TIME Security

Apple Pay Competitor Defends Service After Hack Exposes Emails

220,000 Stores Start Accepting Apple Pay
A worker demonstrates Apple Pay inside a mobile kiosk sponsored by Visa and Wells Fargo to demonstrate the new Apple Pay mobile payment system on October 20, 2014 in San Francisco City. Justin Sullivan—Getty Images

"This is not a breach"

Apple Pay competitor CurrentC defended the security of its mobile payment system in a Wednesday conference call, just hours after its parent company MCX reported that hackers had obtained some users’ e-mail addresses.

MCX CEO Dekkers Davidson said the attack, which targeted the company’s email vendor, was “not a breach” of the CurrentC app itself. He also emphasized that the incident affected mostly dummy e-mails used in the yet-unreleased service’s ongoing testing phase. Davidson also revealed that some dummy zip codes were stolen and that CurrentC’s systems had withstood several repeated attacks during the past week.

Davidson added the hack hasn’t made the company hesitant to store customer information in the cloud, a plan that’s been criticized given that CurrentC’s main competitor, Apple Pay, doesn’t collect any traceable information at all.

“In terms of consumers’ information and any payment credentials, they’re not stored on a device. They’re not actually present in the physical world,” Davidson said. “And that we think is a design or implementation that makes it far more secure than the world we live in today, and far more secure than many of the alternatives that have been advanced over the last few years.”

While MCX is a joint venture by retailers in order to create a retailer-owned payment system, Davidson said that the service is “first and foremost” about customer engagement. Part of that customer engagement will include a consumer privacy dashboard so that users can elect what information, if any, they would like to share with merchants.

MCX has been under scrutiny after reports suggested that MCX members CVS and Rite Aid disabled Apple Pay because of a contractual agreement for exclusivity. However, Davidson said that the company welcomes competition, and that it is the merchants’ choice whether or not to accept other forms of mobile payment. He added that MCX member retailers are not subject to fines if they choose to adopt Apple Pay, which registered 1 million credit cards in its first three days.

Davidson added that although some MCX merchants have blocked Apple Pay, MCX is open to member retailers using both Apple Pay and CurrentC simultaneously once the latter service goes public early next year.

“We have a great deal of respect for Apple, of course, and Apple Pay,” Davidson said. “We believe and our merchants believe we require two to three strong players in the space to build the ecosystem.”

TIME Security

Why You Should Care That the White House Got Hacked

Russian hackers may have jumped the White House's digital fence

Security experts are pointing fingers at Russian hackers for a cyberattack against the White House that came to light late Tuesday, marking the latest high-profile attacks linked to that country.

The attack doesn’t appear to have caused much harm. There was no evidence that hackers had breached classified networks. White House Press Secretary Josh Earnest on Wednesday said the attacks were an “inconvenience,” but attributed ongoing network disruption to the government’s cleanup of the incident rather than the attack itself. So why should we care that unclassified networks at the White House were hacked?

First, experts say the White House attack shows just how wide a net Russian hackers appear to have cast, especially as tensions between the U.S. and Russia have heightened amid the ongoing crisis in Ukraine. The recent hack is just the latest in a slew of attacks attributed to Russian hackers who security researchers have connected to the Russian government — earlier this month, a Russian hacking group reportedly exploited a Microsoft Windows flaw to spy on NATO and the Ukrainian government. Russian hackers were also behind an attack on JPMorgan Chase that compromised customer information linked to 83 million accounts, according to a recent report. If Russian hackers are indeed behind the White House attack, we should be concerned about their possible intent to probe deeper into the White House network.

“The objective of this may have been a test to determine what the security culture is at the White House before targeting more sophisticated networks,” said Armond Caglar, a senior threat specialist at the firm TSC Advantage.

Beyond that, the White House attack shows that even some of the most well-protected institutions are vulnerable, even if the hackers didn’t get ahold of any national security secrets this time around. “On a regular basis, there are bad actors out there who are attempting to achieve intrusions into our system,” a White House official told the Washington Post. “This is a constant battle for the government and our sensitive government computer systems, so it’s always a concern for us that individuals are trying to compromise systems and get access to our networks.”

Attacks on private and public sector entities—including the White House—are now par for the course. Says Adam Golodner, an attorney at Kaye Scholer who practices cybersecurity law: “This is the world in which chief information security officers now live.”

– With reporting from Zeke J. Miller

TIME Security

Retailers’ Apple Pay Competitor Has Already Been Hacked

Retailers joined forces to create the digital wallet, which has received cold reviews

Apple Pay competitor CurrentC said Wednesday that hackers have gotten their hands on some users’ information, according to a statement from MCX, the service’s developer. The hackers targeted MCX’s e-mail provider, not the CurrentC app itself.

