skip navigation

More signal. Less noise.

Daily briefing.

"Dark Seoul" didn't look like hacktivism or simple crime, and now the Republic of Korea has attributed the campaign to North Korea.

An email-based targeted attack probes Asian and European governments. Mounted from a Gmail account, it purports to be from the Chinese military; this is almost surely a false flag.

A new Android Master Key attack is found in the wild: it exploits Android's method of reading APK files to modify legitimate apps with malware.

Researcher Krzysztof Kotowicz reports that Amazon's 1Button browser add-on leaks user data in plain text. McAfee's ePolicy Orchestrator is vulnerable to exploitation (McAfee offers mitigation).

Dark Reading publishes a useful rundown of vulnerabilities in content management platforms. The landrush into disused Yahoo! accounts is on—analysts warn users of identity theft risk. Facebook's Graph Search is coming, and with it more identity exposure.

The cyber criminal black market's upscale offerings expand. The New York Times reports one criminal vendor charges $100k for an annual subscription, with additional fees for individual zero-days. One iOS zero-day seems to have gone for $500k. Insurance dossiers sell for about $1k.

Lloyd's finds cyber threats have risen to third place on its list of business risks. Companies fear insiders more than criminals. (What does this say about corporate culture?)

Start-ups develop privacy tools against government snooping. In-Q-Tel bankrolls HyTrust's insider threat protection.

Britain's GCHQ gets poor marks on internal oversight. Germany takes a tough line on data privacy. Russia's Putin calls Snowden an unwanted "Christmas present" from the US.


Today's issue includes events affecting China, Ecuador, European Union, Germany, Japan, Kenya, Republic of Korea, Democratic People's Republic of Korea, Russia, Taiwan, United Kingdom, United States..

Cyber Attacks, Threats, and Vulnerabilities

North Korea 'behind cyber attack' on South websites (BBC News) South Korea believes North Korea was behind cyber attacks against several websites last month, officials say. The attacks, which took place on the anniversary of the Korean War, hit the presidential office website, and several other official and media

Cyber War In The Korean Peninsula (Cyberwarzone) Over the past four years South Korea has been subjected to a growing number of Cyber War attacks, some of them quite damaging. In the last few months several teams of security researchers have concluded that nearly all these attacks were the work of one group of 10-50 people called DarkSeoul

Targeted Attacks Hit Asian, European Government Agencies (TrendLabs Security Intelligence Blog) Trend Micro researchers have uncovered a targeted attack launched against government agencies in various countries. The email claimed to be from the Chinese Ministry of National Defense, although it appears to have been sent from a Gmail account and did not use a Chinese name

Second Android Master Key Attack Surfaces (Threatpost) A second Android Master Key attack has been reported that takes advantage of the vulnerability in the way Android reads APK files, enabling hackers to modify signed legitimate apps with malware

Amazon 1Button Browser Add-on Leaks Data in Plain Text (Threatpost) Amazon 1Button, a browser add-on that provides users with easy access to the Amazon online marketplace, is leaking private information like a sieve, according to a security researcher

McAfee ePolicy Orchestrator exploitation tool (Help Net Security) US-CERT's latest advisory focuses on an exploit tool for McAfee ePolicy Orchestrator. The tool targets two vulnerabilities found in ePO versions 4.6.5 and earlier. In order to exploit these vulnerabilities

Malware Using Mandiant Name In Scareware Scam, Company Says (CRN) Mandiant, the company responsible for connecting China to a string of lengthy targeted campaigns against U.S. companies, said it has been notified of a scareware campaign that attempts to extort money from victims

The PlugX malware factory revisited: introducing "Smoaler" (Naked Security) Popular SophosLabs writer Gabor Szappanos is back with more insights into the Tibetan-themed Advanced Persistent Threat (APT) scene. This time, he looks at Smoaler, a new cousin of the PlugX family that starts off like what we've seen before, before branching off in new ways

Mac Malware Uses Right-to-Left Override Technique to Disguise Executables (SecurityWeek) Researchers at F-Secure have spotted a malware attack using a trick commonly associated with Windows malware to go after Mac users

