skip navigation

More signal. Less noise.

Daily briefing.

The Syrian Electronic Army (SEA) resurfaced last week with simple defacements of major British, Canadian, and American media sites, including NBC, CBC, Forbes, the Chicago Tribune, the Telegraph, and the Independent. Closely linked to the Assad regime, and with apparent ties to Hezbollah, the SEA's motives for its Thanksgiving campaign remain obscure.

TechDirt publishes an overview of Syria's Internet censorship, another facet of Assad's information operations capability.

Zscaler believes it's found the Pro-Palestinian hacktivists of AnonGhost distributing the Dokta Chef exploit kit through website defacements.

France's UMP (Union pour un mouvement populaire) conducts internal leadership elections despite hacker disruptions.

Investigation of the Regin cyber espionage campaign continues. Most observers think it's a British operation, with connections to other Five Eyes' services. Circumstantial evidence of GCHQ's hand hasn't stopped breathless op-eds from perceiving Regin as an opening shot (heard 'round the world six years after the trigger was pulled) in a broader US cyber offensive. The security companies who detected Regin defend the delayed timing of their disclosures. Unsurprisingly, Chinese and Russian cyber operations persist, although news about them is somewhat muted by interest in Regin.

Last week's other large exploit — the Sony hack — has apparently caused leaks of unreleased films and personal data of some Sony stars. Some signs point to North Korean responsibility: the Seth Rogen vehicle "The Interview" may be an act of lèse-majesté against Kim Jong-un. Sony has hired FireEye's Mandiant unit to help clean things up.

German, Canadian, Australian, and Qatari surveillance policies receive public scrutiny.


Today's issue includes events affecting Afghanistan, Australia, Austria, Belgium, Canada, China, Colombia, European Union, France, Germany, India, Iran, Japan, Democratic Peoples Republic of Korea, Mexico, New Zealand, Pakistan, Russia, Saudi Arabia, Spain, Syria, United Kingdom, United Nations, United States.

The CyberWire will be covering the 2014 SINET Innovation Showcase this week, live tweeting from the event on Wednesday and Thursday and devoting special issues to the Showcase.

Cyber Attacks, Threats, and Vulnerabilities

Syrian Electronic Army Thanksgiving Hack of Microsoft, NBC, Dell, Forbes Used Gigya Comment Platform (Softpedia) On Thanksgiving, the Syrian Electronic Army has managed to place pop-ups promoting its existence on a number of websites, including big ones like NBC, Forbes, The Chicago Tribune, NHL, The Telegraph, The Independent and more, and the group has now claimed responsibility for the strike, although its reasons remain somewhat unclear at the moment

Syrian Electronic Army hackers: Who are they and why are they targeting the media (CBCNews) Yesterday morning, visitors to and other news websites around the world saw a pop-up message that read: "You've been hacked by the Syrian Electronic Army (SEA)." The incident raised questions about who the group is, why it's targeting the media and just how dangerous it is

Lessons On Censorship From Syria's Internet Filter Machines (TechDirt) Norwegian writer Mette Newth once wrote that: "Censorship has followed the free expressions of men and women like a shadow throughout history." As we develop new means to gather and create information, new means to control, erase and censor that information evolve alongside it. Today, that means access to information through the internet, which motivates us to study internet censorship

Defaced websites leading to Dokta Chef Exploit Kit and CVE-2014-6332 (ZScaler Threat Labs) Defacing websites has been the main stay for hacktivist groups to spread their message. During recent research, we found multiple compromised websites containing a malicious link

France UMP: Cyber attack fails to halt leadership vote (BBC) Members of France's centre-right UMP party have continued with an online leadership ballot despite an early cyber attack which slowed voting

So, who *did* write the Regin malware? (Graham Cluley) No-one knows for sure who created the highly-sophisticated Regin malware that appears to have been spying on organisations in the telecommunications, energy and health sectors for some years

Is it possible to attribute the backdoor Regin to the cybercrime? (Security Affairs) The popular cyber security expert Raoul Chiesa commented the hypothesis that backdoor Regin is a product of organized cybercrime

New Cyber-Weapon Belies Spy Agencies' National Security Claims (WhoWhatWhy) Washington's cyber spies haven't been resting on their laurels since unleashing the infamous Stuxnet computer worm in 2009

