tomorrow'snews today! and info...

Welcome to Dteo.net!

We continually search the net and find the latest breaking information and articles and list them here for you!

Find out what is "Trending now", the latest news for Technology, Celebrities, World News, and more! We have hundreds of thousands of pages of articles all updated with the latest content. If you don't see the article readily available, just perform a simple search and you will be able to find everything you need.


PayPal signs "ten of thousands" customers in Nigerian launch

Onasanya, managing director of First Bank of Nigeria, and Dahan, PayPal's regional director of Israel and Africa shake hands at the announcement of a partnership between First Bank of Nigeria and PayPal, in LagosBy Chijioke Ohuocha LAGOS (Reuters) - PayPal has signed up "tens of thousand" of Nigerians in its first week of operating in Africa's biggest economy, with consumers already purchasing items from Britain, China and the United States via its online platform, a company official said. E-commerce remains in its infancy in most of Africa but is growing exponentially with the advent of online retailers such as Jumia, partly owned by South African phone operator MTN, and a growing middle class with money to spend. ...



AP source: Thieves got into 1K StubHub accounts
NEW YORK (AP) — Cyber thieves got into more than 1,000 StubHub customers' accounts and fraudulently bought tickets for events through the online ticket reseller, a law enforcement official and the company said.
StubHub was victim of cyber fraud ring; arrests to be announced
By Deepa Seetharaman and Jim Finkle SEATTLE/BOSTON (Reuters) - eBay Inc's StubHub online ticket resale service said it was the victim of a massive international cyber fraud ring, the details of which authorities plan to disclose on Wednesday as they announce arrests in the case. StubHub's head of global communications, Glenn Lehrman, told Reuters late on Tuesday that his firm has been working with law enforcement around the world for the last year on the case. Lehrman said he could not say how much money was involved or how many people were being charged ahead of announcements planned by authorities in several countries on Wednesday. Fraudulent charges were posted after hackers obtained user credentials by hacking into other sites, then used them to log in StubHub, he said.
Integrating Into the 'Internet of Things' (Op-Ed)

Integrating Into the 'Internet of Things' (Op-Ed)Kevin Curran is a reader in Computer Science at the University of Ulster and an IEEE Senior Member. The Internet of Things  (IoT) will allow consumers to interact with nearly every appliance and device they own. We are seeing elements of the IoT in the marketplace already, with home automation having a strong consumer pull — controlling the lights and temperature, closing the garage door while across town, getting alerts from a smoke detector. If IoT is campaigning to run nearly every aspect of people's digital lives, we need to consider factors that will ensure a seamless and safe introduction.



China's Xiaomi hopes Mi 4 smartphone can take on Apple

Lei Jun, founder and CEO of China's mobile company Xiaomi, shows new features at launch ceremony of Xiaomi Phone 4 in BeijingXiaomi launched its flagship Mi 4 smartphone at a glitzy event in Beijing, where the Chinese budget handset maker's chief executive sought to challenge larger U.S. rival Apple Inc. The Mi 4 comes as budget handset makers in China are competing more aggressively on price and generous features, with even high-end manufacturers feeling the pressure. Dressed in a black T-shirt and blue jeans, Xiaomi CEO Lei Jun took aim repeatedly at iPhone maker Apple during the presentation on Tuesday, comparing the design and manufacturing process of his new 4G handset to the U.S. firm's more expensive offerings. "Even our white color is whiter!" Apple, which was due to announce second-quarter earnings later on Tuesday, was not immediately available to comment. The forthright Jun spent nearly an hour on stage describing the Mi 4 phone's construction - particularly its beveled metal rim whose similarity with Apple's phones drew murmurs of "iPhone" from the journalists at the event.



