Boko Haram takes a page from ISIS's information operations playbook and shows the junior varsity can be a murderous and coldly repellent as the varsity.
Consensus attribution of the Anthem breach to China leads analysts to ask what good such attribution does. Opinion ranges from "none" to "a lot."
Observers think the Lenovo affair is just "the tip of the crapware iceberg."
The FREAK (Factoring Attack on RSA-EXPORT Keys) vulnerability is said to affect export-grade encryption in widespread use since the 1980s, enabling attackers to break HTTPS in both Apple and Android devices.
Cisco's Talos unit observes attackers using the Angler exploit kit to shadow GoDaddy subdomains.
Symantec describes a phishing campaign designed to induce iCloud users to surrender credentials.
AdaptiveMobile finds a worm, "Gazon," spreading through mobile devices via SMS spam: the hook's a bogus Amazon gift card offer.
A MongoDB zero-day exploit is hawked in the black market.
Mobile payment systems are increasingly popular but increasingly vulnerable, and banks are reported "scrambling" for a fix to the systems' lax security.
The US GAO tells the FAA its National Airspace System is vulnerable to cyber attack. The White House releases its annual cyber report card for Federal agencies to Congress: grades are disappointing — if many agencies were middle-schoolers, they'd spend their summer in remedial classes.
China wonders why people object to its surveillance policies, since, China says, they're so American in style.
Former US DCI Petraeus pleads to a misdemeanor. Former Secretary of State Clinton's email accounts are scrutinized.
Today's issue includes events affecting China, European Union, Netherlands, New Zealand, South Africa, United Kingdom, United States.
The Anthem Hack: All Roads Lead to China(ThreatConnect Blog) When news of the Anthem breach was reported on February 4th, 2015, the security industry quite understandably went wild. A breach of this magnitude was certainly unprecedented
Lenovo Only Made Up To $250,000 From Nightmare Superfish Deal, Say Sources(Forbes) Lenovo is about to kill off a small but troublesome source of its revenue: crapware. Some call it adware, some bloatware, others malware, but whatever the correct nomenclature, the PC maker doesn't want anything more to do with it after the debacle over Superfish, the "visual advertising" tech that posed a real security threat to millions of Lenovo PC users. It can certainly afford to get rid of it too
New Freak Attack Threatens Many SSL Clients(Threatpost) For the nth time in the last couple of years, security experts are warning about a new Internet-scale vulnerability, this time in some popular SSL clients. The flaw allows an attacker to force clients to downgrade to weakened ciphers and break their supposedly encrypted communications through a man-in-the-middle attack
Massive FREAK security flaw breaks HTTPS in Android, Apple devices(Extreme Tech) A recently announced security flaw, dubbed FREAK (Factoring RSA Export Keys) has significant implications for Android and Apple devices that connect to other websites via HTTPS — and offers an object lesson in why deliberately weakening cryptographic standards to allow for backdoors or other forms of "protection" is such an emphatically bad idea
Threat Spotlight: Angler Lurking in the Domain Shadows(Cisco Blogs) Over the last several months Talos researchers have been monitoring a massive exploit kit campaign that is utilizing hijacked registrant accounts to create large amounts of subdomains for both initial redirection and exploitation. This campaign has been largely attributed to Angler Exploit Kit with fileless exploits serving various malicious payloads
Worm.Gazon: Want Gift Card? Get Malware(AdaptiveMobile Blog) There is a Chinese proverb: 'A small spark can burn across a prairie'. It also applies to the malware world. A simple piece of malware is on the way to become one of the 'spammiest' mobile malware outbreaks seen yet. This malware we have dubbed Gazon spreads via SMS with a shortened link to itself in the spam message, redirecting a potential victim to a webpage that promises an Amazon gift card if you install an APK file hosted on the page
Research Finds 400k Security Camera DVRs with Hardcoded Credentials(A Tech Dad) I've been tinkering with passive research using public scans which are freely available via Project Sonar. I was curious to search and look for any devices which may have username and passwords hardcoded so I decided to search for a few instances where the username and passwords appear hardcoded to admin. I thought that surely there couldn't be many — so I kicked off the scan
Hackers Breach Perspectives Website for Religious Classes(Softpedia) Advertisements for abortion pills scattered on the site. Cybercriminals leveraged a vulnerability in the Perspectives website and managed to access a database containing eCheck payment information for website transactions
US airspace system vulnerable to cyber attack(Air Traffic Management) While the United States has taken steps to protect its air traffic control systems from cyber-based and other threats, significant security control weaknesses remain, according to a government watchdog
Federal agencies score low on cyberdefense assessment report(FierceCIO) It may be a perfect example of "do as I say, not as I do," as federal government agencies have been revealed to be among the worst violators of good cyberdefense, despite all the rhetoric that comes out of Washington around bolstering IT security
6 Biggest Blunders in Government's Annual Cyber Report Card(Nextgov) The White House has released its yearly assessment of agency compliance with the governmentwide cyber law known as the Federal Information Security Management Act. And given the spate of breaches and hacks that hit both government and the private sector, the results may not be all that surprising
Security Patches, Mitigations, and Software Updates
D-Link fixes critical router flaws(Help Net Security) D-Link has released new firmware for its DIR-820L Wi-Fi dual band cloud router, which fixes a number of security vulnerabilities. One of these can apparently be exploited by attackers to gain full access to the device independently of whether the "WAN management" option is enabled on the device or not
