Chinese media continue to blame the country's recent Internet outage on hacktivists (Falun Gong prominently mentioned in dispatches), but outsiders aren't so sure: they think that in this case the Great Firewall may have jammed itself.
The Assad's Syrian Electronic Army is back, and it's after CNN Twitter accounts. (They were quickly ejected.) InfoSecurity Magazine runs an SEA overview that predicts the state-coordinated group will become more active in 2014.
Neiman Marcus releases more information on its part of the BlackPOS/Kaptoxa campaign. The US FBI warns retailers to expect more of the same. Industry observers think Target's cyber insurance policy may not hold up if the insurers find compliance issues in the company's security posture.
Researchers at Sweden's Karlstad University find a small number of Tor exit relays sniffing traffic and conducting man-in-the-middle attacks, thus reminded us that "anonymous" isn't synonymous with "secure."
The researcher who developed it has published the Chrome eavesdropping exploit. Google dismisses it as a stunt, and no real threat.
Krebs reports that Foscam IP cameras and baby monitors are vulnerable to exploitation by snoops with access to their IP address.
Crowdstrike's 2013 retrospective continues to draw attention, particularly in its conclusions that fifty groups dominate global cyber crime, and that Russia is engaged in a sustained campaign targeting the energy sector.
Attention small businesses: Cisco patches its widely reported unauthorized access vulnerability.
McAfee observes a disturbing rise in security-aware malware, showing again the inadequacy of legacy perimeter and signature-based defenses.
The European Court scrutinizes GCHQ.
Today's issue includes events affecting Australia, Brazil, Canada, China, European Union, France, Israel, Bailiwick of Jersey, Netherlands, Poland, Russia, Sweden, Syria, Taiwan, United Arab Emirates, United Kingdom, United States..
Syrian group hacks CNN social media accounts(AFP via Yahoo!News) The Syrian Electronic Army claimed responsibility for hacking some of US broadcaster CNN's social media accounts. The network said the compromised accounts included its main Facebook page, its Twitter page and blogs for "The Situation Room" and "Crossfire"
Syrian Electronic Army Escalated Tactics Over 2013; Poised for More this Year(InfoSecurity Magazine) The hacktivist group known as the Syrian Electronic Army was a particularly active adversary in the second half of 2013, and remains one of the top global threat actors to watch in the coming year as the Syrian conflict drags on — not least because of the group's ability to morph its techniques to keep things interesting
Don't Be the Next Target(SecureState) Target's $100 million policy is likely to be worthless if it is determined (and it will be) that they were not compliant. However, let's assume for a minute that Target's policy is actually deemed valid, and not determined to be voided by misrepresentation. For example, if Target is able to demonstrate that there were no gaps in their security controls, and that every precaution was taken to prevent this type of breach, they would still be covered by the multiple policies they have and would potentially be subject to less severe regulatory fines
The Inside Story of Tor, the Best Internet Anonymity Tool the Government Ever Built(Bloomberg BusinessWeek) Last year, Edward Snowden turned over to the Guardian, a British newspaper, some 58,000 classified U.S. government documents. Just a fraction of the files have been made public, but they outline the National Security Agency's massive information-collection system. They've thrown light onto the methods of an arm of the government used to working in the shadows and started an intense debate over national security and personal liberty
Malware infects Android-run devices via PCs(Help Net Security) Researchers have recently discovered a PC Trojan whose ultimate goal is to compromise the target's Android-running smartphone or tablet with information-stealing malware
Bug Exposes IP Cameras, Baby Monitors(KrebsonSecurity) A bug in the software that powers a broad array of Webcams, IP surveillance cameras and baby monitors made by Chinese camera giant Foscam allows anyone with access to the device's Internet address to view live and recorded video footage, KrebsOnSecurity has learned
Energy Sector Under Attack(Industrial Safety and Security Source) A cyber espionage campaign targeted hundreds of organizations from Europe, America and Asia and it appears the Russian government is behind it, researchers said. IT security firm CrowdStrike said Russia has been launching cyber attacks in an effort to steal sensitive information which it can use to gain an economic advantage over its opponents
