." >>> it may soon be a lot easier to pass the time on those long flights. united will begin offering free tv shows and movies next month. the content can be streamed to laptops,...
169
169
Mar 7, 2014
03/14
by
KTVU
tv
eye 169
favorite 0
quote 0
they do malware protection products. >> all right. we will smile and say good morning to you.ou for joining us on ktvu channel 2 morning news. it's friday, pam. march 7th i'm dave clark. >> good morning, i'm pam cook. 6:30 is the time. you know sometimes -- unfortunately when we make mistakes other people are watching. >> yeah there is no delay. by the way storm chasers when they see a tornado they call them natters. you were just doing a weather toss. >> okay good it is a word. >> don't forget we spring forward. that is right. right into your tv there. spring forward on sunday mornings. expect for patchy fog and a few high clouds it will be a beautiful day. just had a couple great pictures sent in. from twitter. 34 degrees up there. so there are some 30s to the north. a lot of 40s here. so a little chill in the morning air. getting a break from any rain. next hint would be sunday to the north. not much here. mostly sunny today. chilly morning. some clouds. hanging out toward san jose. a lot of 60s here to near 70. here is sal. >>> all right, steve. we are still looking at a c
they do malware protection products. >> all right. we will smile and say good morning to you.ou for joining us on ktvu channel 2 morning news. it's friday, pam. march 7th i'm dave clark. >> good morning, i'm pam cook. 6:30 is the time. you know sometimes -- unfortunately when we make mistakes other people are watching. >> yeah there is no delay. by the way storm chasers when they see a tornado they call them natters. you were just doing a weather toss. >> okay good it is...
148
148
Mar 17, 2014
03/14
by
LINKTV
tv
eye 148
favorite 0
quote 0
by making them automated so there's less human oversight, so it is completely unclear to what the malwares being overseen, the legal from work that operate in. to comment.declined these are vital questions that should be asked. >> and the nsa's response to your report? most of the recent reports, there've been putting out a boilerplate statement that says they adhere to the law and that they only collect intelligence for legitimate purposes. but the statements are very, very vague. they're open to anyone's interpretation of what they actually mean. i think what we really need is some clear answers and more transparency on a lot of the revelations that we've been reporting in the last couple of weeks. >> ryan gallagher, thank you for being with us. we will have a link to her pieces that the intercept >> coming up on "california country": think this sweet treat just can't get any better? think again. >> oh, my! it's ready. >> it's ready? >> it's ready. >> then find out why this meal was 52 weeks in the making. >> i would like you to know that this morning at the farmers' market, we purchase
by making them automated so there's less human oversight, so it is completely unclear to what the malwares being overseen, the legal from work that operate in. to comment.declined these are vital questions that should be asked. >> and the nsa's response to your report? most of the recent reports, there've been putting out a boilerplate statement that says they adhere to the law and that they only collect intelligence for legitimate purposes. but the statements are very, very vague....
97
97
Mar 20, 2014
03/14
by
CSPAN2
tv
eye 97
favorite 0
quote 0
for example every single second nine new pieces of malware, software designed to cause computer problems are discovered every second. nine every second. 97% of fortune 500 companies know that they have been hacked and the other 3% are willing to admit it to themselves. on the military side over 100 different nations have created some kind of cybermilitary command, a unit designed to fight wars in the space and beyond. indeed the very first pew poll of 2014 took a survey of americans about what they have feared most and it found that they feared cyberattacks more than iranian nuclear weapons, north korea and nuclear weapons, the rise of china, russia or climate change. what this means is the spheres of coalesced into a booming industry. one of the fastest growing bureaucracies where they were talking about the national level, the state level or the local level is constantly seen growth in the cybersecurity bureaucracies. they also mean for all the hope and promise of the digital age we also have to admit we are living through an air of what i would call cyber insecurity. it's at this poin
for example every single second nine new pieces of malware, software designed to cause computer problems are discovered every second. nine every second. 97% of fortune 500 companies know that they have been hacked and the other 3% are willing to admit it to themselves. on the military side over 100 different nations have created some kind of cybermilitary command, a unit designed to fight wars in the space and beyond. indeed the very first pew poll of 2014 took a survey of americans about what...
40
40
tv
eye 40
favorite 0
quote 0
to infect your computer millions of people allegedly affected by go online spy again log on to our malware free web site. the whole story is there for you and while you're there. this story as well the trade between the u.s. and e.u. is under threat due to the reluctance of europeans to buy genetically modified food from the u.s. those details are also on the website right now. or for the meantime here on the program there are four more days of gold rush for the winter paralympics team russia though has already crushed its previous records in fact are the hosts already now currently boasting a total of forty seven medals already nine more than their record breaking the hole that was in. that includes sixteen golds leaving second place germany already rather far behind so it looks like a possible double triumph for russia on home soil with the paralympians doing even better than their a pic counterparts who also finished on top of the medal table last. all right coming up here on r.t. international more news in about half an hour's time from now though i'm stepping aside aaron aid and boom
to infect your computer millions of people allegedly affected by go online spy again log on to our malware free web site. the whole story is there for you and while you're there. this story as well the trade between the u.s. and e.u. is under threat due to the reluctance of europeans to buy genetically modified food from the u.s. those details are also on the website right now. or for the meantime here on the program there are four more days of gold rush for the winter paralympics team russia...