WordPress, Other CMS Platforms Give Attackers Room For Creativity (Dark Reading) The recent news about the role WordPress played in a pair of New York Times breaches and a string of other compromises has refocused the spotlight on how content management systems (CMS) offer attackers fertile ground for sowing the seeds of criminal intrigue online

Yahoo's ID Land Rush Begins Today With Updated Security Measures (Wired) Yahoo is set to recycle unused YahooIDs today, as well as the email addresses associated with them. The company is implementing some new security measures to try to prevent instances of identity fraud with a new email header that attempts

The Ghost of Yahoo! Accounts Past (Fearless Web) Could your Yahoo! account be up for grabs? Yahoo! recently announced that it will make inactive Yahoo! accounts available for the public. Starting today July 15, anyone can grab Yahoo! IDs that have been unused for the past 12 months

Verizon Hack Turns Femtocells into Mobile Spy Stations (Inforsecurity Magazine) Femtocells are nice-to-have mini-cells that boost cellular coverage indoors, to prevent consumers from going down to one, slow bar inside a house or store. Verizon Wireless offers femtocells for home use, but it turns out they can do more than supercharge one's 3G - the $250 gadgets can also be turned into mobile spy stations

New OS X malware holds Macs for ransom, demands $300 fine to the FBI for 'viewing or distributing' porn (The Next Web) A new piece of malware is targeting OS X to extort money from victims by accusing them of illegally accessing pornography. Ransomware typically uses claims of breaking the law and names law enforcement (such as the CIA or FBI) to scare victims, but it is usually aimed at Windows users, not Mac users

Crooks hack into export company's email ids, dupe client of $31,000 (Times of India) A leading export house in the city has approached the cyber cell of Delhi Police after some unidentified crooks hacked into the company's email ids and duped their clients by sending them mails on their behalf. The crooks have even managed to get $31,000 from one of its clients

Dell SecureWorks Reports Hackers Selling Health Insurance Dossiers (Dark Reading) Earlier this year, Dell SecureWorks' Incident Response Team was called into a large healthcare company to investigate a possible cyber intrusion

Zero-day exploit in Apple's iOS operating system "sold for $500000" (Graham Cluley Security News) One of the most eyecatching claims of the article is that a highly-coveted zero-day exploit in iOS (the operating system used on iPhones and iPads) sold for $500,000, according to two unnamed people that reporters spoke to. It's easy to imagine how

Black market for software security flaws reaches new highs (ComputerWeekly) The black market in previously undiscovered vulnerabilities in commercial software is now so established, the average flaw sells for up to $160,000. One supplier of such so-called "zero-day" vulnerabilities charges customers an annual $100,000 subscription fee, and then further charges per sale, according to the New York Times (NYT)

FBI Agents Find Texas County's Personnel Files in Vietnam (eSecurity Planet) 16,000 current and former Harris County employees' names, birthdates and Social Security numbers were exposed

Texas Health Harris Methodist Hospital Acknowledges Data Breach (eSecurity Planet) Sheets of microfiche containing patient data were found in a park and other public areas in May 2013. Texas Health Harris Methodist Hospital Fort Worth recently began notifying patients who were seen between 1980 and 1990 that sheets of microfiche containing patient data, which had been given to document shredding vendor Shred-it to destroy, were found in a park in May 2013

Online Accounts of Jersey Shore Actors Highjacked by Hackers of TeamHype (Softpedia) Over the past days, the actors of the Jersey Shore TV series mentioned on Twitter that their online accounts were hacked. However, they haven't provided many details

The New Facebook Graph Search: How You're Helping Hackers Gather Information (infosec island) Over the next several weeks, Facebook will begin rolling out a large change in the way you search for information through their platform, starting with users that have their language set to U.S. English. When this feature is enabled on your profile, Facebook will notify you on your profile page and you will see the new Graph Search by looking at the top left side of your Facebook profile (Figure 1). You will see a search area called "Search for people, places and things"

Homeland Security: Recent cyber attacks hacked into energy networks (FuelFix) A series of recent cyber attacks used basic tools to break into power company networks and threaten their automated systems, according to a memo sent by the Department of Homeland Security