Health data breach count tops 800(FierceHealthIT) The "wall of shame" for health data breaches at the Department of Health and Human Services has seen a lot of action this month
Howard schools recover from possible cyber attack(The Baltimore Sun) Howard County Public School System officials said last week that Internet outages that persisted for nearly a week earlier in the month were caused by a possible cyber attack. Internet outages started occurring the first week in January, according to emails from various schools in the county, and continued until about Monday, Jan. 13
Phishing via Social Media(Internet Storm Center) The use of social media as an attack vector is nothing new; We've all seen plenty of stories in the media of fake FaceBook profiles such as the one for American Admiral James Stavridis back in 2012 . This tends to mean we're more wary of Facebook and Twitter, but many of us still use LinkedIn as it is a great tool to build out professional networks, tap in to like-minded groups or be stalked approached by recruiters
T-Mobile: Hack May Have Revealed Personal Information(TechnoBuffalo) T-Mobile is reportedly gearing up to reveal that personal information may have been exposed in an "authorized access" incident, according to a report published Thursday. The details were provided by CSO, which discovered a letter that was recently published by the California Attorney General. The letter suggests T-Mobile discovered the breach back on Nov. 26, 2013, so we're not quite sure why details are only surfacing now
Keygens For Engineering, Scientific Software Leads To FAKEAV(TrendLabs Security Intelligence Blog) In the past few weeks, we have seen increasing numbers of infections related to the TROJ_GATAK, especially in the North American region. This malware family is not particularly well known; we discussed it in 2012 in relation with file infectors that were hitting Dutch users
Breach Among Largest Ever in Canada(GovInfoSecurity) Health data breaches involving unencrypted devices aren't just an American problem. The recent theft of an unencrypted laptop from an IT consultant working for Medicentre Family Health Care Clinics in Edmonton has resulted in what is believed to be one of the largest health data breaches ever reported in Canada
Security Patches, Mitigations, and Software Updates
Top 10 DDoS attack trends(Help Net Security) Prolexic Technologies, a provider of DDoS protection services, published its top 10 attack trends for 2013. Throughout the year, metrics were collected from all DDoS attacks launched against the
The Cybersecurity Risk Paradox(Microsoft Security Intelligence Report Special Edition) Around the globe, societies are becoming increasingly dependent upon information and communications technology (ICT) which is driving rapid social, economic, and governmental development. Yet with this development, new threats to digital infrastructures have emerged
Cloud computing: Powerful tool for cyberattacks?(CIOL) As cyber warfare against enterprises grows more brutal by the year, cloud computing technology is also at risk for cyber attacks such as malware and phishing, which have increased the demand for technologies to combat these threats
Citigroup CEO Corbat: Threat of Cyber Attack Is Real(Value Walk) In an interview to appear on FOX Business Network's (FBN) Countdown to the Closing Bell (3PM/ET), Citigroup Inc (NYSE:C) CEO Michael Corbat speaks with anchor Liz Claman about the company's recovery. Corbat says, "I think when we look back, we've done a pretty monumental transformation of the company" and that "we feel like we've got the right business model and the right mix of businesses." Corbat also comments on cyber security saying, "I think the threat of cyber security is absolutely real" and that this is "an area where we dedicate a lot of resources, people, hours, money, to making sure that we've got the best technology
CEOs in the dark about cyber-attacks(Real Business) A Lancope, Inc. report, entitled "Cyber Security Incident Response: Are we as prepared as we think?", shows that while security threats are imminent, CEOs and other members of the management team are in the dark about potential cyber-attacks against their companies
Is cybersecurity the right job for you?(FCW) Headlines, reports and keynote addresses describing a cybersecurity workforce crisis continue to dominate the IT security landscape, with thousands — even hundreds of thousands — of open positions for cyber pros. Are you one of the many IT workers looking to make the jump, only to fall short of getting hired? It's all too common, and there are some surprising reasons why