MCX said that the hackers accessed some e-mail addresses of CurrentC pilot program participants and individuals who had expressed interest in using the free digital wallet. MCX, a joint venture created by major U.S. retailers in part as an effort to avoid paying credit card transaction fees, did not disclose how many individuals were affected, but said many of the stolen e-mails addresses were not of actual users.

“Many of these email addresses are dummy accounts used for testing purposes only. The CurrentC app itself was not affected,” Linda Walsh, a spokeswoman for MCX, said in an e-mail. “We have notified our merchant partners about this incident and directly communicated with each of the individuals whose email addresses were involved.”

The hack targeting CurrentC, which is set for release next year, comes on the heels of news that retail giants CVS and Rite Aid—two members of MCX—will not accept Apple Pay despite at first allowing the service. A leaked in-house memo indicated that the reason may be the two companies’ involvement with CurrentC. Apple CEO Tim Cook said Tuesday in an interview with The Wall Street Journal that the situation amounted to a “skirmish.”

News of CurrentC’s vulnerability also adds to the less-than-warm reviews of the mobile payment service, which some reviewers say was designed more for the benefit of retailers than for customers. It also boosts the reputation of its competitor Apple Pay, which has championed its customer data security. Apple Pay users registered one million cards on the service in its first three days, Cook said earlier this week.

TIME Security

Americans Are More Afraid of Being Hacked Than Getting Murdered

Credit card payment in pharmacy.
Getty Images

Nearly 70% of Americans are worried they'll be hacked. Just 18% are afraid of being murdered

Americans are more worried that their credit card information will be stolen by hackers than they are about being murdered, sexually assaulted or having their home targeted by a burglar, according to a Gallup poll released this week.

Sixty-nine percent of Americans said they frequently or occasionally worry about having credit card information they use in stores stolen by computer hackers, making hacking by far the most feared crime in the United States, according to the poll. The second-ranking crime that Americans worry about is having their computer or smartphone hacked, with 62% of Americans occasionally or frequently worried about such a breach.

By comparison, 45% of Americans are worried about their homes being burglarized, 28% about being the victim of terrorism and 18% are worried about getting murdered.

Target, Home Depot and Neiman Marcus have all reported massive hacks in the past year, affecting many millions of customers. Fully one quarter of Americans say they or someone in their household has had information from a credit card used at a store stolen by computer hackers during the last year.

 

TIME White House

White House Computer Networks Hacked

Early morning sunrise is seen over the White House in Washington, Oct. 28, 2014.
Early morning sunrise is seen over the White House in Washington, Oct. 28, 2014. Pablo Martinez Monsivais—AP

Russian hackers suspected

Hackers believed to be employed by the Russian government breached White House computer networks in recent weeks, temporarily disrupting services.

Citing unnamed sources, the Washington Post reported there was no evidence that hackers had breached classified networks or that any of the systems were damaged. Intranet or VPN access was shut off for a period but the email system was never downed. The breach was discovered two to three weeks ago, after U.S. officials were alerted to it by an unnamed ally.

“On a regular basis, there are bad actors out there who are attempting to achieve intrusions into our system,” a White House official told the Post. “This is a constant battle for the government and our sensitive government computer systems, so it’s always a concern for us that individuals are trying to compromise systems and get access to our networks.”

Cybersecurity firms in recent weeks have identified NATO, the Ukrainian government and U.S. defense contractors as targets of Russian hackers thought to be working for the government.

[The Washington Post]

 

TIME Ask TIME Tech

Ask TIME Tech: Good Streaming Security Camera?

Dropcam
The $149 Dropcam streams live security footage to the web, accessible for free via mobile apps and computers. Dropcam

We're looking for an easy, cheap way to catch an intruder in the act

Question: I just moved to a new apartment and for a number of reasons, I’m feeling like I need to have a video camera in my place. Mainly because I feel like the management company continues to come into my apartment to “fix” things, and it’s causing me to feel violated.

I was wondering if you knew of a relatively cheap camera that would hook up to an iPhone app and send some sort of notification on the phone when there’s movement.

Short Answer: The $149 Dropcam HD should do the trick.

Long Answer: There’s no shortage of streaming security cameras out there and while Dropcam isn’t the cheapest option, it’s really easy to set up, it’s reliable and its free mobile app works great.

There are two models available: the $199 Dropcam Pro and the $149 Dropcam HD. You’ll be just fine with the $149 model pictured above. The $199 version gets you a wider field of view (130 degrees versus 107 degrees), lets you zoom in closer (8x versus 4x) and has a newer wireless chip that can take advantage of faster connections.

Either model will alert you to movement via email and text message, and you can watch live footage from your phone or from a computer. You can also set up movement zones in your home, such as doorways and stairwells. This is handy if you have pets, for instance. You don’t want motion notifications going off all day when your dog is moving around; only when someone comes in through the front door. Each camera sports voice communication, too, so you can tell your dog to get off the couch or tell an intruder that you’ve called the police.

