The Guardian believes the cyber attacks it's sustained from the Syrian Electronic Army are opening shots in a pro-Assad campaign against Western media.
China reportedly shifts its cyber target set in Taiwan from government agencies to private industry. Taiwan announces expansion of its cyber security forces.
Apache webservers are under widespread, sophisticated attack. Compromised HTTP binaries redirect users to malicious sites where they're infected with (among other malware) the Blackhole exploit kit. The attacks conceal themselves by running in shared memory.
LivingSocial, recovering from last week's compromise, dumps the SHA1 hash in favor of more powerful encryption.
Researchers at Northwestern and North Carolina State find popular Android antivirus products easily defeated by obfuscated malware.
Despite longstanding and well-founded American woofing about the hazards of using Chinese hardware, US Africa Command purchases Chinese communication satellite services.
A study by the Economic Policy Institute disputes conventional wisdom about a shortage of tech talent in the US. The problem appears instead to be a mismatch of jobs with specific skills. Several approaches to remediating the mismatch are discussed, from MOOCs to student tracking platforms, but none seem an obvious breakout solution.
The US Defense Department considers elevating Cyber Command to an independent unified combatant command.
Litigation news is the usual squalid tally of creepy greed and motiveless malice, relieved by the curious story of the (alleged) CyberBunker DDoS specialist being extradited to the Netherlands. He's thought to be one Sven Olaf Kamphuis, "minister of telecommunications and foreign affairs for the Republic of CyberBunker."
Today's issue includes events affecting China, Estonia, Finland, Germany, Italy, Lithuania, Mexico, NATO, Netherlands, Poland, Romania, Slovakia, Spain, Syria, Taiwan, United Kingdom, United States..
Cyber Attacks, Threats, and Vulnerabilities
Pro-Assad Syrian hackers launching cyber-attacks on western media(The Guardian) The Guardian has come under a cyber-attack from Syrian hackers who have targeted a series of western media organisations in an apparent effort to cause disruption and spread support for President Bashar al-Assad's regime. The Syrian Electronic Army
China's Shifting Cyber Focus on Taiwan(The Diplomat) Hackers from the Chinese military appear to have shifted the focus of their attacks against Taiwan from government institutions to the civilian sector, including think tanks, telecommunications, Internet nodes, and traffic signal control systems, the island's top civilian spy agency said in a new report
Taiwan to expand cyber security force: defense minister(Focus Taiwan News Channel) Minister of National Defense Kao Hua-chu said Monday that the military will establish a new information and electronic warfare squadron to better protect the country from cyber attack. Fielding questions at a hearing of the
Attack Using Backdoored Apache Binaries to Lead to Blackhole Kit(Threatpost) There is a newly identified ongoing attack campaign in which attackers are using compromised Apache HTTP binaries to redirect users to malicious sites serving various flavors of malware, including the Blackhole exploit kit. Rather than going the traditional route of simply injecting malicious code onto target Web sites, this attack crew is replacing the existing
Sophisticated Apache backdoor in the wild(Help Net Security) ESET researchers, together with web security firm Sucuri, have been analyzing a new threat affecting Apache webservers. The threat is a highly advanced and stealthy backdoor being used to drive traffic
Admin beware: Attack hitting Apache websites is invisible to the naked eye(Ars Technica) Newly discovered Linux/Cdorked evades detection by running in shared memory. Ongoing exploits infecting tens of thousands of reputable sites running the Apache Web server have only grown more powerful and stealthy since Ars first reported on them four weeks ago. Researchers have now documented highly sophisticated features that make these exploits invisible without the use of special forensic detection methods
Backdoor malware hits clearing house clients(GMA News) Security vendor Bitdefender said the fake payment receipts are part of what it called "a rising wave" of spam emails targeting credit card data. "This is not the first time ACH users are targeted by malware. In November 2011, a bank refusal e-mail came
Adobe PDF Zero-Day Flaw Enables Location Tracking(CRN) McAfee has detected ongoing attacks targeting an Adobe Reader zero-day vulnerability that could enable attackers to conduct location tracking of a malicious file. The firm said it detected malicious PDF files that can enable a sender to see when and