Cyber warriors: The next generation(Defense Systems) The U.S. military has always taken cyber operations seriously, dealing with constant scans, probes and attacks on its networks, dating to the early days of the Internet. But the breadth of the issue really hit home in 2008, following an incident that became known as "Operation Buckshot Yankee"
Facebook awards $33,500 bounty for critical flaw(Help Net Security) Facebook has announced that it has awarded $33,500 — their biggest bug bounty payout to date — to a Brazilian security researcher that discovered a remote code execution flaw affecting Facebook's
Booz Allen keeps place on DISA contract(Federal Times) Booz Allen Hamilton will continue working under a DISA contract that had originally gone to another company. Booz Allen Hamilton is a major player in the Pentagon's efforts to enable more defense contractors to share cyber threat data with the government
Raytheon announces cyber technical research competition winner(PRNewswire) Raytheon UK has announced that MWR InfoSecurity is the first winner of its technical research competition aimed at SME (Small Medium Enterprise) in the cyber security domain. The competition's £40,000 prize, recognising research into an analysis tool to detect rogue code in Android applications, was presented at the "Agile Innovation for Cyber Security Boot Camp" hosted by the UK government's Department for Business, Innovation and Skills
KCG Secures First DHS Continuous Diagnostics and Mitigation Task Order under $6B Cyber Contract(Webwire) Knowledge Consulting Group (KCG), one of the largest privately held cybersecurity services firms in the United States, announced that it has been awarded the first task order off of the Department of Homeland Security (DHS) Continuous Diagnostics and Mitigation (CDM) contract vehicle. The task order is to deliver solutions from McAfee and BDNA, and has a total value of $8,543,986
Qualcomm Buys Massive Palm, iPaq And Bitfone Patent Portfolio From HP(TechCrunch) Is Qualcomm preparing for the revival of the personal digital assistant? The San Diego-based Qualcomm just announced that it has acquired 1,400 patents from HP covering Palm, iPaq and Bitfone patents and pending patents. It's unclear how many are from each portfolio, but Qualcomm just made a big leap in owning a chunk of patents covering the fundamentals of mobile operating system
Antivirus Products Show Off Under Windows 8.1(PC Magazine) Flu season is in full swing, and you've probably had your flu shot. But is your computer protected against viruses? Throughout the chilly November and December of 2013, researchers at AV-Test ran two dozen antivirusand security suite products through a barrage of tests. They've just released the latest results, identifying which products excelled in several different criteria. If you're considering which security product to choose, or considering switching from your current protection, you'll want to check these results
Smartworld offers cyber attack testing(Trade Arabia) Smartworld, a leading master systems integrator and ICT service provider, has launched a new testing service that aims to prepare and protect local businesses and government agencies from cyber attacks
Skyfence Protects Cloud Apps against Account Hijacking, Insider Attacks and Data Theft(Virtual Strategy) Skyfence Networks, the company that automates cloud app protection, today emerged from stealth mode and announced the Skyfence Cloud Gateway. Founded by former executives from Imperva and Websense, Skyfence enables organizations to protect against the leading threats identified by the Cloud Security Alliance (CSA): account/service traffic hijacking and malicious insiders. Skyfence integrates threat prevention, activity monitoring and compliance management to secure and prevent data theft on any cloud app
The Power to Decide(MIT Technology Review) What's the point of all that data, anyway? It's to make decisions
Stop Being "Reasonable" — Rationalize Your Security Efforts(Security Today) Commercially reasonable efforts refer to actions defined by what similar persons would do as judged by the community. This judgment is based on the common average of the community, so in times of crisis or great waves of change, the collective knowledge from community to community will be different. Communities that measure, watch and continue to learn are more aware than communities that do not value these traits
Best practices to help prevent online data breaches(Help Net Security) The Online Trust Alliance (OTA) recommended a series of best practices to help prevent online data breaches and other exploits. Leveraging preliminary year-end data from the Open Security Foundation