With Regin, U.S. has gone on the cyberwar offensive (Bloomberg via the Herald and News) America must be ready to face threats from the modern technological world

Latest underground big data project: Regin (FierceBigData) While there is much hand-wringing over privacy invasions by governments and corporations involved in big data projects, it's prudent to remember that not all privacy threats come from friendly fire. Quite a bit of data collection is actually underground and decidedly malicious. Case in point: Regin, a malicious platform that spies on GSM networks worldwide. Can you hear me now? Because a gazillion spies can hear you perfectly fine

Regin — The Marauder Malware and its Invisibility Cloak (Cyactive) Regin, the newest member of the state-sponsored malware club, has been operating since 2008, reusing many stealth techniques along the way. We are sure to see more of it in the foreseeable future

Regin malware: Why did it take so long to uncover? (TechTarget) Industry observers say the unveiling of the Regin malware, which came after more than half a decade in the wild, highlights the need for better detection methods

AV Firms Defend Regin Alert Timing (GovInfoSecurity) Vendors could have issued warnings sooner, critics allege

Why Regin Malware Isn't the Next Stuxnet (Tripwire: the State of Security) Earlier this week, Symantec issued a report about the Regin family of malware. The malware itself appears to be sophisticated enough that many security analysts and researchers believe it was developed by a government specifically for cyber espionage

Aggressive Chinese IP Highlights Attribution Issues (Infosec Institute) Recently, the Norse DarkWolf Labs noted that the IP address had jumped into the top quadrant for malicious activity. Investigation into the activity and the IP itself highlights the many challenges in accurately attributing such events to known actors, as illustrated in this article

Cyber-Threats Ascribed to Russia Crafted to Hunt Specific Data (eWeek) Three cyber-espionage campaigns attributed to Russia each focuses on a different type of data collection, according to an analysis by data-intelligence firm Recorded Future

Sony's New Movies Leak Online Following Hack Attack (Variety) Brad Pitt's 'Fury,' 'Annie' among titles being downloaded

Sony probes North Korea link to cyber attack after threats over Seth Rogen and James Franco movie (Australian Broadcasting Coporation) Sony Pictures Entertainment is investigating if hackers working for North Korea are responsible for a cyber attack that knocked out the studio's computer network earlier this week, the technology news site Re/code is reporting

Sony hires Mandiant to help clean up after cyber attack (Reuters) Sony Pictures Entertainment has hired FireEye Inc's Mandiant forensics unit to clean up a massive cyber attack that knocked out the studio's computer network nearly a week ago, three people with knowledge of the matter said on Sunday

Sony employees face 'weeks of pen and paper' after crippling network hack (Register) Megastars' details may have been pinched

Sony hack: Firms must learn from its mistakes (V3) Big businesses need to learn from the latest hack on Sony or risk the same fate, according to experts from the security community

Hackers With Apparent Investment Banking Background Target Biotech (New York Times) For more than a year, a group of cybercriminals has been pilfering email correspondence from more than 100 organizations — the vast majority publicly traded health care or pharmaceutical companies — in apparent pursuit of information significant enough to affect global financial markets

Cybercriminals Testing New PoS Malware 'Poslogr' (Security Week) Researchers at Trend Micro have come across a sample of a new point-of-sale (PoS) malware that appears to be under development

New DareDevil PoS Malware Also Infects Ticket Machines and Electronic Kiosks (Softpedia) A new strain of malware designed for point of sale systems has been discovered by security experts to also infect ticket vending machines and electronic kiosks

AGbot DDoS Attacks Internet VNC Servers (Fortinet Blog) Update: After further analysis, we found that this bot will attempt to download another exploit tool from an FTP server once it is able to connect successfully. We will update you once we have more information

Zero-day hacking group resorts to UNICORN SMUT-SLINGING (Reigister) Playboy ploy not beneath APT3

New tool catches surveillance malware masquerading as legitimate bookmark manager (PCWorld) A variant of the Remote Control System (RCS) malware developed by an Italian company called Hacking Team is masquerading as a bookmark management application called Linkman, according to the main developer of a new malware scanning tool

Skimmer Innovation: 'Wiretapping' ATMs (KrebsOnSecurity) Banks in Europe are warning about the emergence of a rare, virtually invisible form of ATM skimmer involving a so-called "wiretapping" device that is inserted through a tiny hole cut in the cash machine's front. The hole is covered up by a fake decal, and the thieves then use custom-made equipment to attach the device to ATM's internal card reader

