Conflicts in Ukraine and Gaza turn, sadly, from cyber to kinetic phases, with much attendant loss and sorrow. We'll continue to monitor them, of course, for their reverberations in cyberspace.
Sino-American cyber tension continues unabated, as the US reiterates warnings that some Chinese actors — probably state-directed — are targeting smaller US agencies. Attribution is, as always, a challenge, and a UN report suggests a partial explanation for why this is so: many governments make heavy use of private companies for surveillance. Some of these organizations have also served as cyber mercenaries operating on behalf of corporations themselves, with competitors' intellectual property and operations as targets. China's leaders use the BRIC summit in Brazil to denounce American "one-sided" special pleading over international norms in cyberspace.
Ransomware remains a matter of concern, despite the (probably temporary) crippling of Cryptolocker. Lookout Mobile Security warns of the emergence of ScarePakage, which locks infected Android devices, displays a bogus FBI warning, and demands a $300 ransom.
Zscaler finds a more general problem with the Android ecosystem: its apps tend to ask for too many "intrusive" permissions. Trend Micro calls attention to another problem: there are about a million bogus apps targeting Android devices.
vBulletin discloses and patches an SQL injection vulnerability.
eBay acknowledges a business significant hit from the attack it sustained this spring.
Dell encryption and InstallShield crashes appear to be unintended side effects of Microsoft's July patches.
Gartner mulls the possibility of FireEye becoming a takeover target. IBM negotiates purchase of Aorata for $200M.
Today's issue includes events affecting Brazil, China, Estonia, Germany, Israel, Romania, Saudi Arabia, United Kingdom, United Nations, United States..
Cryptolocker is not dead(Webroot Threat Blog) Recently in the news the FBI filed a status report updating on the court-authorized measures to neutralize GameOver Zeus and Cryptolocker. While the report states that "all or nearly all" of the active computers infected with GameOver Zeus have been liberated from the criminals' control, they also stated that Cryptolocker is "effectively non-functional and unable to encrypt newly infected computers." Their reasoning for this is that Cryptolocker has been neutralized by the disruption and cannot communicate with the command and control servers to receive instructions or send RSA keys after encryption
Ransomware: 5 Threats To Watch(Dark Reading) Cyber criminals have kicked it up a notch with nasty malware that locks you out of your machine and holds it for ransom
vBulletin vulnerable to SQL injection(Help Net Security) A Romanian hacking community has discovered and responsibly reported a critical SQL injection vulnerability found in the latest version (5.1.2) of the popular web forum software vBulletin
100+ DDoS events over 100GB/sec reported this year(Help Net Security) Arbor Networks released global DDoS attack data derived from its ATLAS threat monitoring infrastructure. The data shows an unparalleled number of volumetric attacks in the first half of 2014 with over 100 attacks larger than 100GB/sec reported
Large-Scale DDoS Attacks Continue to Spike(Threatpost) Although the average size of a given DDoS attack is going down, the number of attacks at the upper end of the scale is increasing, with researchers at Arbor Networks reporting more than 100 attacks of 100 Gbps in the first half of this year
Common Misconceptions IT Admins Have on Targeted Attacks(TrendLabs Security Intelligence Blog) In our efforts around addressing targeted attacks, we often work with IT administrators from different companies in dealing with threats against their network. During these collaborations, we've recognized certain misconceptions that IT administrators — or perhaps enterprises in general — have in terms of targeted attacks. I will cover some of them in this entry, and hope that it will enlighten IT administrators on how they should strategize against targeted attacks, also known as APTs
Security Patches, Mitigations, and Software Updates
Security Concerns Grow Over Ransomware(Business Solutions) A survey by IT security company KnowBe4 shows concern over ransomware is growing. The study reveals 73 percent of IT professionals surveyed are "very or extremely concerned about it," an increase from 48 percent responding in the same way in a study by IT security company Webroot in January of this year
Developing a smart approach to SMAC security(CSO) As businesses look to take advantage of SMAC (social, mobile, analytics, and cloud) platforms, they first need to consider the risks and security implications of the technologies involved
Krebs on security, Target and why retailers need a better response to data breaches(FierceRetailIT) Blogger Brian Krebs is responsible for breaking many a story about cybercrime, including Target's (NYSE:TGT) massive data breach in fall 2014 that compromised the credit and personal information of more than 70 million shoppers. But more than anything, he believes that retailers need to fundamentally change the way they respond to breaches
Internet Of Things: 8 Pioneering Ideas(InformationWeek) Today's Internet of Things remains a disparate assortment of ideas and products competing for attention. These pioneers should intrigue enterprise IT
