China's expansive island-building in the South China Sea has attracted hacktivist groups to that country's maritime and security authorities. China complains that this goes to show it's a victim in cyberspace.
Japan continues to recover from its recent pension system breach. Lieberman Software looks at the episode and sees an instance of an Asia-Pacific country's resistance to implementation of modern security measures.
The long-familiar "Microsoft Tech Support" is evolving, says Blue Coat — its approaches have grown marginally more plausible, and now extend to bogus provision of Mac help.
OpenDNS finds signs that clouds "in bad neighborhoods" are proving a potential source of IoT infections.
Users prove more easily fooled by phishing than they would like to think, and there are signs of terrorist groups phishing ways of striking their targets.
Britain's GCHQ warns UK businesses of a heightened tempo of cyber attack.
In industry news, Sophos prepares for an initial public offering on the London Stock Exchange. ARM considers buying Sansa as an IoT security play. F-Secure consolidates its position in the European market with acquisition of nSense. SpaceX's intellectual property self-defense efforts spawn Spikes Security, a new company in the cyber sector.
In the US, Congress passes (and the President signs) legislation enabling electronic surveillance in a curtailed form. Agencies will henceforth require court orders for bulk collection. Observers differ over how well the compromise will please any side, but some see the fundamental problem as one of trust.
Home Depot asks that breach lawsuits against it be dismissed.
Today's issue includes events affecting Australia, China, Japan, New Zealand, United Kingdom, United States.
We're down in Northern Virginia today, Tweeting from TechExpo's DC Metro Cyber Security Summit.
Cyber Attacks, Threats, and Vulnerabilities
China responds to report on cyber attack(Xinhua) If overseas hacking organization OceanLotus is proven guilty for stealing government information, it will further evidence that China falls victim to hacker attacks, a Chinese spokeswoman said on Tuesday
Phony Tech Support Scams Now Target Macs(Blue Coat Blogs) This is essentially Part Two of yesterday's post on phony tech support scams. (For those too lazy to click, a hat tip to @malekal_morte for his tweets yesterday about these attacks)
Malvertising Gets Jacked with 3 Zero-Days(Infosecurity Magazine) Cyber-criminals are turning to malvertising in ever-greater numbers, as recent huge hits on porn sites and a range of media properties illustrates. There's no end in sight though, and Malwarebytes said that it intends to use Flash to gain easy access to millions of consumers this year
Cybersecurity Veteran Doug Wylie Joins NexDefense Executive Team(PRWeb) NexDefense, a leading authority on cybersecurity for industrial control systems (ICS), today announced that critical infrastructure cybersecurity veteran Doug Wylie has joined the executive team as vice president of product marketing and strategy…In addition, former U.S. Senator Sam Nunn has joined the company?s investor and advisory groups, bringing a wealth of experience in defending national critical assets
Akamai and Trustwave unite to protect businesses from online threats(Help Net Security) Akamai Technologies, provider of content delivery network services, and managed security services firm Trustwave announced at Infosecurity Europe 2015 a new strategic alliance designed to help businesses more effectively fight a wide range of malicious online activities through vulnerability assessment, denial of service prevention and incident response
Vectra To Demonstrate Real-Time Cyberattack Detection(CIO Today) Vectra Networks today announced that it will provide a live demonstration of its differentiated solution that delivers real-time Relevant Products/Services detection of cyber Relevant Products/Services attacks in-progress at the Gartner Relevant Products/Services Security & Risk Management Summit next week
Technologies, Techniques, and Standards
5 ways to stop a DDoS attack(FierceITSecurity) Distributed denial of service attacks continue to grow larger and more sophisticated as they claim more reputable victims, but that does not mean smaller websites are left defenseless
Bug hunting without much tech knowledge or many tools(Help Net Security) Bas Venis has been programming since he was 14 years old. After gaining some experience as a web developer, this 18-year-old self-taught security researcher got into IT security and aimed his sights at browsers. Specifically, at logic flaws that could be exploited
Legislation, Policy, and Regulation
Congress approves overhaul of NSA surveillance(Baltimore Sun) Congress gave final approval Tuesday to the most sweeping rollback of government surveillance powers in the post-Sept. 11-era, clearing the way for a new program that bans the National Security Agency from collecting and storing Americans' telephone dialing records
U.S. Surveillance in Place Since 9/11 Is Sharply Limited(New York Times) In a significant scaling back of national security policy formed after the Sept. 11, 2001, terrorist attacks, the Senate on Tuesday approved legislation curtailing the federal government's sweeping surveillance of American phone records, and President Obama signed the measure hours later
SIS spies to Kim Dotcom: We're sorry for calling you fatty(New Zealand Herald) Security Intelligence Service chief Rebecca Kitteridge has apologised to Kim Dotcom for the behaviour of her spies, who swapped emails about the internet entrepreneur's weight and wife while mocking his chances of getting New Zealand residency
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Newly Noted Events
Gartner Security & Risk Management Summit(National Harbor, Maryland, USA, June 8 - 11, 2015) Gartner Security & Risk Management Summit 2015 provides you with best practices and strategies so you can maintain cost-effective security and risk programs in order to support digital business and drive...