Texas Board of Professional Land Surveying Hacked(eSecurity Planet) Hacker DasTn wrote on the site, 'We chose the path of electronic jihad.' Hacker DasTn of The Outlaws recently defaced the Web site for the Texas Board of Professional Land Surveying
LulzSec Hackers Take Down NTT DoCoMo USA(eSecurity Planet) Following last week's publication of customer data, the hackers took down the company's U.S. Web site earlier today. After publishing customer information taken from NTT DoCoMo on Friday, members of LulzSec today announced that they had knocked NTT DoCoMo's U.S. Web site online
Hacker JokerCracker Hits Mexican Web Sites(eSecurity Planet) A hacker named JokerCracker recently defaced a seemingly random collection of Web sites in Mexico, including those of the Ministry of Government Administration and Finance of the State of Nayarit, the Insitute for the Education of Young People and Adults of Aguscalientes, a branch of the Universidad Iberoamericana, a balloon company called Globos Fiesta y Color
LivingSocial Ups Its Password Encryption Following Massive Breach(Threatpost) The popular daily deal site LivingSocial announced Monday it has abandoned the SHA1 hash for Blowfish's bcrypt following a massive data breach that impacted 50 million customers. The company confirmed last weekend that its computer systems were attacked and thieves gained access to names, e-mail addresses, date of birth (for some users) and encrypted passwords
Good Morning, Captain: open IP ports let anyone track ships on Internet(Ars Technica) While digging through the data unearthed in an unprecedented census of nearly the entire Internet, Researchers at Rapid7 Labs have discovered a lot of things they didn't expect to find openly responding to port scans. One of the biggest surprises they discovered was the availability of data that allowed them to track the movements of more than 34,000 ships at sea. The data can pinpoint ships down to their precise geographic location through Automated Identification System receivers connected to the Internet
Faked celebrity gossip fuels Facebook scams(USA Today) The Top 10 Facebook scams revolve around come-ons to view lewd content relating to Kim Kardashian, Megan Fox, Justin Bieber, Selena Gomez and Chris Brown, according to analysis from Romanian anti-virus company BitDefender
Recent Breaches More Likely To Result In Fraud(Dark Reading) A victim whose data is stolen in the last year will have a 1-in-4 chance of becoming a fraud victim as well, says Javelin's latest breach analysis. A year-old breach of a Utah Department of Health (UDOH) server that resulted in the theft of personally identifiable information on 780,000 Utahns will likely result in up to $500 million in fraud and other damages to the victims, underscoring the ultimate costs of security lapses, analyst and consulting firm Javelin Strategy & Research said in an analysis of the costs released on Monday
Symantec: Majority of enterprises reported at least one mobile security incident in the past year(FierceMobileIT) The majority of enterprises have reported at least one mobile security incident within the past 12 months, according to a survey conducted by security firm Symantec. The Symantec results jive with other surveys that have found increased enterprise mobile security risks and concerns about mobile devices, particularly personally-owned ones. For example, a survey of 1,600 members of LinkedIn's Information Security Group found that a majority of companies are concerned that BYOD could lead to data loss or unauthorized access to sensitive data
NATO conducts annual cyber defence exercise(IT News) The Western European and North American mutual defence pact organisation NATO has concluded an annual cyber defence exercise, defending a fictitious network against incoming attacks
SCIT Labs Awarded $389k Navy Cyber Security Contract(Sacramento Bee) Michael Hayden, former Director of the Central Intelligence Agency and National Security Agency, said, "SCIT technology shifts the cyber security focus from vulnerability elimination to consequence management. If successful, this technology will have
CACI to Update State Dept Security System Software(GovConWire) CACI International (NYSE: CACI) has won a potential $54 million contract to update software applications and other technology for mission systems used byBudget Year the State Department's bureau of diplomatic security. The development, modernization, and enhancement contract contains one base year and four option years, CACI said Monday
America's tech talent shortage is a myth(Quartz) So it turns out the United States is not, in fact, the educational wasteland tech industry lobbyists would have you think. Companies like Microsoft often claim that America is suffering from an economically hobbling shortage of science, math, and computer talent. The solution, they argue, is to let employers fill their hiring gaps by importing tens of thousands of educated guest workers beyond what the law currently allows. Much as farmers want to bring in field workers from Mexico on short-term visas, software developers desperately want to bring in more coders from India
