Several hacktivist capers surfaced in Europe over the weekend: Amazon UK customers' personal information was exposed, Anonymous hacked the Organization for Security and Cooperation in Europe, and Facebook shuttered the Albania Pirate Group for sharing stolen passwords.
China restored access to Google over the weekend, but "leadership transition" censorship persists. Twitter's password reset was prompted by a confirmed (but still unattributed) attack. Symantec warns of PC hijacking and extortion; it also warns Hindus to beware of online scams as Diwali approaches. Kaspersky cites outdated web browsers as a significant vulnerability. As Windows 8 rolls out, vulnerabilities in older versions continue to plague users.
Recall last week's report that Stuxnet infected Chevron? Apparently the malware identified the oil company as an "innocent target," withheld its payload, and supinely consented to removal, which makes Stuxnet sound like a pretty discriminating cyber weapon.
Tablets appear to be cannibalizing the PC market (and an Indian entrepreneur may have a genuinely disruptive new tablet). The US Navy's Space and Naval Warfare Systems Command awards fourteen small businesses contracts for what Defense News calls an "effort to attack enemy networks." Lockheed Martin dismisses its incoming CEO before he takes office. SafeNet will sell its government business to an undisclosed buyer. CSC expands its Australian business.
Tech reporters swoon over futuristic DARPA cyber and predictive programs.
US Director of Central Intelligence David Petraeus' resignation Friday was prompted by FBI detection and investigation of compromising emails. Canadian authorities fear that country's evolution into a source of cyber attacks.
Today's issue includes events affecting Albania, Australia, Canada, China, European Union, India, Kosova, Norway, Singapore, Sweden, United Arab Emirates, United Kingdom, United States..
Cyber Attacks, Threats, and Vulnerabilities
Hundreds of Brits' details exposed in claimed Amazon UK hack(ZDNet) A hacker has posted purported data on more than 600 Amazon UK customers online, but the retailer has said the information does not come from their systems. The data, posted on Saturday to Pastebin, was presented by a hacker named Darwinaire as proof that he or she broke into the online retailer's systems. It covers names, usernames, registration dates, phone numbers, email addresses and home addresses for 635 people
Anonymous again hacks OSCE and leaks restricted documents(Hacking News) Following the November 4th attack, Anonymous once again hacked into the Organization for Security and Cooperation in Europe (OSCE). Today they have leaked another 55mb of internal documents from OSCE Vienna, dating upto November 11th. Again, many of the documents are marked as restricted; They have published a 147k PDF file that talk about "Efforts in the field of arms control agreements and confidence and securitybuilding measures"
Google access returns to China after brief blocking(Computer World) Access to Google services in China appeared to return Saturday morning after they were blocked briefly as the country prepares to appoint new leadership. The blocking appeared to last for about 12 hours, with Internet traffic resuming to the sites after 6 a.m. local time, according to Google's Transparency Report, which monitors company's services worldwide. In Beijing, Google was accessible, although loading the sites was slow.
Google blocked in China, amid leadership transition(Quartz) Web censorship sites are reporting that Google is now blocked in parts of China, just as the delicate leadership transition gets underway at the 18th Communist Party Congress…It's unclear how extensive the outages are in the People's Republic. But they come as China has been especially touchy around the handover of power at its official party Congress. An investigative report in the New York Times laying out the fortune amassed by Chinese Premier Wen Jiabao's family was quickly followed by the blockage of New York Times' Chinese language web properties. IHS Global Insight analysts report that both the New York Times and Bloomberg remain blocked in the country
DDoS Attacks Take Down What.cd, BTN and More BitTorrent Trackers(TorrentFreak) Several popular private BitTorrent trackers have suffered downtime today due to DDoS attacks. The attacks appear to originate from an individual who had aspirations of joining the music tracker What. cd, but carried over to other sites including BroadcastTheNet, PassThePopcorn and HDBits
Demonoid Is Back, BitTorrent Tracker is Now Online(TorrentFreak) After three and a half months of downtime Demonoid's tracker is now back online. The unexpected revival of the tracker is the first sign of life in weeks and suggests that the Demonoid team is working to bring the full site back online. While the index and forum remain offline, the many thousands of torrents tracked by Demonoid have been brought back to life
Cyber criminals hijacking PCs and holding them to ransom(ComputerActive.co.uk) Cyber criminals are hijacking people's PCs and holding them to ransom while they blackmail their victims, Symantec has warned. Sometimes the hijack turns out to be a simple demand for money to unlock the PC but there is a nastier element