AWS avoids mass cloud reboot to fix Xen bug(FierceITSecurity) Amazon Web Services (AWS) said that it has averted a need for an en masse reboot of its Elastic Compute Cloud (EC2) customers, after engineers found a way to patch most of its cloud servers without rebooting
Patch Tuesday: Microsoft Alters Plans to Deliver SharePoint Updates through Windows Update(Windows IT Pro) In February, Microsoft began delivering both security updates and non-security product updates for SharePoint through Windows Update. This caught a lot of customers by surprise and not in a good way. Delivering non-security updates to critical SharePoint components has the potential to break things if untested. And, considering how bad each patching month has been in the last couple years, customers would rather retrieve the non-security updates themselves and test and install in a controlled manner
Cyberspace Conflict Growing More Destructive, NSA's Chief Says(Bloomberg) Conflict in cyberspace will worsen as governments, criminals and others carry out more sophisticated and destructive hacking attacks, creating a threat comparable to what the U.S. faced during the Cold War, according to the head of the National Security Agency
Security threats and the retail industry(Help Net Security) Only 18 percent of retail IT security professionals are concerned that point of sale devices are being targeted by cyber criminals, and only 20 percent are "confident" that point of sale devices are securely configured, according to Tripwire
Lockheed sees shift in focus on infrastructure cyber security(Reuters) Lockheed Martin Corp, the Pentagon's No. 1 supplier, said it has seen a "sea change" in demand for cyber security services in critical infrastructure areas such as energy, oil and gas, and financial institutions over the past 18 months
Palo Alto rallies to new highs after analysts praise results/guidance(Seeking Alpha) Though Palo Alto Networks (NYSE:PANW) opened lower today in the wake of its FQ2 beat and strong FQ3 guidance, shares gradually moved higher and finished up 2%, making new highs in the process. A slew of positive analyst notes — at least 11 firms hiked their targets, many to the $165-$170 range — helped the next-gen firewall vendor's cause
Darktrace: The enterprise immune system(IT World Canada) I understand that many of you reading this have never worked in a security operations centre (SOC), but there's a good chance you've seen them in movies
Avast Announce The Launch Of SecureMe Designed To Protect From WiFi Hacking(Android Headlines) MWC has been in full swing over the last few days and there have been a number of big announcements. Today though, known security and internet virus protection company, Avast were making a few announcements of their own. One of those in particular was the launch of a new service from Avast which is being dubbed 'SecureMe'. For those, who are worried about connecting to WiFi networks securely and especially those in public places, then this might be the announcement for you. There has been much press recently surrounding the notion of WiFi hacking, where criminals use unsecured connections to reroute web traffic to fake internet sites. Once the user enters their credentials, the criminals then know. As such, this is a useful feature for those that often connect to WiFi networks in airports, cafes, hotels and the likes
How will Samsung Pay compare to Apple Pay?(Macworld via CSO) As soon as Tim Cook unveiled Apple Pay back in September, two things were instantly clear: 1) Contactless payments had arrived; and 2) Samsung was going to copy it. So when Samsung unveiled its next flagship phones, the Galaxy S6 and Galaxy S6 Edge, on Sunday in Barcelona, I followed along with great interest, ready to snicker at its iPhone-like curved edges, fingerprint sensor, and perfectly circular speaker grilles
Cerovsky named director of UWF Center for Cybersecurity(Pensacola News Journal) The University of West Florida has named retired Navy Capt. Susan K. Cerovsky as director of the Center for Cybersecurity, effective March 16, 2015. Cerovsky joins UWF after nearly 30 years as an officer in the U.S. Navy
Norwich University Partners with New Cyber Intelligence Tool(Vermont Digger) Norwich University, the oldest private military college in the U.S. and ranked second best in the country for cyber security courses and degree programs, has partnered with Silobreaker to use their online threat intelligence product in their cyber forensics classes
Protect society against cyber crimes: Experts(Arab News) A security expert has emphasized the need for collaboration in order to protect society against cybertattacks during the 6th annual Cyber Defense Summit in Riyadh on Monday
Build A 'Department Of Cyber:' Former DNI McConnell(Breaking Defense) Sen. Susan Collins has a bill about how to improve cyber sharing that should go to markup next week and she spoke about the challenges cyber poses to the government this morning at the Intelligence and National Security Alliance annual conference here. Three former directors of National Intelligence — John Negroponte, Mike McConnell and Dennis Blair — also spoke about those challenges before an audience of more than 700 people at INSA
GAO: Require states to show cost benefits of anti-fraud systems(FierceHealthPayer) While the Centers for Medicare & Medicaid Services supports states' efforts to use technology to root out improper payments, its failure to require states to document the effectiveness of these systems means no one knows whether they really work, a Government Accountability Office report finds
Calif. Would Tighten Cyber Porn Laws(Courthouse News Service) California legislators have proposed bills that would make revenge porn a new crime and increase protections for its victims
Clinton defends use of personal e-mail at State(USA TODAY) Hillary Clinton's exclusive use of a personal e-mail account to conduct government business during her four-year tenure as secretary of State may have violated federal regulations, The New York Times reported Monday night
Boston SecureWorld(Boston, Massachusetts, USA, March 4 - 5, 2015) Join your fellow security professional for affordable, high-quality cybersecurity training and education at a regional conference near you. Earn CPE credits while learning from nationally recognized industry...