Cyber attacks can funnel through trucking companies to shippers (Truck News) Trucking companies may be inadvertently creating security holes in their customers? computer networks

Time's up: Google releases attack code for serious Adobe Reader bug (ZDNet) Google's Project Zero bug hunters have published details of a critical vulnerability in Adobe Reader for Windows that was patched in September

Exploiting MS14-066 / CVE-2014-6321 (aka "Winshock") (Security Sift) I think enough time has passed now to provide a little more detail on how to exploit MS14-066 schannel vulnerability (aka "Winshock"). In this post I won't be providing a complete PoC exploit, but I will delve into the details on exactly how to trigger the heap overflow along with some example modifications to OpenSSL so you can replicate the issue yourself

Stolen Cards Tested on Charity Sites (BankInfoSecurity) Cybercriminals exploit sites, automate card verification

Black Friday, Cyber Monday for Crooks, Too! (KrebsOnSecurity) Underground cybercrime shops that sell credit and debit card accounts stolen from retailers are slashing prices and promoting their own Black Friday and Cyber Monday sales as fraudsters gear up for the busy holiday shopping season

JoomDonation Compromised (Sucuri Blog) We are receiving reports from many users of the popular JoomDonation platform that they received a very scary email from someone that supposedly hacked into JoomDonation. The emails went to the registered accounts and contained the full names, so it looks like JoomDonation did in fact get breached

Simms Fishing Products Retailer Informs of Security Breach (Softpedia) A new data breach has been recorded in the state of Vermont, with customers of Simms, retailer of high-end fishing gear, being caught in the hook by the cybercriminals

Coming soon: Murder by Internet (ComputerWorld) Security experts believe the Internet of Things will be used to kill someone

Bulletin (SB14-335) Vulnerability Summary for the Week of November 24, 2014 (US-CERT) The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD, which contains historical vulnerability information

Security Patches, Mitigations, and Software Updates

Siemens pushes out emergency SCADA updates (Help Net Security) Siemens has released an out-of-band update for the SIMANTIC WinCC SCADA system, which is integrated in its PCS7 distributed control system and its TIA Portal, engineering software for SIMATIC products that is deployed across several industrial sectors primarily in the US and Europe

SSA-134508: Vulnerabilities in SIMATIC WinCC, PCS 7 and WinCC in TIA Portal (Siemens Security Advisory by Siemens ProductCERT) The latest software update for SIMATIC WinCC fixes two critical vulnerabilities. One could allow unauthenticated remote code execution. Siemens has released software updates for WinCC, PCS 7 and TIA Portal. Siemens is working on updates for further versions of the affected products and recommends specific countermeasures until fixes are available

Siemens Enhances Reliability, Flexibility of Control Center Software (Control Engineering Asia) Siemens's TeleControl Server Basic software Version 3 includes numerous functions for even greater flexibility, reliability and security

Cyber Trends

What to expect in the unpredictable world of IT security? (Help Net Security) 2014 has been particularly busy for IT security professionals. Many of the threats that we predicted at the start of the year duly emerged, while other significant issues caught the entire sector by surprise

The failure of the antivirus industry (IT News) The interesting thing about nostalgia is things were seldom better in the past

Speeding Up Breach Detection (BankInfoSecurity) Organizations must balance technology, process improvements

Information Security Professionals Focus on Firefighting Rather Than Strategic Security Priorities, Research Shows (Nasdaq) New research on endpoint security conducted by Enterprise Strategy Group (ESG) on behalf of Digital Guardian, shows that information security professionals overwhelmingly covet a single, comprehensive endpoint security solution. Today, however, endpoint security deployment is tactical and driven more by firefighting than strategy

Firewalls are the cornerstone of security (IT Online) Despite claims of its demise, the firewall is still the foundation stone of security deployments. Doros Hadjizenonos, Check Point South Africa sales manager, looks at how it has adapted to combat three decades of threats

Internet of Things is not just about consumers: AVG (Reseller News) Security vendor foresees the channel having to expand its support capabilities are more devices connect

Cyber-crime in Colombia reaching worrying level, say police and internet experts (Colombia Reports) A recent report suggests that cases of cybercrime rose by more than forty percent in 2013 alone and yet nearly half of technology users do not have suitable protection on their devices