Cyber thieves tricking hotel WiFi users (Cyberwarzone) Travelers love to stay connected, even it means logging on during summer vacation. But there's a problem security experts say could pop up during a hotel stay

Security Patches, Mitigations, and Software Updates

Problems with MS13-057 (Internet Storm Center) Inforworld is reporting that the WMV codec patch included in MS13-057 causes a number of video related applications to show partially blank screens. The applications include Techsmith Camtasia, Adobe Premiere Pro CS6 and others

Master Key Bug Patch — Webroot SecureAnywhere Mobile Update on Google Play Now (Webroot Threat Blog) Last Friday we blogged about the radical Android OS bug 8219321, better known as the "Master Key" bug, which was reported by Bluebox Security. Check out last weeks blog if you haven't already: "The implications are huge!" – The Master Key Bug. We mentioned how we have been diligently working on protecting those not yet covered by patches or updates, and finding a solution for older devices as well. We are happy to report we have the solution! The newest version of Webroot SecureAnywhere Mobile with a patch for the "Master Key" bug can be found on the Google Play store now: Webroot SecureAnywhere Mobile

Android mega flaw fixed but phones remain vulnerable (CSO) Handset makers are slow to push fix to users, and fragmentation is not helping in the enterprise

Cyber Trends

Why privacy regulators are ineffective: an anthropologist's view (Light Blue Touchpaper) Privacy activists have complained for years that the Information Commissioner is useless, and compared him with captured regulators like the FSA and the Financial Ombudsman. However I've come across a paper by a well-known anthropologist that gives a different take on the problem

"Cyber Hell" According to Eugene Kasperky (SC Magazine) Eugene Kaspersky, head of Kaspersky Lab, visited Israel for the 3rd annual International Cyber Security Conference, sponsored by Tel Aviv University to discuss what he describes as "cyber hell"

Lloyds: Cybersecurity is the No. 3 Global Business Threat (Infosecurity Magazine) What a difference a year and a few high-profile hacking incidents makes: According to Lloyd's third annual Global Risk Index, cybersecurity is now a top-of-mind concern for businesses, having leapfrogged from 12th to third place on the threat scale

Much Security Spending Focused on Network Instead of Database: Survey (SecurityWeek) A new report shows that while the majority of enterprises believe a database security breach would be the greatest risk to their business, most IT security resources in today's enterprises are aimed at protecting network assets

Speakers discuss cyber security, protecting critical U.S. infrastructure at Rocket City TakeDownCon (All Alabama) The U.S. intelligence community is forecasting a future in which cyber technology is developed and implemented before the proper security measures are in place, according to (Ret) Lt. Gen. Ron Burgess, the former director of the U.S. Defense Intelligence Agency

Employees bigger cyber security threat than dedicated criminals (Information Daily) Over half of business leaders see their own employees as a bigger threat to cyber security than external attackers, according to the survey 'Boardroom Cyber Watch 2013'

BYOD makes compliance with financial phone recording rules challenging (FierceMobileIT) The increasing use of BYOD by financial firms is making compliance with financial phone recording rules—put in place following the global financial meltdown—much more difficult


Snowden points finger at Microsoft as Fed Buddy, while security pros point to public reaction as 'mass naivete'' (FierceBigData) According to a recent report in The Guardian, Edward Snowden, a former government contractor and self-proclaimed whistleblower, revealed that Microsoft gave government agencies pre-encryption access to email in Outlook and Hotmail; to web chats in Outlook; to its cloud storage service SkyDrive; and, to Skype calls. The revelation is one of many pertaining to government access to--and collection of--data from Internet giants such as Google, Facebook and Apple via a program called PRISM

Can hosting startups save us from government snooping? (FierceBigData) "It could be that we will see a whole new set of startups that will stake their claim to fame on their refusal to share data with U.S. law enforcement and federal agencies," says John Dickson, CEO of the Denim Group, an enterprise application security consultancy and software development company. "In all likelihood those startups will host your data in other countries in order to avoid U.S. laws that demand they comply"

Perimeter security managers are in demand (SC Magazine) There is increased demand for defensive-minded security pros with the ability to manage perimeter security technologies. These roles can be found in security teams that manage their own infrastructure

