India worries it will be caught in a coming Russo-American cyber "crossfire" triggered by tension over Russian incursions into Ukraine.
Europe Online notes a level of nuisance achieved by OpIsrael, but on balance calls the action a fizzle. An Indian vigilante hacktivist appears to have downed a major Pakistani Taliban site.
Such regional tensions aside, the major news today is the disclosure of "Heartbleed," a vulnerability in the OpenSSL cryptographic software library. Heartbleed exposes information normally protected by SSL/TLS encryption, rendering it vulnerable to snooping. Among the data particularly at risk are private keys, usernames, and passwords. Some of the more famous sites known to be leaky are Yahoo Mail, Lastpass, OpenSSL, and the principal FBI site. Information at SecureDrop (a service popular with journalists) is also at risk. A fix is out: OpenSSL 1.0.1g.
Google has removed a bogus (and malicious) security app, "Virus Shield," from its Google Play store, but not before Virus Shield achieved best-seller status.
Trend Micro has an interesting overview on cyber criminals' infestation of the Dark Web.
It's Patch Tuesday, and Microsoft Windows XP officially enters the afterlife, its passing marked by advice on how to mitigate the risks its expiration brings.
Yahoo closes a Flickr privacy hole.
The US and China cyber talks are under way, and Forbes thinks their purpose (from the US point-of-view) is as much deterrence as reassurance.
The US Supreme Court declines to fast-track a surveillance review: SCOTUS will let the issue work its way up through lower courts.
Today's issue includes events affecting Canada, China, European Union, Germany, India, Israel, Pakistan, Palestinian Territories, Russia, Ukraine, United Kingdom, United States..
Dateline SINET ITSEF 2014
IT Security Entrepreneurs Forum (ITSEF) 2014: Workshops(SINET) Workshops begin this afternoon in Mountain View. Session topics include: "What Are Our Top Ten Needs and Priorities in 2014?" "Cybersecurity — A Big Data Problem — What Are We Doing About It?" "Federal Spending: What's the Real Market for the Private Sector?" "Guidance For Startups: Evaluating and Working With Enterprise Prospects," "Hyperconnectivity: The Promise and Peril of a Fully Connected World," "Convergence of Physical and Cyber: Identity, Access and Compliance: Where are we Headed?" "Cybersecurity Automation and Capability Re-Orientation," and "Mobile and Smart Devices Relationship to the Cloud — What are the Regulatory, Legal and Security Challenges?"
IT Security Entrepreneurs Forum (ITSEF) 2014: Forum(SINET) SINET ITSEF's Forum continues all day tomorrow, April 9, with keynote addresses by Alejandro Mayorkas, Deputy Secretary, US Department of Homeland Security, who will give us a perspective from DHS, and Kjetil Nilsen, Director General, Nasjonal Sikkerhetsmyndighet (NSM - Norway's National Security Authority) who will speak on the "Nordic Cybersecurity Model of Trust."
97% of U.S. Enterprises Fear Insider Security Threats(MSPmentor) Vormetric, an enterprise data security technology provider, described some of the biggest IT and security threats for enterprises in its latest Insider Threat report, released last week. Researchers revealed that only 3 percent of U.S. organizations felt safe against insider threats, versus 9 percent for European organizations. In addition, researchers noted that 47 percent of U.S. organizations felt vulnerable against these threats, versus 25 percent for European organizations. "[Chief security officers] and enterprises are struggling today to cope with the massive increase in risks from insider threats that include both traditional insiders and privileged users as well as outside attacks that compromise their credentials in order to steal critical data," Security Innovations Network (SINET) founder Robert Rodriguez said in a press release. "Comparisons of European and U.S. organizations within the report show Europeans feeling more secure, but that all need to rethink the mix of their investments in security controls, and focus more strongly on protecting data"
ZL Technologies CEO Joins CIA and Department of Homeland Security in Panel to Discuss Maintaining Privacy While Leveraging Big Data for New Purposes in Government(MarketWired) ZL Technologies, Inc. (ZL), the leader in total information governance for the large enterprise, today announced the company's CEO, Kon Leong, will participate on a panel with representatives from the CIA and the Department of Homeland Security at the IT Security Entrepreneurs Forum (ITSEF 2014), taking place April 8-9 at the Computer History Museum in Mountain View, Calif. Leong will join Dawn Meyerriecks, deputy director for Directorate of Science and Technology of the CIA; Donna Roy, executive director of Information Sharing Environment for the Department of Homeland Security; and moderator L. William Varner, president of ManTech Mission, Cyber and Intelligence Solutions Group, to discuss the growing privacy challenge of Big Data and how to leverage data for new purposes in government
CSG Invotas to Participate in SINET ITSEF 2014(MarketWatch) CSG Invotas , the new enterprise security business from CSG International, Inc., today announced its participation at the eighth annual 2014 SINET IT Security Entrepreneurs Forum (ITSEF)
Cyber Attacks, Threats, and Vulnerabilities
Is India Caught In the US-Russia Cyber Warfare Crossfire?(Defense World) There could be more to it than meets the eye in the recent downpour of leaked information on the Indian Air Force's Su-30MKIs. Anti-Russia hackers, either acting independently or working for the US NSA and other western powers may have targeted Moscow because of the latter's reunion with Crimea and due to Edward Snowden's asylum in Russia