Total internet failure: are you prepared?(Computer Weekly) A total internet failure is the one thing that could stop any business in its tracks, yet few are preparing for this possibility, consultancy KPMG has warned
Microsoft in talks to buy Aorato for $200m — report(Globes) Microsoft Corp. (Nasdaq: MSFT) is in talks to buy Israel cyber security company Aorato, "Bloomberg" reports. Talks are reportedly in an early stage and it is likely that Aorato is also negotiating with other companies. Sources believe that Aorato will be sold for about $200 million
Canadian Government Funds Seccuris to Expand OneStone Cloud-based Security Platform(Insurance News Net) Securris Inc., the North American leader in security consulting and managed services, announced that it has secured $750,000 in funding through the government of Canada's Western Innovation (WINN) Initiative. The company will use the investment to expand the capabilities of its OneStone™ Information Assurance Portal, a cloud-based security platform that offers an integrated suite of security management services
Paul J. Cormier, Red Hat Executive and Tech Industry Veteran, Joins SolarWinds' Board of Directors(MarketWatch) SolarWinds SWI +0.89% , a leading provider of powerful and affordable IT management software, today announced that Paul J. Cormier, President, Products and Technology for Red Hat, Inc. has joined its board of directors. Cormier brings his expertise and proven track record in high-transaction, volume-based software companies and deep perspective on technology adoption to the role
Raytheon and Pannesma name board members for joint venture operation in the Kingdom of Saudi Arabia(MarketWatch) Raytheon Company RTN +0.32% and Pannesma Company Limited today announced the board members of the Raytheon Atheeb Systems Limited (RASL) Joint Venture company in the Kingdom of Saudi Arabia. The Joint Venture agreement builds upon Raytheon's and Pannesma's long-standing, successful partnership of more than 20 years and their ongoing commitment to support and expand the Saudi Arabian industrial, technology and educational base. Company ownership is Raytheon 51 percent and Pannesma 49 percent
BlackBerry takes a pop at privacy-focused Blackphone(Naked Security) There's a public spat between BlackBerry and Blackphone, the spunky start-up company trying to break into the crowded mobile market with promises of air-tight security. Can BlackBerry survive the competition?
Bitdefender Antivirus Plus 2015(PC Magazine) When you buy antivirus protection these days, you know that it's really antivirus plus protection against Trojans, rootkits, rogues, and all sorts of malware. Sometimes, though, you get even more. The "Plus" in Bitdefender Antivirus Plus 2015 ($39.95 per year; $59.95 for three licenses) refers to an impressive collection of bonus features that many vendors would reserve for their full security suite
Exostar Receives DoD Interoperability Certification for SHA-2 Certificates(MarketWatch) Exostar, whose cloud-based solutions enable secure, cost-effective business-to-business collaboration, today announced its Federated Identity Service (FIS) has received interoperability certification for its public key infrastructure (PKI) services that are based on the latest National Institute of Standards and Technology (NIST) SHA-2 standard
65 challenges that cloud computing poses to forensics investigators(Help Net Security) The National Institute of Standards and Technology (NIST) has issued for public review and comment a draft report summarizing 65 challenges that cloud computing poses to forensics investigators who uncover, gather, examine and interpret digital evidence to help solve crimes
Oracle Data Redaction is Broken (Datacom via PacketStorm) Oracle data redaction is a simple but clever and innovative idea from Oracle. However, at present, there are weaknesses that undermine its effectiveness as a good security mechanism. These weaknesses can be exploited via web based SQL injection attacks and this paper details those weaknesses and provides suggestions on how it can be improved and made more secure
Healthcare IT Cloud Safety: 5 Basics(InformationWeek) Healthcare is warming up to cloud services, and that means extra vigilance. Here's what you should be doing at a minimum to keep data safe
Ethical Walls in the Digital Age: When it’s Good to Block Comms(Trend Micro: Simply Security) When two major advertising groups last year proposed a merger, it would have meant the same ad agency serving both PepsiCo and Coca-Cola. To keep the ideas and content from being shared, the ad agency would have had to create 'Ethical Walls' or communication blocks between the creative teams serving each client
Are TrueCrypt Users Screwed?(eSecurity Planet) When developers of the TrueCrypt disk encryption program warned the open source project was insecure, it left users hanging. Fortunately, there are TrueCrypt alternatives
Research alliance for the digital revolution(Phys.org) Collaborative research of Siemens with the Technische Universität München, the Ludwig-Maximilians-Universität München, the German Research Center for Artificial Intelligence and the Fraunhofer Institute for Applied and Integrated Security New technology base for automation, Internet of Things, cloud solutions, IT security and smart data Siemens to invest a sum in the double-digit million-euro range over three years