TCC to Provide Secure Voice Systems and Services for North African Program (MarketWatch) Technical Communications Corporation (nasdaqcm:TCCO) has been selected to supply the secure radio and telephone encryption solutions, and customized cryptographic services and tools for a domestic prime contractor supporting a government customer in North Africa. Initial orders totaling $800,000 have been received with follow-on potential of up to approximately $1 million over the next two years

In-Q-Tel, HyTrust Fight Insider Threats (InformationWeek) CIA's investment arm cuts deal with HyTrust, maker of virtual appliance that monitors virtualized and cloud-based environments to spot insider abuses. The actions of Edward Snowden, the National Security Agency contract employee who has been leaking information on vast classified data-gathering programs carried out by the agency, has raised fresh questions about how to guard against risks from insiders exposing government secrets

GSA to Issue Final $60B OASIS Vehicle Solicitations (GovConWire) The General Services Administration has set a timeline to launch final solicitations for its potential $60 billion multiple-award One Acquisition Solution for Integrated Services contract, Federal News Radio reported Friday

Despite sequestration, cybersecurity funding growing (Washington Post) Bucking the trend set by most other areas in the defense budget, cybersecurity is widely regarded as a growth area for the near future

Donald Fulop, Suzan Zimmerman Join CACI Business Development Team (GovConWire) CACI International (NYSE: CACI) has hired Daniel Fulop, a 20-year veteran of Lockheed Martin (NYSE: LMT), and 25-year industry veteran Suzan Zimmerman to the business development team. Fulop was appointed executive vice president for business development and Zimmerman was named senior VP for strategic campaigns, CACI announced Tuesday

Products, Services, and Solutions

Viewfinity Launches Industry–First App Control and Managed Admin Privileges (Dark Reading) Viewfinity Application Control automates method for rating, restricting, and classifying unknown applications

The only Utah ISP (and one of the few nationwide) standing up for user privacy (Ars Technica) Giving metadata or traffic monitoring not "necessary to protect the safety of Americans."

Detecting Targeted Attacks With SPuNge (TrendLabs Security Intelligence Blog) Over the last number of years there has been a noticeable rise in the number of reported targeted attacks, which are also commonly referred to as advanced persistent threats (APTs). Notable examples of said attacks include the Red October campaign or the IXESHE APT

Data brokers are tracking, selling your car's location for $10 online (FierceBigData) Where there is a will to serve you up for a buck or ten, there is always a way to do so and an ambitious group of souls willing to do it. Adam Tanner at Forbes reports that a prominent data broker, TLO online investigative systems, is advertising its Vehicle Sightings, a mega-database of one billion vehicle sightings, for just $10 per search

All You Need to Know about Google Drive (Kaspersky Daily) A little over a year ago, most of us woke up one day and discovered that Google Docs was gone, replaced by this weird new thing called Google Drive. Then we learned that Google Drive was our old Google Docs, but supposedly bigger and better. Today nobody bats an eye at it, and really we shouldn't have been surprised anyhow, given how much Google loves rebranding its significant features

Virtualization startup puts desktop apps seamlessly in the cloud (Ars Technica) "Native as a service" offering strives to bring the best of cloud and desktop. For software developers, cloud services solve all sorts of problems. They make it easy to ensure license compliance, they keep customers running up-to-date software, and they skip the need for downloads and installations. But cloud services also have their issues. It's hard for cloud services to take advantage of local compute resources such as fast CPUs and powerful GPUs. A compute-intensive cloud service will need to buy a lot of computation. They also lack the vast array of rich, complex desktop applications that already exist

Panda Releases Gold Protection Suite (Softpedia) Panda Security announced today the launch of a new product called Panda Gold Protection. It is a protection solution that transgresses the OS limits as it

Panda Security expands antivirus protection for government clouds ( To combat this threat, Panda Security has created Panda Cloud Systems Management (PCSM) that manages, monitors and supports all types of IT devices within

New computer is the size of a pack of index cards, costs $100 (VentureBeat) The Utilite computer, from CompuLab, will cost $100 and up for a full PC that's only slightly bigger than your phone. CompuLab, an Israeli maker of embedded computing products, has announced a tiny, bare-bones computer called the Utilite that will sell for $99 and up