Apple denies having included a backdoor in iOS or other products

Apple denies having included a backdoor in iOS or other productsAn extensive research paper from a security specialist revealed earlier this week that governments and other third-parties with malicious intentions would be able to use certain tools in iOS to extract information from iPhones and other iOS devices, without the user’s consent or knowledge. Apple has already issued a response on the matter, denying the existence of backdoors in its products, and further emphasizing the security and privacy features of iOS. “We have designed iOS so that its diagnostic functions do not compromise user privacy and security, but still provides needed information to enterprise IT departments, developers and Apple for troubleshooting technical issues,” Apple wrote in an email statement that was published on Twitter by Financial Times journalist Tim Bradshaw.



Fund managers unconvinced by Apple rebound

The leaf on the Apple symbol is tinted green at the Apple flagship store on 5th Ave in New YorkBy David Randall and Edwin Chan NEW YORK/SAN FRANCISCO (Reuters) - Apple, once a can't-miss stock, is finding it tough to persuade portfolio managers to come back into the fold. Yet the company remains one of the most significantly underweighted stocks among large cap fund managers, according to a Goldman Sachs report. Part of the reason for a lack of portfolio manager enthusiasm is that Apple Inc no longer seems to be the hot growth company of old, fund managers say. Apple reports results for its fiscal third quarter on Tuesday, July 22.



Fund managers unconvinced by Apple rebound as firm readies results

The Apple logo is pictured at a retail store in the Marina neighborhood in San FranciscoBy David Randall and Edwin Chan NEW YORK/SAN FRANCISCO (Reuters) - Apple, once a can't-miss stock, is finding it tough to persuade portfolio managers to come back into the fold. Yet the company remains one of the most significantly underweighted stocks among large cap fund managers, according to a Goldman Sachs report. Part of the reason for a lack of portfolio manager enthusiasm is that Apple Inc no longer seems to be the hot growth company of old, fund managers say. Apple reports results for its fiscal third quarter on Tuesday, July 22.



Hacking talks axed over the years
(Reuters) - A highly anticipated talk on how to identify users of the Tor service, widely used to access the Internet anonymously, has been withdrawn from next month's annual Black Hat security conference. Hacking experts disclose vulnerabilities at conferences to alert the public about security flaws, both to pressure developers to fix them and to warn users about products that may not be completely safe. Here are some examples of other hacking talks that have been pulled from conferences over the past decade: 2013 - Three European computer scientists canceled a talk on hacking the locks of luxury cars at a prestigious U.S. academic conference known as USENIX, after Volkswagen AG obtained a restraining order from a British court. 2007 - Security firm IOActive Inc pulled a talk at Black Hat DC on bugs in radio-frequency identification, or RFID, technology, saying it was pressured to do so by RFID technology firm HID Global Corp. 2005 - Cisco Systems Inc persuaded security firm Internet Security Systems to pull a discussion on hacking routers by researcher Michael Lynn at the Black Hat hacking conference in Las Vegas.
Security researcher: iOS security has been intentionally compromised by Apple

Security researcher: iOS security has been intentionally compromised by AppleApple’s placing a lot of emphasis on iOS security (especially when compared with that “toxic hellstew” Android) and on privacy (again, compared to its rival) but it turns out that iOS might not be as secure or private as Apple has led customers to believe. Security researcher Jonathan Zdziarski has a new paper out called “Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices,” in which he reveals Apple’s complex tools inside iOS that would allow Apple to share certain user data at the request of law enforcement without the user knowledge. More importantly, with or without Apple’s help, spying agencies such as NSA and other third parties that are very familiar with how iOS operates can apparently use these vulnerabilities to grab plenty



Kenya military Twitter account hacked
The Twitter account run by Kenya's military was taken over by hackers claiming to be from the international activist collective Anonymous, a military spokesman said Monday No internal military systems ...
Huawei's H1 revenue up 19 percent year-on-year at $22 billion

A man walks past a Huawei company logo outside the entrance of a Huawei office in Wuhan, Hubei provinceHuawei Technologies Co Ltd, the world's No. 2 telecom equipment maker, said on Monday it will achieve sustainable growth in 2014 after posting a 19 percent jump in first-half revenue to 135.8 billion yuan ($21.88 billion). "Driven by increasing investments in LTE networks worldwide, Huawei has further solidified its leadership position in mobile broadband," Huawei's CFO Cathy Meng said in the statement. "Rapid growth in software and services helped maintain steady growth in our carrier network business." Meng said Huawei achieved "sustainable growth" in its consumer business, which includes smartphone manufacturing, thanks to better brand awareness.