Poland slammed over holes in cyber-defence landscape (ZDNet) An upcoming audit has found massive failings across Polish institutions when it comes to digital threats


The Impact of Collaboration in Cyber Risk Insurance (National Law Review) Former FBI Director Robert Mueller once said, "There are only two types of companies: those that have been hacked and those that will be. Even that is merging into one category: those that have been hacked and will be again." This is the environment in which risk managers must protect their businesses, and it isn't easy

Health companies should invest in analytics to ward off cyber attacks, says report (Computing) Healthcare firms are at greater risk than ever before from malicious cyber attacks, and should start to invest in threat intelligence reporting to combat the danger, an IDC report has warned

Extending cybersecurity protection to the supply chain (Business-Cloud) Companies spend a lot of time and effort securing their own enterprise but pay little to no attention to their supply chain making it an easy target for hackers

BAE beefs up cyber division with graduate intake (Telegraph) Defence group places more than a third of its graduates into cyber division as it seeks new markets to counter declining military spending

Cyber security among six UK industries competing for skills, says IET (ComputerWeekly) Cyber security is among six fast-growth industries that could boost the UK economy significantly if they are not hampered by a lack of skills, warns a report

Non-traditional employee recruitment may remedy security hiring woes (TechTarget) With viable job and training opportunities finally emerging, the time is now for CISOs and hiring managers to boost infosec's ranks with non-traditional candidates

In Time to Protect Holiday Shoppers, Security Startup Zenedge Aims to Fight Hackers (re/code) Black Friday is upon us, and if you're one of 70 million consumers who were affected by the massive breach of credit card data at the retail giant Target last year, it's an anniversary you'd prefer to forget

Infoblox Names Jesper Andersen President and Chief Executive Officer (BusinessWire) Infoblox Inc. (NYSE:BLOX), the network control company, today named Jesper Andersen to the positions of president and chief executive officer, effective December 8, 2014. He will also become a member of the company's board of directors

Products, Services, and Solutions

FireMon Extends Network Security Monitoring to AWS and OpenStack (Policy Charging Control) FireMon, the industry leader in proactive security intelligence solutions, has unveiled FireMon Security Intelligence Platform, an expanded network security monitoring capabilities for cloud services, including Amazon Web Services (AWS) and OpenStack Icehouse

Quick Heal solution for safe online banking (The Hindu) Quick Heal 16.00 has been designed to combat the dangers of online financial transactions such as paying bills, banking and shopping

Bitdefender Launches BRAIN-Powered Total Security Multi-Device 2015 (BusinessWire) Defeats even unknown malware, protects privacy, prevents fraud and more on all your devices

Tier-3 builds on strengths in analytics, compliance, automation and incident response with Huntsman® 5.75 (Business Computing World) Tier-3 Pty Ltd, a leading vendor of Security Information and Incident Management software, and manufacturer of Huntsman® technology today released the latest version of its market leading Defence-grade Huntsman® cyber security monitoring solution

Promisec Updates Endpoint Health Check Platform (eWeek) After the health check, users can create a report containing the results for remediation activities and address compliance-reporting requirements

MegaCryption Adds Record-Level Encryption for Increased Cryptographic Control and Flexibility (IT Business Net) MegaCryption now offers the ability to encrypt and decrypt individual records for usage in a specific program or transaction, commonly known as record-level encryption (RLE). As a record-level and file-level cryptography solution, MegaCryption provides a comprehensive approach to encrypting virtually any record and file in your z/OS environment while complementing any communication level encryption process you may already have in place. MegaCryption offers support of the most secure non-proprietary and well-known algorithms available today, ensuring security and compatibility with other standard implementations

AVG Antivirus latest version now brings new features — adds additional security layers (The REM) AVG has been a leading name in the world of antivirus software and programs

Review: Oxygen Forensic Suite 2014 (Forensic Focus) Oxygen Forensic Suite 2014 is specialist software aimed squarely at mobile phone forensics. It claims to have the "widest range of supported devices" with over 8,400 models listed and is geared towards smart-phones with a particular emphasis on the analysis of data recovered from them

Security/Projects/Bandit (Openstack) Bandit provides a framework for performing security analysis of Python source code, utilizing the ast module from the Python standard library

Crunch — Password Cracking Wordlist Generator (Kitploit) Crunch is a wordlist generator where you can specify a standard character set or a character set you specify. crunch can generate all possible combinations and permutations