Indian hacker Takes Down Official website of terrorist organization Tehreek e Taliban Pakistan(HackRead) The official website of terrorist organization Tehreek e Taliban Pakistan (TTP) has been targeted and successfully taken down by famous Indian hacker Godziila. Godziila hacker who has been in news for targeting high profile websites, including the official website of Pakistan army; took down the TTP's website earlier today. It has been observed that the same website was
The Heartbleed Bug(Codenomicon) The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs)
Seriousness of OpenSSL Heartbleed Bug Sets In(Threatpost) Site operators and software vendors are scrambling to fix the OpenSSL heartbleed bug revealed Monday, a vulnerability that enables an attacker to extract 64 KB of memory per request from a server. Attacks can leak private keys, usernames and passwords and other sensitive data, and some large sites, including Yahoo Mail and others, are vulnerable
Google Removes Top App: 'Virus Shield' Scams Thousands, Exposes Flaw In Android Ecosystem(International Business Times) Until Sunday night, the top new paid app on the Google Play store was a complete scam. Google Inc. (NASDAQ: GOOG) quickly removed "Virus Shield" from the Google Play store, but not before thousands of people downloaded the fake anti-malware app, exposing a major flaw in the open strategy Google has taken with its mobile app marketplace
Cyber Shakedown: Hackers Unleash Mafia-Style Extortion Tactics(Fox Business) Scott Heiferman received a disturbing email one recent Thursday morning that he quickly realized would have ripple effects for his company's 16 million users. The author of the message offered to stop a looming cyber attack on social networking site Meetup.com in exchange for $300. Instantaneously, the Meetup.com's servers were bombarded with enormous levels of traffic that brought its services down
Meet the New School; Same as the Old School(Trend Micro: Simply Security) The Dark Web has been very firmly colonised by criminals looking for a safer marketplace to ply their various trades. Are the vendors and buyers in these forums the same or different to those that work in the older and more established underground forums on the open Internet?
Trio of health data breaches rocks California patients(FierceHealthIT) Three major data breaches rocking the state of California made headlines recently--one involving a computer infected with malicious software, one involving a former employee's illegal access and one involving theft of medical data from a contractor's office
Security Patches, Mitigations, and Software Updates
OpenSSL CVE-2014-0160 Fixed(Internet Storm Center) OpenSSL 1.0.1g has been released to fix "A missing bounds check in the handling of the TLS heartbeat extension can be used to reveal up to 64kB of memory to a connected client or server. This issue did not affect versions of OpenSSL prior to 1.0.1"
SecureDrop and the OpenSSL Vulnerability(Press Freedom Foundation) Today a serious vulnerability was reported on OpenSSL versions 1.0.1 through 1.0.1f: CVE-2014-0160, or Heartbleed. SecureDrop runs as a Tor Hidden Service, which we also know is affected. As such, this affects all properly configured instances of SecureDrop, and steps should be taken immediately to mitigate disruption of SecureDrop running services
The Muddy Waters of XP End-of-Life and Public Disclosures(Threatpost) Windows XP security support ends Tuesday and until now, most of the public hand-wringing over XP's end-of-life has been about the potential for malware outbreaks against unpatched vulnerabilities that have been stockpiled by hackers anxiously awaiting April 8, 2014
Microsoft ends XP support — what should users do next?(ComputerWeekly) April 8 2014 — the day that Microsoft no longer supports Windows XP — is upon us, and for organisations that still have a significant XP user base, it's no surprise there is rising concern over what to do next
Windows XP only the latest example of risky software, argues KPMG(TechWorld) The fact that millions of PCs and embedded systems will continue to run Windows XP beyond this week's End of Life (EOL) deadline is only the latest example of obsolete, risky software that shouldn't be used to stoke up unnecessary fear, KPMG analyst Stephen Bonner has argued
Berkeley professor: We've had big data privacy issues since 1970s(FierceBigData) Last week UC Berkeley held a daylong workshop on "Big Data: Values and Governance." It was yet one more example of how discussions pertaining to big data use and related privacy issues are increasingly being held publicly rather than behind closed doors. And this is as it should be
Android security suites compared(ZDNet) AV-Test.org's latest comparison of security suites for Android have many products with very high scores. Among the best, the difference is in a comparison of features and capabilities for the enterprise
EventTracker Cloud First to Offer Free Early Warning System(Reuters) EventTracker, a leading provider of comprehensive SIEM solutions, today announced the general availability of EventTracker Cloud, a SaaS solution for networks, systems, and applications. EventTracker Cloud offers simple, secure and scalable SIEM and log management functionality in the cloud. A free tier allows real-time alerting by text or email from up to 25 systems, network devices and applications, providing customers with the most cost-effective way to monitor any potential security breaches, threats, or availability
Technologies, Techniques, and Standards
Does IP convergence open you up to hackers?(Help Net Security) Recent reports indicate that unauthorized persons gained access to Target's network using credentials stolen from a company that worked on the company's refrigeration, heating, ventilation and air conditioning. The ongoing investigation will have to determine whether this was the root cause of the Point-of-Sale (POS) malware, or was a parallel attack. Whichever it turns out to be, it is clear that you should take steps to assure that any access you provide for vendors not be abused or misused