Meritful Launches A Student CRM Platform To Help Recruiters Keep Tabs On Campus Talent(TechCrunch) College recruiting is becoming increasingly competitive. Companies have begun to realize that top graduates not only bring a lot of talent and energy to the table, but they also tend to cost less than more experienced prospects. But in order to successfully woo those fortunate enough to have their pick, businesses need to begin the recruiting process earlier. If they're going to stand a chance
Why Massive Open Online Courses Matter to Recruiters(ERE) The world of education, training, and professional development is being disrupted by MOOCs. In case you're not familiar with that acronym, MOOC stands for Massive Open Online Course. Although they have been around for years, MOOCs have recently been heralded as the future of learning
Seattle 'white hats' probe cyber security flaws(My Northwest) He's 26, likes industrial and electronic music, has a bleached-blond Mohawk haircut and sometimes, Mikhail Davidov says, he starts his day "at the crack of noon." The late hours are in front of a computer, working on reverse engineering, tearing apart computer programs to find their vulnerabilities. Sometimes he works 18 hours straight. "There are few hackers out there who are `morning people,' " says Davidov
Products, Services, and Solutions
Kloudless Launches Service That Uses Connectors To Move Files Between Different Cloud Services(TechCrunch) Kloudless launched at Disrupt NY 2013 today with its service for moving data from email to different cloud platforms through connectors which act like pipes that flow between the different services. The service offers a plugin that the user installs in Outlook or as an extension through their web browser to use in Gmail or other apps, said CEO Eliot Sun. Kloudless does not store any data
Self-updating apps are now banned from Google Play(Help Net Security) Google has made added a short but very significant clause to its Google Play Developer Program Policies, banning apps downloaded from the official store to "modify, replace or update its own APK binaries
Free firewall configuration search tool(Help Net Security) SolarWinds released its new Firewall Browser free tool, which enables IT professionals to easily troubleshoot firewalls and manage change requests from the convenience of the desktop
Google releases Android-based kernel code for Google Glass(FierceMobileIT) Google (NASDAQ: GOOG) has released its Android-based core kernel code for Google Glass, which should spur more app developers to join the Google Glass party. Google stressed that the current site for the kernel code will not be the permanent site
Procera Networks to Showcase Award-Winning NAVL OEM DPI Engine at Interop Las Vegas 2013(Virtual Strategy) Procera Networks, Inc. (NASDAQ: PKT), the global network intelligence company, today announced it will demonstrate its award-winning Network Application Visibility Library (NAVL) at Interop Las Vegas 2013, taking place May 6-10 at the Mandalay Bay Convention Center. Procera will demonstrate its combined technology products with partners Napatech, the world's largest vendor of intelligent adapters for network monitoring and analysis, and Netronome, a fabless semiconductor company, at Interop booth #658
How secure [are] your confidential data?(Help Net Security) It seems ages ago that companies were first warned about the danger of confidential information being found in trash bags in front of the office, yet despite the use of shredders and complex security
Flying High: Why The Military Is Taking Cyber Warfare Seriously(Forbes) In addition to the class in Cyber Warfare, there was also a cadet Cyber Warfare Club and an annual National Security Agency Cyber Warfare competition. The Air Force competes with other military branches and National Guard units; the instructor proudly
Should cyber warfare be elevated to highest command structure?(Stars and Stripes) Over the past year, defense secretaries Leon Panetta and Chuck Hagel have considered pulling U.S. Cyber Command out from under U.S. Strategic Command and making it a unified combatant command, on par with the six regional combatant commands
Litigation, Investigation, and Law Enforcement
How the FBI cracked a "sextortion" plot against pro poker players(Ars Technica) "We don't just fly out here and kick in your door knowing only a little." At 8:05am on the morning of December 1, 2010, an FBI search warrant team swarmed up to a Silicon Valley home on an unusual misson: find the "sextortionist" who had been blackmailing pro poker players over the Internet. One agent pounded on the door and shouted out, "FBI!" Movement was heard inside, but no one opened the door. The agent knocked again, but the door stayed shut, so out came the battering ram. Wham—the door gave and FBI agents flooded inside, guns drawn in the dim light