Technologies, Techniques, and Standards

FEDRAMP to Release New Standards Draft for High-Impact Systems (ExecutiveGov) The Federal Risk and Authorization Management Program plans to release a draft document on cloud services standards for high-impact systems this month due to demand from government agencies

5 Ways PCI is Becoming More Security-Conscious Next Year (CIO) Here are the top five changes in the standard

Leveraging network intelligence and deep packet inspection (Help Net Security) Tomer Saban is the CEO of WireX Systems, a provider of network intelligence solutions. In this interview he talks about how deep packet inspection helps with identifying emerging threats, the role of network intelligence, and illustrates what the information security industry needs to in the next 5 years to combat highly targeted attacks

Dynamic Cybersecurity Needs: Reassessing Security (SmartDataCollective) As a recent report on Defending Data by Nuix found, cybersecurity needs are dynamic — 73 percent of surveyed participants report that their organization's cybersecurity needs have changed in the past year. Another 69 percent expect their needs to change again within another year

Proactive Infosec (CSO) Ongoing security incidents, are we spending in the right places?

The Pando Tor conspiracy troll (Errata Security) Tor, also known as The Onion Router, bounces your traffic through several random Internet servers, thus hiding the source. It means you can surf a website without them knowing who you are. Your IP address may appear to be coming from Germany when in fact you live in San Francisco. When used correctly, it prevents eavesdropping by law enforcement, the NSA, and so on. It's used by people wanting to hide their actions from prying eyes, from political dissidents, to CIA operatives, to child pornographers

SEC Risk Factors: How To Determine The Business Value Of Your Data To A Foreign Government (Digital Dao) The SEC's Cybersecurity Disclosure Guidance of 2011, President Obama's Executive Order 13636 on Critical Infrastructure Cybersecurity (2013) and the launch of NIST?s Cybersecurity Framework (2014) has had a major impact on publicly traded companies and financial institutions who are struggling with quantifying their risk analysis in the new domain of cyberspace

The importance of Street Cred (SC Magazine) Among the many elements that make up a successful information security programme, street cred is one with many ramifications and consequences says Josh Goldfarb

User activity monitoring is just as critical as asset monitoring (TechTarget) User Activity Monitoring is as important as asset monitoring for enterprise network security, finds research from Enterprise Management Associates

The fine art and hardest part of crafting BYOD policy (mHealthNews) Whereas many healthcare organizations are still grappling with exactly how best to proceed with bring-your-own-device (BYOD) policies, Penn Medicine is in the final steps of completing one

Extracting data from dump of mobile devices running Android operating system (Forensic Focus) In this article, we are going to tell about opportunities of utilizing programs that are used on a day-to-day basis in computer forensics and examination for analysis of mobile devices running Android operating system

Design and Innovation

How iboss Network Security approaches innovation (Enterprisers Project) Every company talks about being innovative as a strategic advantage. Paul Martini co-founder and CEO of iboss Network Security sees innovation as a way to solve problems for customers. He and his executive team guide their staff to concentrate on solving problems for customers and use innovative thinking as a way to arrive at their goals

This Artist's Images Integrate Code From Malware Like Stuxnet and Flame (Wired) For years, sophisticated state-created malware like Stuxnet and Regin has fascinated and vexed the security research community and launched a new foreign policy debate. Now it's infecting the art world, too

Research and Development

How to detect fraudulent activity in a cloud without invading users' privacy (Help Net Security) A group of researchers have found a clever way for cloud providers to detect fraudulent activities in their clouds without actually probing into the kind of activity a user performs, but by using privacy-friendly billing data

Bitcoin laid bare: Boffins beat anonymity (Register) Up to 60 per cent of transactions can be linked to IPs

Legislation, Policy, and Regulation

U.N. committee spotlights 'highly intrusive' digital spying (Reuters) A United Nations General Assembly committee on Tuesday expressed concern at digital spying and said unlawful or arbitrary mass surveillance, interception and collection of online data are "highly intrusive acts" that violate the right to privacy

German loophole allows BND spy agency to snoop on own people (Guardian) Intelligence agency can legally intercept calls and emails from Germans working abroad for foreign firms, MPs discover

Cyber security poised to be China's next social campaign (Want China Times) As internet firms propel Chinese business to the next stage, cyber security must become a top priority to prevent a potential Achilles' heel for rapid industrial development