Bitdefender debuts Photon technology with 2014 suite (ARNnet) Security vendor, Bitdefender, has launched the 2014 edition of its self-titled security package, which comes with the vendor's new Photon technology. The Photon update is designed to speed up scanning and boot time, as improve interaction with apps

Tortilla Tool Anonymously Routes Traffic Through Tor (Threatpost) Malware analysts are in a constant cat-and-mouse game with hackers when it comes to studying malicious code behaviors. Researchers handle malware samples gingerly, in a test network away from production machines and away from the Internet. Samples are opened in virtual machines and analysts observe not only malicious payloads, but communication with third-party servers

Technologies, Techniques, and Standards

SMBs Should Game Incident Response To Win (Dark Reading) Incident-response exercises are valuable at helping companies respond more quickly to security events, but they can also help educate businesses about the importance of being prepared

Decoy Personas for Safeguarding Online Identity Using Deception (Internet Storm Center) What if online scammers weren't sure whether the user account they are targeting is really yours, or whether the information they compiled about you is real? It's worth considering whether decoy online personas might help in the quest to safeguard our digital identities and data. I believe deception tactics, such as selective and careful use of honeypots, holds promise for defending enterprise IT resources. Some forms of deception could also protect individuals against online scammers and other attackers. This approach might not be quite practical today for most people, but in the future we might find it both necessary and achievable

The Security Pro's Guide To Responsible Vulnerability Disclosure (Dark Reading) A look at the changing nature of vulnerability disclosure -- and how it may affect your enterprise defenses. Since the early days of "ethical hacking" and security vulnerability analysis, researchers have followed a time-honored set of rules and traditions as to how to reveal the vulnerabilities they discover in a way that gives the bad guys as small a window as possible to exploit potential security holes in systems and software

SCADA Basic Security Considiration, Vulnerabilities ADVISORIES (Cyberwarzone) SCADA systems that tie together decentralized facilities such as power, oil, and gas pipelines and water distribution and wastewater collection systems were designed to be open, robust, and easily operated and repaired, but not necessarily secure

Helping Kids Understand Their 'Digital Footprint' (McAfee Blog) It's easy to talk in general about an important topic and apply a catchy phrase to it without our kids really ever understanding it. When it comes to explaining the weight of their digital footprint kids can quickly glaze over and check out if we fail to speak in terms that matter to them

Big Data's Big Question: What To Keep (InformationWeek) Keep as much data as your budget will allow, advises security expert -- it may answer questions you haven't thought up yet. How much data should your organization save? Storing terabytes of digital information is not only costly, it also can lead to decision-making headaches such as, "What data do I need to keep?

UEFI secure boot: Next generation booting or a controversial debate (Help Net Security) One of the first initiatives for secure booting has been the Unified Extensible Firmware Interface (UEFI) Initiative. UEFI is a superior replacement of the Basic Input Output System (BIOS) and a security

Migrating to the cloud? Here's how to do it right (VentureBeat) Is moving to the cloud as simple as they say? Probably not. Organizations that host large, integrated systems in their own data centres will no doubt be approached by their application vendors for migration to the silver lining of the cloud

Cybersecurity: code-breakers try to keep up with hackers (Cyberwarzone) Cybersecurity is high on the agenda right now. With societies, businesses and governments ever-more reliant on the Internet, new technologies that ensure protection from malicious software need to be developed

ITL Issues Guidelines for Managing the Security of Mobile Devices (ITL Bulletin) The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) recently published revised guidelines for managing the security of mobile devices. Written by Murugiah Souppaya of NIST and Karen Scarfone of Scarfone Cybersecurity, NIST Special Publication 800-124 Revision 1, Guidelines for Managing the Security of Mobile Devices in the Enterprise, will assist organizations in centrally managing the security of mobile devices such as smart phones and tablets. The document describes the security issues inherent in mobile device use and gives recommendations for selecting, implementing, and using centralized management technologies to secure mobile devices throughout their life cycles. While the publication primarily covers the security of organizational devices, the information can also apply to personally owned mobile devices