Cyber criminals riding on Diwali frenzy(Hindu Business Line) Cyber criminals become hyper active during festivals. Diwali is no exception. They have now started luring unsuspecting users into a trap, which is built around the festival of lights
As Windows gets safer, old vulnerabilities still have bite(IT World) Microsoft Windows is safer- and harder to exploit than ever before. Despite the improvements in OS security, however, security experts tell ITworld that it's the old wounds that hurt the most, as organizations continue to fall to cyber attacks that exploit vulnerabilities discovered - and patched - years earlier
Stuxnet infected Chevron, achieved its objectives(ZDNet) Chevron was infected by Stuxnet almost immediately after it spread into the wild, but the nature of the malware meant that it identified its systems as the wrong target and caused no damage
Hacker: Japan Is Extremely Vulnerable to Cyberattacks(Hacker: Japan Is Extremely Vulnerable to Cyberattacks) Wev'e had the opportunity to do an interview with DeadMellox, a member of Team GhostShell the hacker collective that has made a lot of headlines after leaking millions of sensitive records from organizations worldwide, including China and Russia. In September, the hackers focused their efforts on the worlds top 100 universities. Since some of the targeted organizations were from Japan, the country announced that it would launch an investigation into the matter
Experts: State needs long-term cyber security plan(Greenville Online) Governor calls computer security assessment 'premature,' says more steps are coming. A month after state officials learned of a massive data breach at the Department of Revenue, officials are still discussing what security measures to take to protect all of the state's computer systems
Security Patches, Mitigations, and Software Updates
Memory Bug Fixed in Tor Client(Threatpost) The Tor Project has fixed a flaw in its anonymization and privacy software that leaked information from memory on some machines running Tor that could give an attacker access to sensitive information stored in the cache. The issue was caused by the way that some compilers handle a specific function in the Tor client
Users buying tablets in place of cheap PCs(Fierce CIO: TechWatch) The cannibalization of PCs by tablets is not just a figment of your imagination, and can be substantiated by hard figures. Well, at least according to the numbers made public by Nvidia at a conference call with analysts. Nvidia is a chip maker that churns out GPUs, Graphics Processing Units, as well as mobile processors used in tablets and smartphones
Rush to deploy tablets has left security in the lurch(Fierce Mobile IT) Close to half of organizations are allowing the use of company or privately owned tablets, up from just 20 percent in 2011, according to accounting firm Ernst & Young's annual information security survey. At the same time, the adoption of mobile security techniques and software in the enterprise is relatively low, with just 40 percent of organizations using some form of encryption technique on mobile devices, the global survey of 1,850 chief information officers, chief information security officers and other information security executives found
How important is online anonymity to you?(Fierce CIO: TechWatch) A blog on PCWorld outlines some tips on how to surf the web in secret, which may be a good idea given the many methods that website operators and advertisers use to track visitors. Knowing is half the battle, argues Brad Chacos, who highlighted how websites are able to track visitors through their IP addresses or the use of text cookies, Flash Cookies or Silverlight Cookies
Project Management Offices: A Waste Of Money?(InformationWeek) The risks of starting a PMO have never been greater, new research shows. After years of observing project management, I agree. Will most companies that implement a project management office take on higher IT costs without improving performance? That's the bold headline of a Hackett Group study of more than 200 organizations. It's not just hype: I happen to agree that the risks of a disastrous PMO implementation have never been greater
Deficit Cutters Look To Pentagon Budget(New York Times) One war is done, another is winding down and the calls to cut the deficit are deafening. The military, a beneficiary of robust budgets for more than a decade, is coming to grips with a new reality fewer dollars
Navy Awards Contracts for Effort to Attack Enemy Networks(DefenseNews.com) It's still not clear what law governs the use of cyber attacks, though the State Department's top lawyer has said that a cyber attack in certain cases could be considered a "use of force" and would be subject to international humanitarian law…The companies awarded the contract are Anchored Systems (JV), Washington, D.C.; Ausgar Technologies, San Diego, Calif.; Burke Consortium Inc., Alexandria, Va.; The Cybrix Group, Tampa, Fla.; Flatter and Associates Inc., Stafford, Va.; GRSI, Frederick, Md.; ISHPI Information Technologies Inc., Mount Pleasant, S.C.; Mandex Inc. Fairfax, Va.; Mystikal Solutions LLC, San Antonio, Texas; Sentar Inc., Huntsville, Ala.; SPARC LLC, Charleston, S.C.; Stargates Inc., Arlington, Va.; Strohmier Consulting LLC, Ashburn, Va.; and Technical and Project Engineering, Kingstowne, Va.