Snowden seeks to develop anti-surveillance technologies

Accused government whistleblower Snowden is seen on a screen as he speaks via videoconference with members of the Committee on legal Affairs and Human Rights of the Parliamentary Assembly of the Council of Europe in StrasbourgBy Jim Finkle NEW YORK (Reuters) - Edward Snowden, a former U.S. spy agency contractor who leaked details of major U.S. surveillance programs, called on supporters at a hacking conference to spur development of easy-to-use technologies to subvert government surveillance programs around the globe.  Snowden, who addressed conference attendees on Saturday via video link from Moscow, said he intends to devote much of his time to promoting such technologies, including ones that allow people to communicate anonymously and encrypt their messages. He escaped the United States after leaking documents that detailed massive U.S. surveillance programs at home and abroad - revelations that outraged some Americans and sparked protests from countries around the globe. At the HOPE hacking conference, several talks detailed approaches for thwarting government surveillance, including a system known as SecureDrop that is designed to allow people to anonymously leak documents to journalists. The conference featured about 100 presentations on topics ranging from surveillance to hacking elevators and home routers.



Golf-Blood spilt as Els says he put 'jinx' on his group

Ernie Els of South Africa walks off after finishing his first round of the British Open Championship at the Royal Liverpool Golf Club in HoylakeBy Martyn Herman HOYLAKE England (Reuters) - Ernie Els left a spectator bloodied with a wild opening tee shot, defending champion Phil Mickelson went out of bounds, and Bubba Watson's promising start was blown away at the British Open on Thursday. Double Open champion Els went round in 79 after being visibly shaken by the bloody aftermath of an errant drive at the first and then missing two tiddlers on the green, one with a casual back-handed putt usually reserved for park hackers.



Hackers target Nest as a warning to Google about data-sharing
If you ask Nest about sharing data with its new owner, the company will say that advertising isn’t part of its business model and that it plans to protect the privacy of its customers from Google. Nest will have to share some data with Google and others in order to enable automatic home-related features, but it is not supposed to lead to Google targeting users with even more ads than it currently does. To make sure Google won’t someday spam Nest owners with ads, a group of hackers plans to take preemptive action against Google and Nest, Forbes reports. Researchers from the University of Central Florida have found a vulnerability they can exploit in order to stop Nest thermostats from sending data to
Hackers target Nest in as a warning to Google about data-sharing
If you ask Nest about sharing data with its new owner, the company will say that advertising isn’t part of its business model and that it plans to protect the privacy of its customers from Google. Nest will have to share some data with Google and others in order to enable automatic home-related features, but it is not supposed to lead to Google targeting users with even more ads than it currently does. To make sure Google won’t someday spam Nest owners with ads, a group of hackers plans to take preemptive action against Google and Nest, Forbes reports. Researchers from the University of Central Florida have found a vulnerability they can exploit in order to stop Nest thermostats from sending data to
Blood spilt as Els says he put 'jinx' on his group
By Martyn Herman HOYLAKE England (Reuters) - Ernie Els left a spectator bloodied with a wild opening tee shot, defending champion Phil Mickelson went out of bounds, and Bubba Watson's promising start was blown away at the British Open on Thursday. Double Open champion Els went round in 79 after being visibly shaken by the bloody aftermath of an errant drive at the first and then missing two tiddlers on the green, one with a casual back-handed putt usually reserved for park hackers.
These are the absurd names British intelligence spies have to remember to spy on you

These are the absurd names British intelligence spies have to remember to spy on youIn case you didn’t know it by now, spy agencies are really good – and hopefully effective – at spying on people, including both actual valid targets as well as unsuspecting citizens who aren’t plotting anything bigger than a trip to an exotic country. To further demonstrate the power of one such agency – NSA’s close buddy, the British GCHQ, in this case – The Intercept has published a new Snowden leak, which reveals such ambitious mass spying plans, as well as their silly names. “The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and