BYOD and security: Five tips to keep boundaries between work and home(TechTarget) Bring your own device, also known as BYOD, has taken off in corporate America. Corporations are now offering stipends to their employees to cover the full or partial cost of their personal mobile devices, such as a smartphone or tablet. The end result of BYOD is that employees are now using their personal mobile devices to manage their personal livesand their work lives. While it is easy to see the huge cost savings to corporations with a BYOD policy, this merging of work apps onto employees' personal mobile devices can have a negative impact on their work productivity and time off. In this article, I offer five quick tips to help managers assist employees to establish healthy boundaries between their work life and personal life so that both companies and employees can receive the full benefits of BYOD
Social Media Monitoring and Compliance: Five Best Ways to Navigate Complexity in the Workplace, Part II(Cyveillance) In this blog series on social media and online monitoring, we'll discuss five best ways for companies to address compliance regulations — and protect their organizations — while respecting employee and third-party privacy concerns. In our previous post, we discussed why it's important to have a clear understanding of what you are looking for and what your objectives. In today's post, we'll examine why you need to set boundaries
Social Engineering Grows Up(Dark Reading) Fifth annual DEF CON Social Engineering Capture the Flag Contest kicks off today with new "tag team" rules to reflect realities of the threat
If Mother Nature Were A CISO(Dark Reading) There are many defensive patterns in nature that also apply to information security. Here's how to defeat your predators in the high-stakes game of corporate survival and resiliency
We Are the Perimeter(Dark Reading) End users, not technology, define the boundaries of the enterprise. Security strategies must protect this new perimeter
Operation Stop the Exfiltration(Dark Reading) Determined cybercriminals and cyberspies will find their way to the data they want, but there are ways to trip them up as they try to make their way out
Open Source Intelligence Offers Crystal Ball Capability(SIGNAL Magazine) Researchers working on behalf of the U.S. intelligence agencies can use reams of open source, anonymous data to foretell social turmoil such as disease outbreaks or international political unrest. Once fully developed, the capability to predict coming events may allow U.S. officials to more effectively respond to public health threats; to improve embassy security before an imminent attack; or to more quickly and effectively respond to humanitarian crises. Both Google and Yahoo have proved they can detect major flu outbreaks based on Web search results, but the intelligence community may be able to out-Google Google. Researchers at the Intelligence Advanced Research Projects Activity (IARPA) intend to push the capability further, predicting events before they hit the news. Three teams—led by Virginia Tech, BBN Technologies and Hughes Research Laboratory—continually compete to see who can best predict events that create social disruptions
What Briefing Chinese Officials On Cyber Really Accomplishes(Forbes) In the New York Times, David Sanger has an interesting article about Washington's efforts to prevent escalating cyber attacks with Beijing. According to Sanger, U.S. officials have tried to allay the concerns of their Chinese counterparts about the build up of Pentagon capabilities through greater transparency. They have briefed them on the "emerging doctrine for defending against cyberattacks against the United States — and for using its cybertechnology against adversaries, including the Chinese." We should, however, be clear about their real purpose. These briefings have more to do with deterring China than assuring it
Senate Confirms Two Key Department Of Homeland Security Nominees(Homeland Security Today ) The Senate Monday confirmed the nomination of Dr. Reggie Brothers to be the Department of Homeland Security (DHS) Under Secretary for Science and Technology and retired Air Force Brig. Gen. Frank Taylor to be DHS Under Secretary for Intelligence and Analysis
Chemical plant security measure moves forward in the House(Homeland Security Newswire) The House Homeland Security Committee and the House Energy and Commerce Committee are making progress on legislation meant to extend DHS's Chemical Facility Anti-Terrorism Standards program, which helps secure commercial chemical plants from terrorist attacks. Several attempts by the House Homeland Security Committee to extend the program have failed due to disagreements with the House Energy and Commerce Committee, which also oversees the matter
Seeking a Role in Marine Corps Cyber(SIGNAL Magazine) A tactical technology support organization that has been serving the U.S. Marines for decades is beginning to find a role in the cyber domain. The group offers a broad range of services, including test and evaluation, engineering and network integration. It also supports users across the Defense Department, U.S. government and allies. No definitive cyber role has yet been carved out for the Marine Corps Tactical Systems Support Activity (MCTSSA), Camp Pendleton, California, but the team has skills to offer, says Michael Canterbury, MCTSSA technical director
Supreme Court Declines Review of NSA Phone Spying(National Journal) The Supreme Court on Monday opted to not take up the constitutionality of the National Security Agency's surveillance program that collects bulk telephone data of millions of Americans, a decision that arrives as the other two branches of government are moving forward with reforms to the controversial practice
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
InfoSec World Conference & Expo 2014(, January 1, 1970) With the primary objective of providing top-notch education to all levels of information security and IT auditing professionals, InfoSec World delivers practical sessions that give you the tools to strengthen...