Agency programs show outlines of future cyber ecosystem(GCN.com) The next step will be formation of a working group, probably to include the National Security Agency as well as DHS and NIST, to do a gap analysis identifying what needs to be done to move the present state of technology to the desired state
Lockheed Martin Ousts Incoming CEO(Wall Street Journal) Lockheed Martin Corp. ousted its incoming chief executive, Christopher Kubasik, for having a "close personal relationship" with a subordinate at the defense contractor. The company said Mr. Kubasik was asked to resign Friday after an investigation determined the "improper conduct" violated Lockheed Martin's code of ethics. He will receive a $3.5 million separation payment
Cyber firm KEYW moving beyond government work(Washington Business Journal) KEYW Holding Corp. made its name selling cybersecurity systems to government intelligence and counterterrorism agencies. Now, the 4-year-old Hanover, Md
Army Picks 20 Firms for $10B Tactical Communications IDIQ(Govconwire) The U.S. Army has awarded 20 companies the opportunity to compete for task orders on the Global Tactical Advanced Communications Systems contract, according to Defense Systems…20 companies included in the IDIQ: CACI Technologies, D & S Consultants, DRS Technical Services, Envistacom, General Dynamics One Source, Globecomm Systems, Harris, ITT/Exelis, L-3 Services, Lockheed Martin Integrated Systems, Morgan Franklin C3T, Nexagen Networks, Northrop Grumman Systems, Raytheon, Rockwell Collins Satellite Communications Systems, Science Applications International, Scientific Research, Telecommunications Systems, Trace Systems, [and] Viasat
Lockheed Moving DOL Data Centers to Cloud(Govconwire) Lockheed Martin will consolidate the Labor Department's data centers and move them to a secure data center, then ultimately move them to a cloud computing environment
Red Hat Enterprise Linux 6 Secure-Ready for Government Clouds(Integration Developers) Notably, Red Hat Enterprise Linux 6 features Security-Enhanced Linux (SELinux), a joint project developed with the National Security Agency (NSA). The certification provides assurance that using Red Hat Enterprise Linux 6 with the KVM hypervisor allows
Updated SkyBox risk and compliance management solutions(Help Net Security) Skybox Security added new capabilities to Firewall Assurance 6.5 and Network Assurance 6.5 that make it easier for security managers to see, analyze and take action to secure the network infrastructure
IBM expands mobile enterprise offerings(Fierce Mobile IT) IBM (NYSE: IBM) is expanding its mobile software and services capabilities in a market that is predicted by McKinsey & Co. to reach $130 billion in revenue by 2015
New Mastercard has LCD screen and keyboard(BBC) A credit card with an LCD display and built-in keyboard has been launched in Singapore by Mastercard. The card has touch-sensitive buttons and the ability to create a "one-time password" - doing away with the need for a separate device sometimes needed to log in to online banking. Future versions of the card could display added information such as the remaining balance
Technologies, Techniques, and Standards
Puzzle Logic(Dark Reading) Authentication is an enduring mystery, but solving authorization puzzles may be a better use of your security resource
Salvaging Digital Certificates(Dark Reading) Following breaches at Diginotar, Comodo, and RSA, digital certicate technology has been deeply tarnished. Here are five ways to shine it up and make it work for your organization
How a $20 tablet from India could blindside PC makers, educate billions and transform computing as we know it(Quartz) Suneet Tuli, the 44-year-old CEO of UK/Canadian/Indian startup Datawind, is having a taxing day. "I'm underwater," he says as he struggles to find a cell signal outside a restaurant in Mumbai. Two days from then, on Sunday Nov. 11, the president of India, Pranab Mukherjee, will have unveiled the seven-inch Aakash 2 tablet computer Tuli's company is selling to the government for distribution to 100,000 university students and professors. (If things go well, the government plans to order as many as 5.86 million.) In the meantime, Tuli is deluged with calls from reporters, and every day his company receives thousands of new orders for the commercial version of the Aakash 2. Already, he's facing a backlog of four million unfulfilled pre-orders
Research and Development
How the Pentagon's Plan X could revolutionize cyberwarfare(CyberWarZone) The same Pentagon futurologists who helped create the Internet are about to begin a new era of cyberwarfare. For years, the Pentagon has been open and adamant about the nation's need to defend itself against cyberattack, but its ability and desire to attack enemies with cyberweapons has been cloaked in mystery. Next week, however, the Pentagon's Defense Advance Research Products Agency (DARPA) will launch Plan X an effort to improve the offensive cyberwarfare capabilities needed to dominate the cyber battlespace, according to an announcement for the workshop
Cyber experts engage on DARPA's Plan X(CyberWarZone) When the team behind DARPA's Plan X mapped out where it wanted to go with research in the development of cyber capabilities and platforms, it knew the DARPA approach to problem solving included soliciting input from the leading experts in the field. On October 15 and 16, DARPA outlined its plans for Plan X to a packed house of potential developers and performers and solicited their feedback
DARPA Sponsors Surveillance Technology to Predict Future Behavior(The New American) It is foreseeable that such immensely powerful video summarizing technologies could be very valuable to the National Security Agency (NSA) employees who will soon be monitoring, recording, and storing the electronic communications of every American
All talk and no action (so far) on cyber threats(FCW.com) "We are not going to be able to secure every system and every company," said Jenny Menna, director of the Stakeholder Engagement and Cyber Infrastructure Resilience Division at the Department of Homeland Security and former acting director of the U.S.
