According to China's top economic planning body, some local companies are cutting back on their efforts to hire new university graduates.China Economyread more
Airbus recorded orders and options for 123 planes, according to the aviation consulting firm IBA.iQ.Paris Air Showread more
Markets in Asia were mostly higher in Tuesday trade as investors awaited the start of a closely-watched meeting by the U.S. Federal Reserve, set to kick off later stateside.Asia Marketsread more
Wall Street analysts think Facebook's cryptocurrency payments project will give the company a big boost.Marketsread more
Chinese President Xi Jinping will travel to North Korea this week for a two-day visit, ahead of a possible meeting between Xi and President Donald Trump at next week's G-20...Politicsread more
The Pentagon said that the crew of one of the tankers, the Japanese Kokuka Courageous, found an unexploded limpet mine on its hull following an initial explosion.Politicsread more
Despite the popularity of companies like Beyond Meat and Impossible Foods, meat consumption around the world continues to rise.Food & Beverageread more
Electronic material that Infowars host Alex Jones turned over to families of Sandy Hook Elementary School shooting victims who are suing him contained images of child...Politicsread more
Facebook's reported move into cryptocurrency could amount to the biggest catalyst for digital assets in their decade-long history, some crypto investors say.Bitcoinread more
In a 7-2 ruling, over dissents from Justices Ruth Bader Ginsburg and Neil Gorsuch, the justices affirmed the so-called "dual sovereignty" exception to the Constitution's...Politicsread more
Eleven banks that lend to shipping lines announced Monday that climate impact will be integrated into the criteria that determines how much shipping companies can borrow, an...Transportationread more
Old software security holes are more stubborn than many think.
A report issued Monday by HP shows that almost half of the companies who suffered a cyber attack in 2014 were hit by hackers taking advantage of old exploits.
In fact, 44 percent of known breaches in 2014 stemmed from vulnerabilities caused by unpatched code that was two to four years old, showing that many companies are not adequately updating security patches, according to HP's Cyber Risk Report.
"The biggest theme we took out of this is that the past has come back to haunt us," said Frank Mong, the vice president of solutions enterprise security products for Hewlett-Packard.
"When you look at why people are still getting hacked or breached, I think a big contributor to that is either not knowing if you were patched or if you were patched and you were secure at one point, but something happened in operations that caused you not to be patched again," Mong said.
For example, when a company's server goes down, operations will usually reboot or reimage it to get it working again. When this happens, all security patches are lost and must be reinstalled. Because the process of reinstalling all security patches can be very manual, some patches may be missed.
"When you look at the problems we saw in 2014, the devil is in the details and companies need to go back and look at their operational practices because you let one little slip happen and you could have a big problem on your hands," Mong said.
While old security holes going unpatched was the big reason for cyber incidents last year, more attacks are increasingly targeting connected devices, specifically mobile devices, Mong said.
Mong said that HP researches found no new mobile ransomware samples in January 2014, but by November last year saw 183 new types of ransomware, attacking Android devices.
Google's Android operating system has become a primary target for hackers because app marketplaces for Android tend to be less regulated. This enables hackers easily to build malicious apps that can be downloaded by anyone.
"That type of surge shows that once we are good corporate citizens and we start patching our servers, start patching our PCs, the adversary starts to maneuver and starts to change the game," Mong said. "And in this case, they are attacking Android mobile devices because there is opportunity there."