The Upload: Your tech news briefing for Thursday, February 26

Lenovo's website hack points to DNS weakness ... FTC asked to probe Samsung ... Facebook vet starts server analytics biz ... and more

Lenovo's home page appears to have been hacked

Lenovo's home page appears to have been hacked

Lenovo's defaced website points to weakness in Net domain name system

Some hackers took Lenovo's corporate web address for a joyride on Wednesday, redirecting traffic to a video stream showing an apparently bored teen sitting in his bedroom. The prank, like the hijacking of Google's Vietnam site recently, highlights continued weakness in the Internet's Domain Name System, which translates web site names into IP addresses.

Samsung gets more woe over eavesdropping TVs

The fuss over data collected by voice-operated TVs made by Samsung Electronics is not going away, despite its efforts to minimize the issue. Now the Electronic Privacy Information center is asking the U.S. Federal Trade Commission to investigate, in a complaint that says Samsung has violated federal law.

Former Facebooker launches server management startup

Facebook is famous for the advanced data centers that keep its global social network humming. Now one of its former engineers, Amir Michael, who also helped start Facebook's Open Compute Project, has cofounded Coolan. The startup Wednesday launched a "community analytics" service that companies can use to predict failures and prevent outages.

Massive botnet taken down by European law enforcers and security vendors

European law enforcement agencies have seized command-and-control servers used by Ramnit, a malware program that steals online banking credentials, FTP passwords, session cookies and personal files. It infected over 3.2 million computers over five years. Symantec, Microsoft and AnubisNetworks assisted Europol and law enforcement investigators from several countries in disrupting the cyberinfrastructure that was controlling the Ramnit botnet.

First up for HP's IoT platform: energy management

Hewlett-Packard has rolled out the first product built on its platform for Internet of Things implementations, targeting energy companies that want to fine-tune efficiency in power production and use. The HP Energy Management Pack is a combination of software and services for building systems that energy companies could use for monitoring, device management, security and analytics. Coming later for the HP IoT platform are packages for industries such as transportation and health care.

China drops Cisco, other foreign vendors from approved list

China has slashed the number of foreign-made tech products approved for purchase by government entities in a move that particularly hurt Cisco Systems, which has seen all of its wares dropped from an official list, Reuters reports. Also gone are Apple, Intel's McAfee division, and Citrix Systems. Overall, the list contains one-third fewer foreign brands.

Google said to ready payments API

Google is planning to introduce a new API for payments called Android Pay at its I/O conference in May, Ars Technica reported, citing unnamed sources. It's meant to let developers add a mobile payment option to apps, and also to enable tap-to-pay transactions in stores.

Watch now

Three Austrian men had their paralyzed hands replaced with nerve-controlled robotic prostheses.

One last thing

Humanity can close up shop now: An artificial intelligence network developed by researchers at Google-owned DeepMind can teach itself to play classic Atari video games.

Join the CSO newsletter!

Error: Please check your email address.

Tags Citrix SystemssoftwareLenovoCoolaninternetHewlett-PackardFacebookCisco SystemsGoogleMicrosoftsecuritySamsung ElectronicsAnubisNetworks

More about AppleCiscoEuropolFacebookFederal Trade CommissionGoogleHPIntelLenovoMicrosoftSamsungSymantec

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by IDG News Service staff

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place