Turnbull should spare us all airline-magazine-grade cloud hype (Register) Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK

TechUK publishes guidelines for UK cyber security exports (ComputerWeekly) Technology trade association TechUK has published a guide to help UK cyber security firms assess the legal and reputational risks associated with the export of cyber security products

Canadian Government Was Worried About Disclosure Of Telecom Surveillance Info: Memo (Canadian Press via the Huffington Post) A move by telecommunications firms to be more forthcoming with the public about their role in police and spy surveillance could divulge "sensitive operational details," a senior Public Safety official warned in a classified memo

Privacy czar doesn't get chance to testify on CSIS powers (Toronto Star) Privacy Commissioner Daniel Therrien says the Conservatives' bill to broaden CSIS?s foreign spying powers does not include adequate safeguards against possible future human rights violations, or enough oversight

Australian government reviews cybersecurity (ZDNet) Over five years since the last review, the Australian government has announced a new wide-ranging review into cybersecurity

How to evaluate national cyber security strategies (Help Net Security) ENISA issued an Evaluation Framework on National Cyber Security Strategies (NCSS) addressed to policy experts and government officials who design, implement and evaluate an NCSS policy

Qatar cracks down on cybercrime with new laws (Gulf Times) Qatar's Law number 14 of 2014, the Anti-Cybercrime Law (Law), was issued on September 15, 2014, and seeks to target aggressively a wide range of crimes and abuses relating to electronic data and online activity through the imposition of significant penalties

The Cooperative Effort of Cyber Defense (Armed with Science) "Cyber blur" is an enormous challenge to those seeking to defend the nation?s networks, said Navy Adm. Michael S. Rogers, the National Security Agency's director

Senate Cybersecurity Vote Not Likely in Lame Duck (Roll Call) Senate Intelligence Chairwoman Dianne Feinstein, D-Calif., has acknowledged that a Senate vote on her cybersecurity bill likely isn't going to happen before the 113th Congress ends

Obama facing uphill battle in curbing NSA snooping (Washington Times) New GOP majority likely to back data storage

FDA Scrutinizes Networked Medical Device Security (InformationWeek) Federal agencies are trying to address threats to the privacy and security of people using connected medical devices

AHA: Medical Device Makers Should Be Accountable for Cybersecurity (iHealthBeat) On Friday, the American Hospital Association sent a letter to FDA encouraging the agency to continue to pursue efforts that will hold medical device manufacturers accountable for cybersecurity

Navy nominates officer to take over for hamstrung 3-star intel boss (Navy Times) After a year in limbo, the Navy has decided to move ahead and replace the service's top intelligence officer, whose tenure has been hamstrung by suspected ties to a disgraced defense contracting firm

Ruppersberger nearing end of 12-year run on House intel committee (Baltimore Sun) When Rep. C.A. Dutch Ruppersberger joined the House committee that oversees the nation's intelligence agencies, Osama bin Laden was still alive, Edward Snowden was still in college and the government's response to the threat of cyber attacks was still in its infancy

Litigation, Investigation, and Law Enforcement

Ex-counter-terror chief: criticism of Facebook over Rigby murder is unfair (Guardian) Richard Barrett says it is impractical for social media firms to monitor millions of messages a day for terrorist intent

Vodafone in the Dock After Leaking Hacks' Records to Cops (Infosecurity Magazine) Vodafone accidentally leaked the records of over 1,700 News UK journalists and staffers to the Metropolitan Police Service (MPS) after the cops requested the details of just one hack under investigation last year, it has emerged

DOJ scores two cyber crime wins (The Hill) The Justice Department scored several more punches blows against cyber criminals this week. In separate cases, a judge imprisoned another member of a massive bank hacking ring and the government secured a guilty plea in its first ever conviction for selling smartphone stalking software

Spyware app StealthGenie's CEO fined $500K, forfeits source code (Naked Security) In the US, it's a federal crime to sell spyware

European Parliament votes to break up Google (MicroScope) The European Parliament has voted in favour of breaking up a Google, claiming that it gives preference to its commercial services in search results

School employee charged in cyber attack (Sarasota Observer) The Sarasota County Sheriff's Office charged 28-year-old Michael Levanti with two second-degree felonies for installing malware that affected the district's email system. Deputies arrested a Sarasota County School District technology support employee this morning for allegedly disrupting the school system's computer network in a cyber attack last month

Kim Dotcom beats US bid to get him thrown back in jail (Ars Technica) New Zealand judge finds Megaupload founder did not violate bail conditions

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

Cyber Security for Critical Assets: Chemical, Energy, Oil, and Gas Industries (Houston, Texas, USA, January 27 - 28, 2015) Cyber Security for Critical Assets Summit will connect Corporate Security professionals with Process Control professionals and serve to provide a unique networking platform bringing together top executives...