'Smart' technology could make utilities more vulnerable to hackers
By Christoph Steitz and Harro Ten Wolde FRANKFURT (Reuters) - Last November, Felix Lindner came very close to shutting down the power supply of Ettlingen, a town of almost 40,000 people in the south of Germany. "We could have switched off everything: power, water, gas," Lindner, head of Berlin-based Recurity Labs, an IT security company, said. Fortunately for residents, Lindner's cyber attack on its energy utility, Stadtwerke Ettlingen, was simulated. "The experiment has shown that sensitive, critical infrastructure is not sufficiently protected," said Eberhard Oehler, managing director of the utility, Stadtwerke Ettlingen.
Apple, IBM team up in mobile devices, applications
CUPERTINO, Calif. (AP) — Apple is teaming up with former nemesis IBM in an attempt to sell more iPhones and iPads to corporate customers and government agencies.
Insurers struggle to get grip on burgeoning cyber risk market

A lock icon, signifying an encrypted Internet connection, is seen on an Internet Explorer browser in ParisHigh profile cases of hackers seizing sensitive customer data from companies, such as U.S. retailer Target Corp or e-commerce company eBay Inc, have executives checking their insurance policies. Increasingly, corporate risk managers are seeing insurance against cyber crime as necessary budget spending rather than just nice to have. The insurance broking arm of Marsh & McLennan Companies estimates the U.S cyber insurance market was worth $1 billion last year in gross written premiums and could reach as much as $2 billion this year. The European market is currently a fraction of that, at around $150 million, but is growing by 50 to 100 percent annually, according to Marsh.



FBI cyber expert is ex-discount furniture salesman

FBI Supervisory Special Agent J. Keith MularskiPITTSBURGH (AP) — J. Keith Mularski's world has expanded greatly since he stopped selling discount furniture to join the FBI in 1998. Now recognized as a foremost expert on cybercrime, Mularski's profile has risen since the U.S. Justice Department used Mularski's sleuthing to bring two indictments with worldwide ramifications.



Chinese man accused of hacking into US computers
SAN DIEGO (AP) — U.S. authorities have charged a Chinese businessman with hacking into the computer systems of U.S. companies with large defense contracts, including Boeing, to steal data on military projects, including some of the latest fighter jets, officials said Friday.
Microsoft says cybercrime bust frees 4.7 million infected PCs

The Microsoft logo is seen at their offices in BucharestBy Jim Finkle BOSTON (Reuters) - Microsoft Corp said it has freed at least 4.7 million infected personal computers from control of cyber crooks in its most successful digital crime-busting operation, which interrupted service at an Internet-services firm last week. The world's largest software maker has also identified at least another 4.7 million infected machines, though many are likely still controlled by cyber fraudsters, Microsoft's cybercrime-fighting Digital Crimes Unit said on Thursday. Richard Domingues Boscovich, assistant general counsel of the unit, said Microsoft would quickly provide government authorities and Internet service providers around the world with the IP addresses of infected machines so they can help users remove the viruses. "Those victims are currently not aware they are infected," Boscovich said in an interview.



Beijing Security Conference Offers $10,000 Bounty for Tesla Hack

Beijing Security Conference Offers $10,000 Bounty for Tesla HackThe Symposium on Security for Asia Network (SyScan), a security conference in Beijing, is asking attendees to try their hand at hacking into a Tesla car. The conference will be full of security experts and if one of them succeeds at cracking Tesla's code, they will walk away with $10,000. The conference takes place next Wednesday and Thursday, so participants have time to prepare their hacking tactics.  John Pescatore, director for emerging security trends at The SANS Institute, told Fox News, "They have a good security reputation mainly because nobody has pounded on them yet." 



Report: Chinese hackers hit US personnel networks

Secretary of State John Kerry, left, meets with Chinese President Xi JinpingWASHINGTON (AP) — Chinese hackers broke into the computer networks of the Office of Personnel Management earlier this year with the intention of accessing the files of tens of thousands of federal employees who had applied for top-secret security clearances, according to The New York Times.