Cybersecurity Outlook 2016(Tysons Corner, Virginia, USA, June 26, 2015) Cybersecurity Outlook 2016 is a breakfast event by Potomac Tech Wire and Billington CyberSecurity that brings together senior executives in the Mid-Atlantic to discuss technology issues in a conversational,...
Techno Security & Forensics Investigations Conference(Myrtle Beach, South Carolina, USA, May 31 - June 3, 2015) The Seventeenth Annual International Techno Security & Forensics Investigations Conference will be held May 31 ? June 3 in sunny Myrtle Beach at the Myrtle Beach Marriott Resort. This conference promises...
Mobile Forensics World(Myrtle Beach, South Carolina, USA, May 31 - June 3, 2015) The Eighth Annual Mobile Forensics World will also be held May 31 ? June 3 in sunny Myrtle Beach at the Myrtle Beach Marriott Resort. The Mobile Forensics World is specifically dedicated to Federal, State...
School on Computer-aided Cryptography(College Park, Maryland, USA, June 1 - 4, 2015) The goal of the school is to provide participants with an overview of computer-aided cryptography with a special focus on computer-aided cryptographic proofs using the EasyCrypt tool. Lectures discussing...
AusCERT2015: Smarten up(RACV Royal Pines Resort, Gold Coast, Queensland, June 1 - 5, 2015) This year's conference theme explores how we need to smarten up to manage information security risks better. We need to "smarten up" by focusing on information security essentials; by taking advantage...
NSA SIGINT Development Conference 2015(Fort Meade, Maryland, USA, June 2 - 3, 2015) This classified conference will focus on the preeminent intelligence issues facing those who are tasked with SIGINT as part of their mission. Over 1500 participants from the US intelligence community and...
ASIA (Annual Symposium on Information Assurance)(Albany, New York, USA, June 2 - 3, 2015) ASIA is an event held jointly with the 18th Annual New York State Cyber Security Conference (NYSCSC), aiming to attract researchers and practitioners alike for engaging talks about information security...
Infosecurity Europe 2015(London, England, UK, June 2 - 4, 2015) Infosecurity Europe is the largest and most attended information security event in Europe. It is a free exhibition featuring not only over 325 exhibitors and the most diverse range of new products and...
Cyber Security Summit: DC Metro Area(Tysons Corner, Virginia, USA, June 3, 2015) The Cyber Security Summit provides an exclusive business environment to meet with Senior Executives who are seeking innovative solutions to protect their business & critical infrastructure. Delegates at...
Seventh Annual Information Security Summit(Los Angeles, California, USA, June 4 - 5, 2015) Information Security has become top of mind for companies and this conference is a must for IT staff, CISOs, Board members and CEOs. The Seventh Annual Information Security Summit offers comprehensive,...
ShowMeCon 2015(St. Louis, Missouri, USA, June 8 - 9, 2015) This highly technical forum showcases eye-opening presentations from world-renown ethical hackers and security experts that will leave you amazed and frightened at the same time. By giving you access into...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.