Upcoming Events

Cybergamut Tech Tuesday: Receiver Operating Characteristic (ROC) statistics and their successful use in medical studies, Nigerian scams, and APT detection (Columbia, Maryland, USA, December 2, 2014) Receiver Operating Characteristic (ROC) statistics have been a practical tool in the field of clinical medicine for more than 50 years, an area where stakes can be very high and test results are understood...

After the Breach: 1st Annual DePaul University Cyber-Risk Conference (Chicago, Illinois, USA, December 2, 2014) DePaul University's Arditti Center for Risk Management, Center for Financial Services, and the College of Computing and Digital Media are proud to collaborate with Sapient Global Markets as moderators...

5th Annual Raytheon Cyber Security Summit: "The Unassailable Enterprise" (Reston, Virginia, USA, December 2 - 3, 2014) We invite commercial and government entities to attend the 5th Annual Cyber Security Summit where we will explore the "unassailable enterprise" in 2014 and beyond. We bring together some of the most acclaimed...

SINET 16 (Washington, DC, USA, December 3 - 4, 2014) Innovative solutions frequently come from new and emerging companies. Each year, SINET invites sixteen innovative Cybersecurity companies to present their technology solutions to a select audience of prominent...

Healthcare Cyber Security Summit 2014 (San Francisco, California, USA, December 3 - 10, 2014) SANS is teaming up with the National Health Information Sharing & Analysis Center (NH-ISAC) to offer the 2nd Annual Healthcare Cyber Security Summit

(ISC)┬▓ Security Congress EMEA (London, England, UK, December 8 - 10, 2014) Building on the experience of the US-based (ISC)2 Security Congress, now in its fourth year, (ISC)2 Security Congress EMEA will offer a complementary and unique opportunity within the Europe Middle East...

International Conference for Internet Technology and Secured Transactions 2014 (London, England, UK, December 8 - 10, 2014) The ICITST is an international refereed conference dedicated to the advancement of the theory and practical implementation of secured Internet transactions and to fostering discussions on information technology...

(ISC)² Security Congress EMEA (London, England, UK, December 8 - 10, 2014) Building on the experience of the US-based (ISC)² Security Congress, now in its fourth year, (ISC)² Security Congress EMEA will offer a complementary and unique opportunity within the Europe...

ACSAC 30: Annual Computer Security Applications Conference (New Orleans, Louisiana, USA, December 8 - 12, 2014) ACSAC is more than just high quality, peer-reviewed research (though our 2013 acceptance rate was barely 19%). Our comprehensive program also includes training, case studies, panels, workshops, posters,...

Tax Incentives for Cybersecurity Businesses (Elkridge, Maryland, USA, December 9, 2014) Learn the details and take the opportunity to ask questions of leading experts on how to apply for tax credits (including cyber, research, security clearance, and secured space tax credits) and get the...

Cybersecurity 2015: Beyond the Breach (Washington, DC, USA, December 9, 2014) With each new cybersecurity attack businesses lose millions, governments lose information and citizens lose trust. At the end of a year where these attacks regularly dominated headlines, what's ahead for...

ICFPT 2014 (Shanghai, China, December 10 - 12, 2014) ICFPT is the premier conference in the Asia-Pacific region on field-programmable technologies including reconfigurable computing devices and systems containing such components. Field-programmable devices...

Cyber Security Division 2014 R&D Showcase and Technical Workshop (Washington, DC, USA, December 16 - 18, 2014) The cybersecurity threat continues to evolve and in order to keep ahead of the threat, new cutting-edge cybersecurity technologies are needed. DHS S&T's Cyber Security Division (CSD) is funding many R&D...

Cybersecurity World Conference (New York, New York, USA, January 9, 2015) Welcome to Cyber Security World Conference 2015 where renowned information security experts will bring their latest thinking to hundreds of senior business executives and officials focused on protecting...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.