Symantec in talks with Chinese government after software ban report
By Jim Finkle BOSTON (Reuters) - U.S. security software maker Symantec Corp said it is holding discussions with authorities in Beijing after a state-controlled Chinese newspaper reported that the Ministry of Public Security had banned use of one of its products. The China Daily reported last week that the ministry had issued an order to its branches across the nation telling them to uninstall Symantec's data loss prevention, or DLP, products from their systems and banning their future purchase, saying the software "could pose information risks." (http://bit.ly/1okVF3v)The vaguely worded report did not explain why the ministry believed Symantec's software presented a security threat. Symantec is the latest large U.S. technology company to encounter challenges in China since last year when former National Security Agency contractor Edward Snowden began leaking details about U.S. surveillance programs.
Chinese hackers pursue key data on U.S. workers: NYT

An analyst looks at code in the malware lab of a cyber security defense lab at the Idaho National Laboratory(Reuters) - Chinese hackers broke into the computer networks of the U.S. government agency that keeps the personal information of all federal employees in March, the New York Times reported, citing senior U.S. officials. The hackers appeared to be targeting files on tens of thousands of employees who have applied for top-secret security clearances, the newspaper said.



US, China talk cyberhacking amid new allegations

US, China talk cyberhacking amid new allegationsTop American officials said Thursday they challenged their counterparts in China to rein in alleged cybersecurity infringements as a new allegation emerged of a brazen attempt by Chinese hackers to break ...



China, U.S. to boost security ties, but no breakthroughs

U.S. Secretary of State John Kerry talks with China's President Xi Jinping at the Great Hall of the People in BeijingBy Lesley Wroughton and Michael Martina BEIJING (Reuters) - China and the United States agreed on Thursday to boost military ties and counter-terrorism cooperation during high-level annual talks in Beijing, but there was little immediate sign of progress on thorny cyber-security or maritime issues. The two-day talks, led by Secretary of State John Kerry and Treasury Secretary Jack Lew for the United States and Vice Premier Wang Yang and top diplomat Yang Jiechi for China, were never expected to achieve great breakthroughs. After discussions on topics ranging from the value of China's currency to North Korea, Yang said the two sides agreed to strengthen cooperation in counter-terrorism, law enforcement and military-to-military relations. On two of the most sensitive issues - maritime disputes and cyber-spying - Yang largely restated Beijing's position on both.



Philippines nabs Taiwanese, Chinese linked to scam
Philippine police arrested 44 foreigners who allegedly ran an online blackmail syndicate that defrauded victims in China and Taiwan by duping them into believing that their bank accounts have been used ...
Philippines arrests Taiwanese in alleged bank scam
MANILA, Philippines (AP) — Philippine police arrested 44 Taiwanese who allegedly ran an online blackmail syndicate that defrauded victims in China and Taiwan by duping them into believing that their bank accounts have been used by money launderers or terrorists, police said Thursday.
Philippines nabs 44 Taiwanese linked to fraud
MANILA, Philippines (AP) — Philippine police say they have arrested 44 Taiwanese who allegedly ran an online blackmail syndicate that defrauded victims in China and Taiwan by duping them into thinking their bank accounts have been used by money launderers or terrorists.
Microsoft drops lawsuit against Vitalwerks after service cuts

The Microsoft logo is seen at their offices in BucharestBy Jim Finkle BOSTON (Reuters) - Microsoft Corp has dropped a lawsuit against Vitalwerks Internet Solutions that alleged the privately held Web services firm failed to take proper steps to prevent its systems from being abused by cybercriminals. The two companies said on Wednesday they had settled the lawsuit,which was announced by Microsoft on June 30 as it launched an operation to wrest control over infected PCs from cybercriminals. Microsoft's operation targeted malicious software known as Bladabindi and Jenxcus, which is believed have infected millions of Windows PCs around the globe. Microsoft obtained an order from a federal judge in Nevada to launch the operation, telling the court it would be able to siphon off criminal traffic without impacting legitimate users of a service run by Vitalwerks, known as No-IP.com.