Research and Development

Uncertainty over the Uncertainty Principle (IEEE Spectrum) Eighty-six years after Werner Heisenberg first described his eponymous uncertainty principle, experts are still arguing over what, exactly, the infamous inequality really means. Briefly, of course, the principle says that the product of the uncertainties of position and momentum will always be greater than a constant —though a very, very tiny constant (see note below). The more tightly you tie one factor down, the more the other swings

Legislation, Policy, and Regulation

GCHQ spying programme: Spy watchdog 'is understaffed and totally ineffective' (The Independent) Watchdog's office consists of only 10 staff to monitor 10,000 working in spy agencies

Kenyan regulator looks to decommission domain registrar (IT World) The country's communications agency is looking to put in place a new registry, but the process is controversial. Kenya's telecommunications regulator is set to look for a new registrar for the country's .ke Top Level Domain, essentially decommissioning the Kenya Network Information Center (KENIC)

CCK set to duel with IANA/ICANN over .ke closure plans (Wanjiku) Few weeks ago, I got information that KENIC, the .ke registry was set to be wound up or sold. The first reaction was that the person was joking, given that KENIC is a multi stakeholder body, and it was not in debt

UK ISPs Not Happy with Heavy–Handed Government Porn Filter Proposals (Infosecurity Magazine) Last month David Cameron's 'pornification' advisor Claire Perry announced that UK ISPs would introduce opt-out porn filters by the end of this year in a voluntary scheme being introduced by the ISPs. But the ISPs are not happy

UK Government And ASPs At War, Shows Leaked Letter (Cyberwarzone) I've written before on the dialogue of the deaf between politicians and the internet industry over child internet safety - and now the relationship seems to be getting even worse. A letter sent to the UK's four leading ISPs from the government has made them very cross indeed. So cross that someone in the industry has passed it to me - you can read it in full below

Spy scandal: Merkel Demands Commitments from US; Reding Lends Support; Britain Objects (Infosecurity Magazine) On Sunday German Chancellor Angela Merkel made her strongest comments yet on the NSA/GCHQ spying scandal; while on Monday EU Justice Commissioner Viviane Reding welcomed Merkel's commitment to support strong and uniform EU data protection rules

Snowden's Ecuador Flirtation Sinks Into Trade Feud (Bloomberg) Ecuador's spat with the U.S. over the fugitive whistleblower Edward Snowden cost exporters special access to the world's biggest economy and may make the country's planned bond sale more expensive

Leaks from Edward Snowden focus attention on NSA director Keith Alexander (Washington Post) The secret documents describing U.S. surveillance operations that Edward Snowden gave to journalists have focused new attention on the National Security Agency and its director, Gen. Keith Alexander. Alexander has worked tirelessly since taking charge

Why Prism Is The Right Investment (InformationWeek) Prism doesn't scare me. On 9/11, my office was on the 39th floor of One World Trade. I was one of the many nameless people you saw on the news running from the towers as they collapsed

This Week in Tech: House to examine NSA surveillance programs (The Hill) "In light of recent national security leaks pertaining to some of the National Security Administration's intelligence gathering programs, this hearing will afford Members of Congress and the American public the opportunity to hear from Obama

McAfee's Schneck likely choice for DHS cybersecurity chief (The Hill) Phyllis Schneck, vice president and chief technology officer for the public sector at McAfee, is the likely choice to be the next deputy undersecretary for cybersecurity at the Department of Homeland Security, according to two sources familiar with the

Merkel Gets Behind Controversial European Data Protection Reform (TechWeek Europe) German Chancellor Angela Merkel has given her backing to controversial data protection reforms in the European Union, following the revelations of US surveillance whistleblower Edward Snowden

Draft bill would codify NIST cybersecurity framework into law (Cyberwarzone) A draft cybersecurity bill being circulated by the Democratic and Republican heads of the Senate Commerce, Science & Transportation Committee would codify in law the cybersecurity framework called for by President Obama in a Feb. 12 executive order

Nations Boost Cyber Defense Spending to Protect Critical Infrastructure (SecurityWeek) As concerns mount about the possibility of a cyber-attack against critical infrastructure, countries are focusing on boosting their security spending to include cyber-defenses