Penetration testing: Accurate or abused?(Help Net Security) According to a recent Ponemon study, since 2010 cybercrime costs have climbed 78% and the time required to recover from a breach has increased 130%. On average, U.S. businesses fall victim to two successful attacks per week where their perimeter security defenses have been breached
6 Tips for Stronger Encryption(Dark Reading) In the wake of revelations about NSA backdoors in encryption systems, organizations must do everything they can to ensure their encryption is as strong as possible
New Israeli Security Tech Reads Your Mind(iHLS) 9/11 was the catalyst for many HLS technologies. Shabtai Shoval, founder of SDS (Suspect Detection Systems), following the terror attack, asked himself whether the event couldn't have been foreseen and prevented
Roberts first UNO graduate to earn a masters in Information Assurance(Dakota County Star) When Justin Roberts graduated from South Sioux City in 2008, he headed toward Omaha and started working on a degree that didn't exist yet at the school. On December 21, 2013 he graduated from the University of Nebraska-Omaha with a Master's of Science in Information Assurance — being the first student to graduate from UNO with this degree
Legislation, Policy, and Regulation
Don't let privacy trump security(Newsday) Ten years ago this July, the 9/11 Commission Report cited the failure of U.S. intelligence agencies to "connect the dots" leading to the terrorist attack — the job the National Security Agency is charged to do. The ongoing discussion about privacy, security and the NSA's programs has been important and should continue. However, we must not compromise security programs that allow us the very freedom to openly engage in this debate
Secure the Future of the Internet(Brookings) In 2014, President Obama should pursue policies guaranteeing an open, free-market Internet, write Peter W. Singer and Ian Wallace. Instead of waiting out the international blowback from Edward Snowden's NSA revelations, the president needs to lead a new strategy against those governments who want to regulate the way the global Internet is run
This is what we should be asking our intel officials: Where is today's William Colby?(Foreign Policy) William Colby began his career in the Office of Strategic Services in World War II. Following the war, he joined the Central Intelligence Agency where he would eventually rise to be the director of central intelligence (DCI), having run the highly controversial Phoenix Program in Vietnam along the way. Mr. Colby's ascension to DCI came at the nadir of the CIA's history
Congresswoman Clarke's Statement on Bipartisan Commitment to Cybersecurity(Targeted News Service Via Acquire Media NewsEdge) Rep. Yvette Clarke, D-N.Y. (9th CD), has issued the following news release: Congresswoman Yvette D. Clarke issued the following statement on bipartisan efforts in Congress to improve cybersecurity which have resulted in a bill that would increase collaboration between federal agencies and private companies to protect our information and require additional monitoring of potentially vulnerable systems
The territorial skirmish between China and Taiwan has now gone virtual(Quartz) A new territorial dispute is emerging between China and Taiwan. But this time the territory is in cyberspace. As we explained yesterday, the Internet Corporation for Assigned Names and Numbers (ICANN), which manages the internet's addressing system, recently added Chinese characters to the mix of possible "generic top-level domains." That puts .政府 (zhengfu, pronounced "jung-foo"), which means "government," up for grabs
Social Media: Protecting Trade Secrets and Proprietary Information(JD Supra) The ability of employees to steal trade secrets, reveal customer lists, and expose proprietary business information with the press of a button is frightening. In over 85 percent of trade-secret cases, the alleged misappropriator is someone the trade-secret owner knows, typically either an employee or a business partner
The U.S. Crackdown on Hackers Is Our New War on Drugs(Wired) Before Edward Snowden showed up, 2013 was shaping up as the year of reckoning for the much criticized federal anti-hacking statute, the Computer Fraud and Abuse Act ("CFAA"). The suicide of Aaron Swartz in January 2013 brought the CFAA into mainstream consciousness, so Congress held hearings about the case, and legislative fixes were introduced to change the law
Edward Snowden: "Not all spying is bad"(WSTP) "Not all spying is bad," former government contractor Edward Snowden declared in an online Q&A Thursday afternoon. However, the former contractor who exposed sweeping National Security Agency surveillance programs maintains that the NSA's bulk data collection is unnecessary and doing more harm than good