Mercury Proposers' Day Conference(IARPA1, Washington, DC, March 5, 2015) The Intelligence Advanced Research Projects Activity (IARPA) will host a Proposers' Day Conference for the Mercury Program on March 5, in anticipation of the release of a new solicitation in support of...
OISC: Ohio Information Security Conference(Dayton, Ohio, USA, March 11, 2015) Technology First invites you to participate in the 12th Annual Ohio Information Security Conference Wednesday, March 11, at the Sinclair Community College Ponitz Center in Dayton, Ohio. The conference...
RiSK Conference 2015(Lasko, Slovenia, March 11 - 12, 2015) In recent years RISK conference has become one of the leading events on computer security in the Adriatic region and is attended by engineering as well as executive staff of companies from the region.
B-Sides Vancouver(Vaqncouver, British Columbia, Canada, March 16 - 17, 2015) The third annual Security B-Sides Vancouver is an information security conference that will be held March 16th and 17th. We love to see brand new speakers, seasoned speakers, and everyone in between
Insider Threat 2015 Summit(Monterey, California, USA, March 16 - 17, 2015) The Insider Threat 2015 Summit is about bringing Government and Industry organizations and their cybersecurity leaders together in order to better understand the type of threats that may impact their infrastructure...
2015 North Dakota Cyber Security Conference(Fargo, North Dakota, USA, March 17, 2015) The North Dakota Cyber Security Conference brings together community members from academia, government and industry to share strategies, best practices and innovative solutions to address today's challenges...
Philadelphia SecureWorld(Philadelphia, Pennsylvania, USA, March 18 - 19, 2015) Join your fellow security professional for affordable, high-quality cybersecurity training and education at a regional conference near you. Earn CPE credits while learning from nationally recognized industry...
2015 Cyber Security Summit(McLean, Virginia, USA, March 19, 2015) During Congressman Mike Rogers' "The Code War in America" talk at the June 2013 POC breakfast, he challenged all of us to "recognize that every day U.S. businesses are targeted by governments like China...
BSides Salt Lake City(Salt Lake City, Utah, USA, March 20 - 21, 2015) BSides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation
CarolinaCon-11(Raleigh, North Carolina, USA, March 20 - 22, 2015) CarolinaCon-11 (also hereby referred to as "The Last CarolinaCon As We Know It") will occur on March 20th-22nd 2015 in Raleigh NC (USA). We are now officially accepting speaker/paper/demo submissions...
Cyber Security Conference 2015(Bolton, UK, March 23 - 24, 2015) Cyber Security Conference 2015 is a coming together of the North of England's two most successful Cyber Security Conferences; BEC Information & Data Security Conference and Lancaster University's North...
CyberTech Israel 2015(Tel Aviv, Israel, March 24 - 25, 2015) In the face of these enemies and threats, individuals, organizations and states are required to produce innovative, unique solutions that would improve the resistance and resilience of the sensitive systems...
2nd Annual ISSA COS Cyber Focus Day(Colorado Springs, Colorado, USA, March 25, 2015) Join us for the Information Systems Security Association (ISSA) — Colorado Springs Chapter — Cyber Focus Day set to take on Wednesday, March 25, 2015 at the University of Colorado Colorado...
28th Annual FISSEA Expo(Gaithersburg, Maryland, USA, March 25, 2015) This year's theme is "Changes, Challenges, and Collaborations: Effective Cybersecurity Training." Through numerous high quality sessions, over 100 attendees will learn new ways to improve their IT security...
CYBERWEST: the Southwest Cybersecurity Summit(Phoenix, Arizona, USA, March 25 - 26, 2015) The purpose of CYBERWEST is to bring together Government and businesses to: Exchange information and learn in areas of policy and strategy; technology and R&D; workforce training and education; and economic,...
Women in Cyber Security(Atlanta, Georgia, USA, March 27 - 28, 2015) Despite the growing demand and tremendous opportunities in the job market, cybersecurity remains an area where there is significant shortage of skilled professionals regionally, nationally and internationally.
Automotive Cyber Security Summit(Detroit, Michigan, USA, March 30 - April 1, 2015) The debut Automotive Cyber Security Summit will bring together CTOs, CSOs, Engineers and IT professionals from GM, KIA, Nissan, Bosch, Qualcomm and more for three days of case studies, workshops, panel...
Insider Threat Symposium & Expo(Laurel, Maryland, USA, March 31, 2015) The National Insider Threat Special Interest Group (NITSIG) announced that it will hold FREE 1 day Insider Threat Symposium & Expo (ITS&E) on March 31, 2015 in Laurel, Maryland. The symposium is exclusively...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.