United Nations: Snowden affair is chance for truce in cyber war (Cyberwarzone) Edward Snowden's revelations about U.S. Internet surveillance have created a chance for countries to call a halt to a cyber war, a senior U.N. official said on Monday

White House, Google and Others Adopt Plan To Choke Off Ad Revenue From Pirate Sites (TechCrunch) The White House is in league with top Internet advertising companies to rain on everyone's free-software parade: a new industry standard has been adopted to remove ads from pirate websites in an attempt to choke off their revenue stream. The voluntary agreement says that companies will remove revenue sharing relationships with a website after users submit a complaint and an internal

States Seek Direct Messages For Health Data During Disasters (InformationWeek) 10 states recently entered a compact to exchange patient data in case of a natural or a man-made disaster. No solution covers the entire country, however

Litigation, Investigation, and Law Enforcement

DHS warns employees not to read leaked NSA information (Washington Post) The Department of Homeland Security has warned its employees that the government may penalize them for opening a Washington Post article containing a classified slide that shows how the National Security Agency eavesdrops on international

Yahoo wins motion to declassify court documents in PRISM case (CNET) Yahoo wins motion to declassify court documents in PRISM case. Ruling will allow the Internet company to publicly reveal it challenged a U.S. government order to participate in the National Security Agency's controversial data collection program

Facebook's silence on PRISM could result in legal action (Daily Dot) After Facebook went public in 2012, the company was praised for its honesty about the risks facing potential investors. When any corporation makes an initial public filing with the Securities and Exchange Commission (SEC), it is required by law to disclose all the known risks to shareholders. But Facebook, it seemed, had gone above and beyond

Classified Programs Challenged In Court (Washington Post) The recent disclosure of U.S. surveillance methods is providing opponents of classified programs with new openings to challenge their constitutionality, according to civil libertarians and some legal experts

Snowden applies for temporary asylum in Russia (USA Today) Intelligence leaker Edward Snowden formally submitted an application for temporary asylum in Russia on Tuesday, his lawyer said

Putin: Snowden a dubious present (The Seattle Times) Russian President Vladimir Putin on Monday characterized National Security Agency leaker Edward Snowden's long stay at a Moscow airport as an unwelcome present foisted on Russia by the United States. In comments reported by Russian news agencies

Putin suggests Snowden may stop leaking documents (CSO) The former NSA contractor will leave Russia as soon as possible, Russia president says. Edward Snowden, the leaker of U.S. National Security Agency surveillance activities, may have changed his position about disclosing more information in the future, Russian President Vladimir Putin said Monday, according to news reports

Putin hopes Snowden will leave Russia soon (USA Today) Putin says the U.S., by revoking Snowden's passport, has kept him stuck in Moscow. Russian President Vladimir Putin said Monday that NSA leaker Edward Snowden would leave the country at the "earliest opportunity"

Sony drops PSN breach appeal after risk assessment (CSO) PlayStation creator decides to pay hefty fine for 2011 data breach, cites confidentiality of network security as reason for walking away from appeal. Sony, entertainment giant and the company most noted in the security world as the source of a massive breach that impacted millions of accounts in 2011, has said they will abandon the appeal that was filed with the Information Commissioner's Office (ICO) in the U.K., due to security concerns. The move means they will pay the £250,000 fine ($377,400) levied against the company earlier this year and walk away from the table

Class-action filed against convenience store over breach (SC Magazine) A man in Northport, Ala. is suing a convenience store chain that experienced a credit card breach this spring. Ian Yeager filed a class-action lawsuit against Brentwood, Tenn.-based Mapco Express

Mugshot-Removal Sites Accused of Extortion (Wired) The growing online mugshot-removal racket — where arrestees pay sometimes hundreds of dollars to remove their mugs — is being hit with extortion accusations in a novel lawsuit testing the bounds of the First Amendment

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

EAGB Summer Quarterly Webinar (Webinar, July 24, 2013) Join us Wednesday, July 24 from 10:00-11:00 AM as Patrick Dougherty discusses the EAGB's two newest reports: the Summer 2013 Quarterly Regional Economic Update and Cyber Security in Greater Baltimore:...