There are two service plans available, which record footage that you can use to play back later if you need it for legal reasons. The 7-days-of-recording, $99-per-year plan should be just fine. There’s also a $299-per-year plan that saves 30 days of footage.

Note that you don’t have to use a service plan at all, though. If you just want to check in on live footage and get alerts when someone enters your place, that’s all included without a plan. My advice would be that if you decide to go without a plan and you get an alert that someone has entered your home, capture a screenshot (or several) of the person in the act by pressing the power button and the Home button on your iPhone at the same time. That way you’ll have proof if you need it later.

Related:

TIME United Kingdom

Watch a Wayward Jogger Collide With the British Prime Minister

Police say runner was merely "in the wrong place at the wrong time"

A British jogger made national news on Monday after his midday run set him on a collision course with Prime Minister David Cameron, prompting the man’s arrest, speculation as to why he did it, and an official review of Cameron’s security detail.

Footage of the incident shows Cameron and his security retinue walking out of the civic hall in Leeds, a city in West Yorkshire, when a dreadlocked jogger runs into the frame, cutting a direct path between the security guards and into the prime minister, appearing to give him a gentle shove.

Security officers seized the man and bundled Cameron into a waiting car. Initial reports identified the jogger as a protester, which local police later denied, calling the incident “nothing sinister.”

‘‘No threats were made, and after the man’s details were checked, he was de-arrested and allowed on his way,” read a statement from the West Yorkshire Police department.

The runner, later identified as Dean Balboa Farley, also took to Facebook (in a post that has since been taken down) to set the record straight on his motives. “So I’m all over the news as ‘the protester that attacked David Cameron in Leeds,'” he wrote. “Yeah, if you call brushing into someone while running then getting assaulted by half a dozen coppers in suits…”

TIME Security

Google Now Supports USB Security Keys for Two-Step Verification

Most security experts agree that you should secure all your online accounts with two-step verification when you can. It’s an important additional security feature that requires you to have access to a physical item (typically, a mobile phone) to gain access to your online accounts.

After entering your password, you enter a second code from your smartphone to double-verify your identity. With two-step verification enabled, even if someone steals your current password through a hack, they won’t be able to enter your accounts unless they also steal that physical item – a requirement that stops most bad guys in their tracks.

Of course, there are always situations where you may not want to use – or simply don’t have access to – a mobile phone. That’s why Google announced the launch of Security Key. It enables two-step authentication for your Google accounts through the use of a physical USB stick.

“Security Key is a physical USB second factor that only works after verifying the login site is truly a Google website, not a fake site pretending to be Google,” the company explains on its official UK blog. “Rather than typing a code, just insert Security Key into your computer’s USB port and tap it when prompted in Chrome. When you sign into your Google Account using Chrome and Security Key, you can be sure that the cryptographic signature cannot be phished.”

Security Key requires a USB drive to work, so it’s not compatible with most mobile phones and tablets. Security Key also requires you to use the Chrome web browser (version 38 or newer) to complete verification. And, of course, there are questions about just how secure the USB format is in general due to the recently discovered BadUSB vulnerability.

If you want to give Security Key a try, you’ll need to purchase a FIDO U2F-certified key to use with the feature. You can buy a basic USB security key on Amazon for $5.99, or something slightly sturdier with a button for $17.99. You can learn how to register and add a Security Key to your Google account by visiting the Google Help page.

This article was written by Fox Van Allen and originally appeared on Techlicious.

More from Techlicious:

TIME Security

China iCloud Attack Could Be State-Sponsored Hacking

Apple Inc. Launches iPhone 6 And iPhone 6 Plus In China
A Chinese man sets up his new iPhone 6 inside an Apple store on October 17, 2014 in Beijing, China. Feng Li—Getty Images

The iCloud attack coincided with the iPhone 6 releases in China

Chinese users recently attempting to access Apple’s iCloud online data storage service may have had their personal information stolen in what one cybersecurity firm claims was a high-level cyberattack backed by Chinese authorities.

GreatFire, an independent Chinese censorship watchdog, said the hack was a “man-in-the-middle” attack, in which hackers get access to users’ files by getting them to enter their login information into a fake login site. The hackers then set in “the middle” of users and the service, grabbing data at it’s transmitted between the two.

Apple confirmed the attack Tuesday, stating that it is “aware of intermittent organized network attacks using insecure certificates to obtain user information.” The firm added that the attacks “don’t compromise iCloud servers, and they don’t impact iCloud sign in on iOS devices or Macs running OS X Yosemite using the Safari browser.”