How did a hacker get into UGA system?(Augusta Chronicle) University of Georgia officials thought they might have been under attack from hackers when the identities of thousands of employees and students went missing last fall. It turned out, however, to be the work of a single person, a former UGA student, who used a proxy server that disguised the Internet Protocol address of his computer. He later committed suicide
Cyber attack suspect to be sent home to Netherlands(Sydney Morning Herald) A Dutch citizen arrested in Spain on suspicion of launching what authorities have called the biggest cyber attack in internet history is expected to be handed over to the Netherlands within 10 days, a Spanish court official says
Top intelligence official orders broad review of information(Boston Globe) The new review of agencies' handling of information prior to the attack will be conducted in conjunction with the inspectors general from the CIA, Department of Justice (which oversees the FBI), and the Department of Homeland Security, which "have
Privacy surprises…that somehow aren't(Volokh Conspiracy) If you're looking for laws of unintended consequences, you can't do better than privacy. Take two examples plucked from last week's front pages
Fascinating New Case on Legal Standards for Searching a Remote Computer With Unknown Location(Volokh Conspiracy) Here's a fascinating issue that just led to an unusual opinion by Magistrate Judge Stephen Wm. Smith of the Southern District of Texas, who is no stranger to the Volokh Conspiracy for his, um, unusual opinions. The issue: What are the legal standards for the government to search a hacker's remote computer to determine the hacker's identity and location? In this case, someone hacked the e-mail account of a victim in Texas and used the e-mail account to access the victim's bank account. After the unauthorized access to the account was blocked, the hacker set up an e-mail address almost (not not quite) identical to the real e-mail account and tried to wire money to a foreign bank. The location of the hacker is unknown, although there are signs that he is abroad: The most recent IP address resolved to a country in Southeast Asia. In this case, the government applied for a search warrant to remotely access the intruder's computer and search it for evidence of who the intruder is and where he located
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
TechExpo Cyber Security Hiring Event(Columbia, Maryland, USA, April 30, 2013) A hiring event for experienced cyber security professionals, with many leading companies in attendance and interviewing on-the-spot. Learn from the distinguished speakers' panel, details of which will...
INSA Leadership Dinner Featuring Betty Sapp, Director, NRO(Reston, Virginia, USA, April 25, 2013) - This leadership dinner will feature a keynote address from Betty Sapp, Director of the National Reconnaissance Office highlighting her focus on innovation at the NRO and for the Intelligence Community.
Symposium on Cybersecurity & Information Assurance(Teaneck, New Jersey, USA, May 1, 2013) Fairleigh Dickinson University's Center for Cybersecurity and Information Assurance is pleased to announce its inaugural Symposium on Cybersecurity and Information Assurance to be held on May 1, 2013 in...
Critical Security Controls International Summit(London, England, UK, May 1 - 2, 2013) The SANS Institute will be hosting the Critical Security Controls International Summit in London from May 1st to May 2nd at the London Hilton on Park Lane hotel. The Summit focuses on the Critical Security...
INSA Leadership Dinner with NGA Director Letitia Long(McLean, Virginia, USA, May 2, 2013) NGA At the Crossroads - Visualizing the Future. Join INSA and NGA Director Letitia Long as she shares her vision for transforming NGA and GeoInt in innovative ways that more effectively put the power of...
Interop Las Vegas(Las Vegas, Nevada, USA, May 6 - 10, 2013) Attend Interop Las Vegas, May 6-10, and attend the most thorough training on Apple deployment at the NEW Mac & iOS IT Conference. Join us in Las Vegas for access to 125+ workshops and conference classes,...
ITWeb Security Summit 2013(Sandton, South Africa, May 7 - 9, 2013) A conference devoted to cyber security, with a particular emphasis on countering the latest attack vectors. The gathering creates an opportunity for senior security professionals and business decision-makers...
The Computer Forensics Show(New York City, New York, USA, May 8 - 9, 2013) For IT and business executives responsible for creating, implementing, and managing a proactive and comprehensive IT strategy for information security, risk management, compliance, and business continuity...