ESET Presents Thousands in Scholarships to Local High School Seniors(MarketWatch) ESET®, the global leader in proactive digital protection, today announced its support and participation in the Armed Forces Communications and Electronics Association (AFCEA) San Diego Scholarship Award Ceremony, held last night at the Hilton Mission Valley in San Diego. The company awarded $10,000 in scholarship funds to two local high school seniors to support their studies in the fields of science, technology, engineering or math (STEM) in higher education
NSA and Capitol College Working Together(American News Report ) The National Security Agency has chosen Capitol College of Laurel, Maryland as one of two academic partners to help NSA's personnel stay ahead of the steepening cybersecurity curve
Espionage claims could test US-German military accord, experts say(Stars and Stripes) News Wednesday that Germany is investigating new allegations that the United States bought secrets from a German official — the second such probe to become public in a week — delivered another blow to U.S.-German relations over what is now a year-old scandal of American spying on an ally
Pincus: Is NSA keeping too much?(Washington Post via the Salt Lake Tribune) The National Security Agency does not have the time or personnel to eliminate innocent U.S. citizens' communications collected under Section 702 of the Foreign Intelligence Surveillance Act
Child abuse images dragnet snares 660 suspected paedophiles(Naked Security) Doctors, teachers, scout leaders, care workers and former police officers — all professions that entail unsupervised access to children — were among 660 who've been arrested in an unprecedented child abuse image dragnet in the UK
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
2nd Annual Oil & Gas Cyber Security Conference(Houston, Texas, USA, July 15 - 17, 2014) This highly interactive, hands-on forum will break down each potential cyber threat specific to the oil and gas industry, as well as tackle key issues including managing communication between OT and IT...
SINET Innovation Summit(New York, New York, USA, August 6, 2013) The purpose of the Innovation Summit is to reinvigorate public private partnership efforts and increase relationships between industry, government and academia that fosters sharing of information and collaboration...
Security Startup Speed Lunch DC(Washington, DC, USA, July 22, 2014) Our goal is to connect the most promising security startups in the world with decision-makers at aerospace, asset-management, banking, communications, defense, energy, healthcare, government, technology...
Black Hat USA 2014(, January 1, 1970) Black Hat USA is the show that sets the benchmark for all other security conferences. As Black Hat returns for its 17th year to Las Vegas, we bring together the brightest in the world for six days of learning,...
BSidesLV 2014(Las Vegas, Nevada, USA, August 5 - 6, 2014) We have an amazing array of speakers each year, covering topics such as Penetration Testing, Forensics, Incident Response, Risk, and everything in between. We have a Lockpick Village, the Squirrels in...
Passwords14(Las Vegas, Nevada, USA, August 5 - 6, 2014) Passwords is the first and only conference of its kind, where leading researchers, password crackers, and experts in password security from around the globe gather in order to better understand the challenges...
4th Annual Cyber Security Training Forum(Colorado Springs, Colorado, USA, August 5 - 6, 2014) The Information Systems Security Association (ISSA) — Colorado Springs Chapter and FBC, Inc. will co-host the 4th Annual Cyber Security Training Forum (CSTF). CSTF is set to convene from Tuesday August...
DEF CON 22(Las Vegas, Nevada, USA, August 7 - 10, 2014) The annual hacker conference, with speakers, panels, and contests. Visit the site and penetrate to the schedules and announcements.
South Africa Banking and ICT Summit(Lusaka, Zambia, August 8, 2014) The South Africa Banking and ICT Summit is the exclusive platform to meet industry thought leaders and decision makers, discover leading edge products and services and discuss innovative strategies to...
SANS Cyber Defense Summit and Training(Nashville, Tennessee, USA, August 13 - 20, 2014) The SANS Institute's Cyber Defense Summit will be paired with intensive pre-summit hands-on information security training (August 13-18). This event marks the first time that SANS will conduct a training...
AFCEA Technology & Cyber Day(Tinker AFB, Oklahoma, USA, August 21, 2014) The Armed Forces Communications & Electronics Association (AFCEA) — Oklahoma City Chapter will once again host the 10th Annual Information Technology & Cyber Security Day at Tinker AFB. This is the only...
Resilience Week(Denver, Colorado, USA, August 19 - 21, 2014) Symposia dedicated to promising research in resilient systems that will protect critical cyber-physical infrastructures from unexpected and malicious threats—securing our way of life.
The Hackers Conference(New Delhi, India, August 30, 2014) The Hackers Conference is an unique event, where the best of minds in the hacking world, leaders in the information security industry and the cyber community along with policymakers and government representatives...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.