Update Adobe Flash on your system right now

Update Adobe Flash on your system right nowAdobe on Tuesday issued a critical security update to patch a vulnerability that could help hackers “take control” of computers after users visit various sites, CNET reports. Security blogger Michele Spagnuolo, who detailed the security exploit, says the Flash issue can be used by hackers to steal cookies that authenticate users on “thousands of websites.” “Adobe has released security updates for Adobe Flash Player 14.0.0.125 and earlier versions for Windows and Macintosh and Adobe Flash Player 11.2.202.378 and earlier versions for Linux,” Adobe wrote. “These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system. Adobe recommends users update their product installations to the latest versions.” Among the websites that may have been targeted



China dismisses claims of links to hackers targeting Iraq experts
By Joseph Menn SAN FRANCISCO (Reuters) - China on Tuesday disputed claims by CrowdStrike, a U.S. security firm, that a group of hackers it calls "Deep Panda" is linked to unnamed Chinese government officials, saying the firm was merely seeking publicity. "Chinese laws prohibit cyber crimes of all forms, and Chinese government has done whatever it can to combat such activities," Geng Shuang, press counselor for China's embassy in Washington, said in response to questions from Reuters. On Monday, CrowdStrike said a highly sophisticated group of hackers believed to be associated with the Chinese government, who for years targeted U.S experts on Asian geopolitical matters, has suddenly begun breaching computers belonging to experts on Iraq as the rebellion there escalated.
There’s one major downside to relying so much on Google Maps

There’s one major downside to relying so much on Google MapsThere’s a reason that people prefer using Google Maps over other mapping applications: It’s just a flat-out terrific service. That said, there is one downside to having Google Maps serve as the de facto online mapping service: It’s a major target for hackers who can use it to effectively ruin small businesses. Wired brings us the sad tale of a once-popular restaurant in Northern Virginia whose business mysteriously dried up for no apparent reason in early 2012. Although the restaurant couldn’t figure out why its sales were tanking in time to prevent itself from going under, its owner eventually discovered that a rival restaurant had apparently changed the business’s hours on Google Places to make it look as though the restaurant



New York to add $3B windfall to state budget
New York is poised to collect nearly $3.3 billion from a recent record settlement with France's largest bank, and the Cuomo administration plans to add it to the state's general fund. It's more than enough ...
Currency, maritime disputes at stake in U.S.-China talks

U.S. Secretary of State Kerry greets media representatives flying aboard his plane bound for diplomatic talks in China while flying out of WashingtonBy Lesley Wroughton and Michael Martina BEIJING (Reuters) - The United States pressed China to implement structural reforms in its exchange rate and to modify its "aggressive behavior" in disputed waters during a preliminary round of bilateral talks on Tuesday, senior U.S. officials said. The United States, led by U.S. Secretary of State John Kerry and Treasury Secretary Jack Lew, will also push China this week to resume cooperation on fighting cyber espionage and return to dialogue on internet issues, a senior U.S. official said.



Security Firm Says Chinese Hackers Targeting U.S. Experts on Iraq

Security Firm Says Chinese Hackers Targeting U.S. Experts on IraqA private cyber security firm has discovered evidence that a suspected Chinese government hacker group has been targeting U.S. experts on Iraq. CrowdStrike — a firm consisting of former U.S. government officials and credited with exposing the motives of Russian hacker group Energetic Bear — claims they have discovered that hackers belonging to "Deep Panda" have shifted from attacking experts associated with Southeast Asian geopolitical affairs to attacking the computers of U.S. think tank employees specializing in Iraq. The hacking began on June 18 —the day the rebel group Islamic State of Iraq and the Levant (ISIS) attacked an oil refinery.  "They immediately started going after Middle East specialists and experts, so it was a clear indication they were receiving tasking," CrowdStrike VP of Intelligence Adam Meyers told The Wire.