ASIS 23rd New York City Security Conference and Expo(New York City, New York, USA, May 8 - 9, 2013) Join more than 2,500 professionals in the Big Apple for the largest annual conference in the Northeast for security management and law enforcement professionals. This exciting event will focus on key challenges...
Software Engineering Institute Invitational Hiring Event(Arlington, Virginia, USA, May 8 - 9, 2013) Attention software engineers and cyber security professionals: Carnegie Mellon's Software Engineering Institute needs your top notch skills to meet today's challenges. SEI staff will be interviewing on...
Baltimore Tech-Security Conference(Baltimore, Maryland, USA, May 9, 2013) The Baltimore Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security,...
CyberSecurity UAE Summit 2013(Dubai, UAE, May 13 - 14, 2013) Review developments, strategies and best practice in global cyber security. Assess the nature of the latest threats being faced and the impact of these upon your organisation. Discuss the most promising...
GovSec(Washington, DC, USA, May 13 - 15, 2013) GovSec is the nation's premier event for Government, Homeland Security, and Law Enforcement professionals looking for proven strategies and cost effective technology so they can achieve their mission of...
Thriving in the Post-Sequestration GovCon Era(McLean, Virginia, USA, May 14, 2013) The Potomac Officers Club is hosting a summit for GovCon executives and government leaders to collaborate and share ideas on how to navigate a new era involving sequestration. At least five speakers, each...
Second Maryland Cybersecurity Center Symposium (MC2)(College Park, Maryland, USA, May 14 - 15, 2013) Drawing on regional experts of national and international acclaim, MC2's second Annual Cybersecurity Symposium will showcase the latest research, trends, and topics in cybersecurity, including: keynote...
FOSE(Washington, DC, May 14 - 16, 2013) FOSE is the premier event for government technology professionals interested in innovative, effective tools and solutions allowing you and your agency or organization to advance your mission. From IT managers...
7th Annual INSA IC Industry Day(Springfield, Virginia, USA, May 15, 2013) This annual event is held at the TS/SCI level in cooperation with ODNI as a comprehensive forum for IC leaders to relate their budget priorities to industry. The theme of this year's IC industry day is...
Hack Miami(Miami, Florida, USA, May 17 - 19, 2013) The HackMiami 2013 Hackers Conference seeks to bring together the brightest minds within the information security industry and the digital underground. This conference will showcase cutting edge tools,...
CEIC 2013(Orlando, Florida, USA, May 19 - 22, 2013) The largest digital-investigations conference of its kind and the only one to offer hands-on lab sessions for practical skills development. CEIC offers relevant and practical information from expert speakers.
IEEE Symposium on Security and Privacy(San Francisco, California, USA, May 19 - 22, 2013) Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers...
International Workshop on Cyber Crime (IWCC)(San Francisco, California, USA, May 24, 2013) The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field...
Web 2.0 Security and Privacy(San Francisco, California, USA, May 24, 2013) The goal of this one-day workshop is to bring together researchers and practitioners from academia and industry to focus on understanding Web 2.0 security and privacy issues, and to establish new collaborations...
Maryland/DC Celebration of International Trade(Linthicum, Maryland, USA, May 21, 2013) Join Maryland exporters and international business experts as they celebrate International Trade Week. Hosted by the Maryland/DC District Export Council this event is a content rich celebration of international...
IEEE-Cyber 2013(Nanjing, China, May 26 - 29, 2013) This conference will cover cyber physical systems, cyber control and automation, cyber robotics, and the Internet of things.
Cyber Security @ CeBIT(Sydney, New South Wales, Australia, May 28 - 30, 2013) The Cyber Security Conference will serve as a platform where all those involved in securing and governing ICT within an organisation can discuss the newest challenges and strategies. The event is a must-attend...
Cyber Security for the Chemical Industry(Franfurt, Hessen, Germany, May 29 - 30, 2013) It is becoming increasingly more important than ever to be aware of the latest cyber threats, and equipped to protect your company from them. In addition to physical security, these industries are faced...
DGI Cyber Security Conference & Expo(Washington, DC, 2013, May 30, 2013) Data security threats continue to increase in number and sophistication. The growing use of collaborative technologies - from mobile devices and social media to virtualization and cloud computing - will...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.