India, Britain to step up cooperation in cyber security(Can India) India and Britain decided to step up cooperation in cyber security during their Foreign Minister-level talks here on Thursday. They also discussed the situation in Afghanistan and Pakistan besides cooperation in nuclear energy, defence and counter-terrorism, said officials who gave no additional details. At a joint press conference with External Affairs Minister Salman Khurshid, British Foreign Secretary William Hague supported Indias bid for membership in four export control regimes.
Did General Stumble On Strange Turf?(New York Times) High-level officials at the Federal Bureau of Investigation and the Justice Department were notified in the late summer that F.B.I. agents had uncovered what appeared to be an extramarital affair involving the director of the Central Intelligence Agency, David H. Petraeus, government officials said Sunday
Petraeus Probe Draws Scrutiny(Washington Post) Senior lawmakers called for an inquiry into the FBI's handling of the case of CIA Director David H. Petraeus on Sunday as new details and questions emerged about the investigation that led to his resignation last week
Canada fears becoming cyber-attack host(Metro News) The Public Safety Department worries Canada is becoming a digital launching pad for — not just a target of — malicious cyber-activities, confidential briefing notes reveal. Traditionally, most cyber-criminals are known for plotting their online schemes in places like Eastern Europe, East Asia and Africa, say departmental notes prepared for a closed-door meeting of the Cross-Cultural Roundtable on Security
Teenage Hacker 'Cosmo the God' Sentenced by California Court(Wired Threat Level) The 15 year-old UG Nazi hacker known as Cosmo or Cosmo the God was sentenced in juvenile court on Wednesday in Long Beach, California. According to Cosmo, he pled guilty to multiple felonies in exchange for a probation, encompassing all
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
E2 Innovate Conference & Expo(Santa Clara, California, November 14 - 15, 2012) E2 Innovate, formerly Enterprise 2.0, brings strategic business professionals together with industry influencers and next-gen enterprise technologies.
Anatomy of an Attack(New York, New York, November 15, 2012) Join Sophos security experts in exploring how threats like malware, Trojans, worms and spyware actually work and what you can do to protect your company, even if you're on a tight budget.
ZeroNights(Moscow, Russia, November 19 - 20, 2012) ZeroNights is an international conference dedicated to the technical side of information security. The mission of the conference is to disseminate information about new attack methods, threats and defense...
Digital Security Summit(Riyadh, Saudi Arabia, December 1 - 2, 2012) A major conference to discuss the growing threat to digital security in the Middle East, especially in Saudi Arabia.
Passwords^12(, January 1, 1970) Passwords^12 is a 3-day conference only about passwords & PIN codes. With an "all-star" cast of speakers, including Joan Daemen (AES/SHA3), Jens Steube (alias "atom", hashcat author), Colin Percival (CSO...
CIO Cloud Summit 2012(, January 1, 1970) The CIO Cloud Summit will help C-level executives better understand the true capabilities of cloud computing and the transformational opportunities it can bring.
BayThreat(Sunnyvale, California, December 7 - 8, 2012) The theme for BayThreat is a new spin on the dichotomy of attacking and defending in information security. We're calling out all of the attackers and defenders that are on the front lines of the battle.
2012 European Community SCADA and Process Control Summit(Barcelona, Spain, December 10 - 11, 2012) The European SCADA Summit brings together the program managers, control systems engineers, IT security professionals and critical infrastructure protection specialists from asset owning and operating organizations...
TechMentor Orlando 2013(Orland, Florida, USA, March 4 - 8, 2013) Celebrating 15 years of educational events for the IT community, TechMentor is returning to Orlando, Florida, March 4-8, for 5 days of information-packed sessions and workshops. Surrounded by your fellow...
e-Crime Congress 2013(London, England, March 12 - 13, 2013) The e-Crime Congress is designed to meet the needs of key stakeholders and decision makers who are responsible for designing and coordinating information security and risk management strategy, safeguarding...
The Future of Cyber Security 2013(London, England, UK, March 21, 2013) Cyber Security and the Citizen 2013 is a one-day conference and exhibition for senior decision-makers of central and local government organisations, NGOs and major private sector enterprises.
25th Annual FIRST Conference(Bangkok, Thailand, June 16 - 21, 2013) The annual FIRST conference provides a setting for conference participants to attend a wide range of presentations delivered by leading experts in both the CSIRT field and from the global security community.
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.