NIST IT Security Day(Gaithersburg, Maryland, USA, April 8, 2014) The Office of the Chief Information Officer, OCIO, is hosting NIST IT Security Day as a means to heighten awareness for all NIST users on the many aspects of operational information technology security...
IT Security Entrepreneurs Forum (ITSEF) 2014(, January 1, 1970) IT Security Entrepreneurs Forum (ITSEF) is SINET's flagship event, designed to bridge the gap between the Federal Government and private industry. ITSEF brings unique value to the Cybersecurity community...
Defensive Cyberspace Operations & Intelligence Conference(, January 1, 1970) Two days of presentations, workshops, training, and networking on defensive operations and intelligence activities in cyberspace. Speakers from government, universities, and industry will share their insights...
SOURCE(, January 1, 1970) The purpose of SOURCE Conference is to bridge the gap between technical excellence and business acumen within the security industry. SOURCE fosters a community of learning where business and security professionals...
2014 GovCon Cyber Summit(McLean, Virginia, USA, April 9, 2014) The U.S. Computer Emergency Readiness Team (US-CERT) noted that last year federal networks saw a substantial increase in hacking incidents, with 48,000 attacks reported by agencies. In recognition of this...
2014 Computer Security Day(Eugene, Oregon, USA, April 11, 2014) The Fourth Computer Security Day at the University of Oregon will feature a slate of distinguished speakers from academia, industry, and government, discussing current challenges and future opportunities...
Women in Cybersecurity Conference(, January 1, 1970) WiCyS is an effort to bring together women (students/faculty/researchers/professionals) in cybersecurity from academia, research and industry for sharing of knowledge/experience, networking and mentoring.
NSA Procurement in today's business arena(Elkridge, Maryland, USA, April 16, 2014) An opportunity to gain inside perspective on market trends in NSA Procurement. The guest speaker will be William Reybold, National Security Agency's Deputy Senior Acquisition Executive (SAE), who manages...
Suits and Spooks San Francisco(, January 1, 1970) S3+: Surveillance, Security, Sovereignty and other Critical Issues. Not another hacker conference. Suits and Spooks is a unique gathering of experts, executives, operators, and policymakers who discuss...
US News STEM Solutions: National Leadership Conference(, January 1, 1970) The STEM crisis in the United States demands solutions—and nowhere is the search more concentrated than at U.S. News STEM Solutions. Now in its third year, this premier national leadership conference is...
East Africa Banking and ICT Summit(Kampala, Uganda, April 25, 2014) The global event series for Banking and ICT Summit enters its third year. The summit will continue to provide delegates with technical & practical sessions, lectures and showcase for banking and ICT innovations,...
InfoSecIndy(Indianapolis, Indiana, USA, April 26 - 27, 2014) Join us on April 26-27, 2014 in Indianapolis, Indiana for the premier Midwest Information Security and Digital Forensics Conference.
United States Cyber Crime Conference 2014(, January 1, 1970) This is the only event of its kind that provides both hands-on digital forensics training and an interactive forum for cyber professionals to network. The conference covers the full spectrum of topics...
Infosecurity Europe 2014(, January 1, 1970) Infosecurity Europe is Europe's number one Information Security event. Featuring over 350 exhibitors, the most diverse range of new products and services, an unrivalled education programme and over 12,000...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.