London Summer 2013 (London, England, UK, July 9 - 16, 2013) SANS London Summer takes place at the London Marriott Hotel Kensington and gives security professionals the opportunity to take one of four of SANS most popular 6-day courses and the 2-day "Securing The...

Mobility Solutions for the Federal Market (Falls Church, Virginia, USA, July 16, 2013) With the improvements in mobile technology, smart phones and tablets, DOD, DHS and Civilian agencies have an opportunity to improve their service delivery models and the programs that serve their constituents.

2013 World Comp (Las Vegas, Nevada, USA, July 22 - 23, 2013) 2200 leading researchers, academics, and executives from government, academia and industry will come together at this annual event which facilitates communication among researchers in different fields...

Black Hat 2013 (Las Vegas, Nevada, USA, July 27 - August 1, 2013) Black Hat USA is a major international security conference, featuring learning, networking, and skill-building. Sessions include training, briefings, technical presentations, and more.

SECRYPT 2013 (Reykjavik, Iceland, July 29 - 31, 2013) The 10th International Conference on Security and Cryptography (SECRYPT 2013) will take place from 29 to 31 July 2013 in Reykjavik, Iceland…The conference will focus on information systems and network...

International Conference on Cyber Security (New York, New York, USA, August 5 - 8, 2013) The Federal Bureau of Investigation and Fordham University will host the fourth International Conference on Cyber Security (ICCS 2013) on August 5 - 8, 2013 in New York City. ICCS, the White Hat Summit,...

SINET Innovation Summit (New York, New York, USA, August 6, 2013) The purpose of the Innovation Summit is to reinvigorate public private partnership efforts and increase relationships between industry, government and academia that fosters sharing of information and collaboration...

3rd Annual Cyber Security Training Forum (Colorado Springs, Colorado, USA, August 6 - 7, 2013) The Information Systems Security Association (ISSA) - Colorado Springs Chapter and FBC, Inc. will once again host the 3rd Annual Cyber Security Training Forum (CSTF). Formerly known as the Cyber Security...

AIAA Aviation 2013 (Los Angeles, California, USA, August 12 - 14, 2013) Leading cybersecurity experts will speak at AIAA AVIATION 2013, being held August 12-14 at the Hyatt Regency Century Plaza, Los Angeles, Calif. Hosted by the American Institute of Aeronautics and Astronautics,...

A Cloud Computing Introduction for Manager (Columbia, Maryland, Sioux Falls, August 13, 2013) Cloud computing is becoming popular. More and more Technical Managers and Project Managers will be interacting with cloud computing, either developing clouds, using clouds, or selecting among cloud and...

Resilience Week 201 (San Francisco, California, USA, August 13 - 15, 2013) 2013 Resilience Week brings together colleagues across government, academia and industry to facilitate an exchange of ideas dedicated to promising research in resilient systems that will protect cyber-physical...

Kirtland AFB/Sandia/DOE Cyber Security Seminar & IT Expo (Albuquerque, New Mexico, USA, August 15, 2013) This expo is designed to stimulate exchanges of information between industry partners and Kirtland AFB Information Management Officers', Information Technology personnel, Contracting Officers' as well...

National SCADA Conference (Melbourne, Victoria, Australia, August 15 - 16, 2013) The 12th Annual National SCADA Conference, Australia's largest and longest running SCADA conference, will bring together many of the luminaries of the Australian and International SCADA community to evaluate...

First International Conference on Cyber-Physical Systems, Networks, and Application (Taipei, Taiwan, August 19 - 20, 2013) CPSNA 2013 will focus on core challenges of cyber-physical systems. Given a tight integration of computation and the physical world, cyber-physical systems must compose robust systems, networks, and applications...

SANS Thailand 201 (Bangkok, Thailand, August 19 - 31, 2013) SANS hands-on advanced Information Security training is coming to Thailand this August! SANS is bringing our Web App Penetration Testing course to the Crowne Plaza Bangkok Lumpini Park in Bangkok, Thailand.

Human Cyber Forensics Forum (Washington, DC, USA, August 21, 2013) This forum brings together subject matter experts to discover and share new means of recognizing the human indicators related to cyber intrusions, and the evolution of these human indicators in the coming...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.