Snowden considers returning to the US, and the "permanent record"(Ars Technica) In an online Q&A session, former NSA contractor-turned-whistleblower Edward Snowden answered 13 questions posed by Twitter users. The questions he considered ranged from the reasoning behind his leaks, to his hope for what the future of American intelligence programs may look like
Snowden Answers Our Burning Data Collection Question: What's The Worst That Could Happen?(TechCrunch) National Security Agency whistleblower Edward Snowden is answering the Internet's burning questions. Surprisingly, he was even gracious enough to answer my question: "What's the worst and most realistic harm from bulk collection of data? Why do you think it outweighs national security?" Snowden, who was granted protection in Russia from American prosecution, has been somewhat press-averse, only holding a few select media interviews. This time, he went directly to netizens to respond to President Obama's big national security speech last week
13 Indicted in $2M Bluetooth Skimmer Scam(Threatpost) Thirteen men were indicted this week for allegedly using Bluetooth-enabled skimmers to steal more than $2 million from customers at gas stations across the Southern United States between 2012 and 2013
Cybertech — Cyber Security Conference and Exhibition(Tel Aviv, Israel, January 27 - 29, 2014) Cybertech Israel, the first event of its kind, will present world-leading companies in the field of cyber defense alongside young companies that offer unique solutions to advance the discipline of cyber...
U.S. Census Data Protection & Privacy Day(Suitland, Maryland, USA, January 28, 2014) The Census Bureau's Privacy Compliance Branch of the Policy Coordination Office is hosting a Data Protection and Privacy Day on January 28. This event is intended to provide a forum for Census employees...
2014 Cybersecurity Innovation Forum(Baltimore, Maryland, USA, January 28 - 30, 2014) The 2014 Cybersecurity Innovation Forum (CIF) is a three-day event, sponsored by the National Cybersecurity Center of Excellence (NCCoE) with DHS, NIST, and NSA as primary participating organizations.
Cyber Training Forum at NGA(Springfield, Virginia, USA, February 4, 2014) The 2014 Cyber Security Training Forum (CSTF) will take place at the NGA East Campus in Springfield, VA. This event is designed to provide education and training to the NGA Workforce, the Intelligence...
U.S. Department of Commerce Technology Expo(, January 1, 1970) Department of Commerce is interested in hearing from you! The OCIO Office is specifically looking for speakers on Vulnerability Management and Implementation of Continuous Monitoring. Please contact...
Cyber Security 2014(, January 1, 1970) The threats and the opportunities conference brings together over 150 business leaders, senior decision makers, business development managers and IT professionals from across the whole defence and security...
Security Analyst Summit 2014(Punta Cana, Dominican Republic, February 9 - 13, 2014) The Kaspersky Security Analyst Summit (SAS) is an annual event connecting anti-malware researchers and developers, global law enforcement agencies and CERTs and members of the security research community.
FBI HQ Cloud Computing Vendor Day(, January 1, 1970) As part of its FAR mandated market research efforts and in order to keep FBI employees informed of new products, technologies and services available in the industry, ITED has been tasked with organizing...
RSA Conference USA(San Francisco, California, USA, February 24 - 28, 2014) Hundreds of game-changing interactions will give you an unparalleled diversity of industry insight and information based on best practices, real implementation stories, and detailed case studies. Each...
Nellis AFB Technology & Cyber Security Expo(, January 1, 1970) For over 12 years, the Armed Forces Communications & Electronics Association (AFCEA) - Las Vegas Chapter and FBC have been co-hosting the Annual Information Technology Expo at Nellis AFB. As was the case...
Trustworthy Technology Conference(, January 1, 1970) Join us for the first Trustworthy Technology Conference, to be held on 27 February 2014 at the AMC Metreon Theatre in San Francisco, California. We welcome all security researchers, practitioners and citizens...
Creech AFB Technology & Cyber Security Expo(, January 1, 1970) The Armed Forces Communications & Electronics Association (AFCEA) - Las Vegas Chapter, with support from the 432d Wing, will host a Cyber Security Awareness Day & Technology Expo at Creech AFB. This is...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.