GreatFire said the hackers involved with the iCloud breaches used servers accessible by only state-run organizations and Chinese authorities, a sign the attacks had the blessing of such authorities. The hack came just as the iPhone 6 was released in China after a delay over the government’s security firms.

The iCloud attack follows a report earlier this month that “a very large organization or nation state” was putting malicious spyware onto iPhones and iPads belonging to Hong Kong’s pro-democracy protestors. GreatFire also previously reported that Chinese authorities had launched attacks on GitHub, Google, Yahoo and Microsoft in an apparent effort to censor those services.

“This is what nation states do to ‘protect’ their citizens. There is nothing surprising or unexpected in this revelation,” said Phil Lieberman, president of cybersecurity firm Lieberman Software. “It would not be hard to find other countries doing similar things.”

TIME Security

Experts Warn Corporate Boards Aren’t Protecting Us From Hackers

A shopper walks past a large Home Depot logo inside a store
A shopper walks past a large Home Depot logo inside a store in New York,Tuesday, May 16, 2006. Bloomberg—Bloomberg via Getty Images

In the wake of hacks against Target, Home Depot and JPMorgan, analysts say companies' boards need to be more vigilant on cybersecurity

As an increasing number of major retailers and financial institutions are falling victim to hacks like those against Target, Home Depot and JPMorgan, many experts say corporate boards aren’t doing enough to protect customers from cybersecurity breaches.While corporate boards are a step removed from companies’ day-to-day operations, the increasing risk of data breaches means that boardmembers need to be more involved in cybersecurity, observers say, whether by pushing for security oversight or reshuffling executives who don’t react properly to crises.

“We live in the post-Target era,” said John Kindervag, security analyst at Forrester. “There’s a moral obligation to consider firing an executive team because of a data breach. It’s a huge business failure.”

Corporate boards rarely review cybersecurity plans or involve themselves in the particulars of data protection, traditionally viewing security as an information technology problem. According to a PriceWaterhouseCoopers report released last month, just 42% of 9,700 executives in over 150 countries said their boards are involved in security strategy; just 25% said their boards are involved in reviewing security and privacy threats.

“They’ll say to the CEO, what are we doing about security, and then don’t get involved at all until they get breached,” says Avivah Litan, security analyst at Gartner. “Most companies don’t communicate at that level with the board. They’re out of touch and they’re totally clueless about information security.”

Securities and Exchange Commissioner Luis Aguilar put it more gingerly to board directors earlier this month at a New York Stock Exchange cybersecurity conference. “There may be a gap that exists between the magnitude of the exposure presented by cyber-risks and the steps, or lack thereof, that many corporate boards have taken to address these risks,” Aguilar said. There’s a discrepancy, too, between what shareholders demand of boards and what they’re actually doing — a survey published by Institutional Shareholder Services (ISS) last month shows that nearly 70% of shareholders view board oversight actions prior to hacking incidents as “very important.”

Negligent boards may find themselves facing questions from angry shareholders and customers after a cyber breach. In June, ISS made the unusual recommendation that Target shareholders oust seven out of 10 members of its board after credit card information belonging to 40 million customers was compromised, laying blame on two board committees in particular.

“The data breach revealed that the company was inadequately prepared for the significant risks of doing business in today’s electronic commerce environment,” ISS advised. “The responsibility for oversight of these risks lies squarely with the Audit Committee and the Corporate Responsibility Committee.” Shareholders re-elected the board, but ISS’ condemnation was a wake-up call for retailers. Target is now facing an investigation from the Federal Trade Commission into the details of the breach.

Home Depot, meanwhile, was a founding member of a threat-sharing group of major retailers earlier this year, and its board received regular updates on cybersecurity, according to a spokesman. “IT and IT security have regularly been items on our board meeting agendas for several years now, and the board has received regular updates on the breach since it occurred,” said that spokesman. But the hardware retailer was caught flat-footed by a data breach this year that jeopardized 56 million customers’ credit cards, and managers ignored weaknesses in cyber defense before the attack, the New York Times reported last month.

Analysts say a strong board of directors should know how to ask management the right questions about cybersecurity. “The board is not responsible for identifying risk, but it sure as hell needs to know that management understands that responsibility and knows how to respond to it,” said Rick Steinberg, former governance practice leader at PricewaterhouseCoopers.

Ultimately, it might be a financial motivation that gets corporate boards to take a closer look at their firms’ cybersecurity standards. Target’s net income dropped more than $400 million in the quarter the breach was announced compared to the year before; the company said direct costs from the data breach would reach $148 million in the second quarter of 2014 alone. The total expense of any breach, including lost profits from nervous consumers, are often incalculable. “A data breach is the equivalent of an oil spill,” said Kindervag. “It’s a fundamental business issue.”

Your browser, Internet Explorer 8 or below, is out of date. It has known security flaws and may not display all features of this and other websites.

Learn how to update your browser