TalkTalk announces lower numbers of affected customers than initially feared when its recent breach was disclosed. British police have arrested a second teenager in connection with the hack, but their motives remain obscure. Naked Security observes that it's tempting in cases like this to jump to the conclusion that the kids did it for the lulz, but there's been enough precocious financial crime to give one pause.
More details emerge in the 000webhost, Mark and Spencer, and Optimal Payment breaches.
A well-crafted, convincing spam campaign is trolling for domain name owners, seeking (as usual) to get them click malicious links. The spam is personalized and warns of imminent suspension.
Adult content continues to be the biggest vector for mobile malware.
CyberX finds a zero-day in Rockwell industrial control products.
Proofs-of-concept demonstrate vulnerabilities in iris-recognition biometric scanners and in browser histories (the latter has been named "Sniffly").
Dridex infections spread as the botnet returns to life.
Researchers publish details of CryptoWall ransomware. Revenue from CryptoWall appears to investigators to be flowing into a single criminal group: the latest version may have netted the crooks some $325 million.
Google demands redress from Symantec over allegedly improperly issued certificates.
Xen patches an old VM escape hypervisor vulnerability.
US CISA legislation continues to draw varying reviews. New surveillance policies are enacted in the UK and EU. (Some of the new European policies seem fairly aggressive.) US NSA Director Rogers calls for more industry cooperation in cyber security, but would rule our privateering in cyberspace.
Today's issue includes events affecting Belgium, China, European Union, France, Germany, Iraq, Lithuania, Syria, United Kingdom, United States.
Dateline CyberMaryland 2015
CyberMaryland 2015: Collaborate, Educate, Innovate(National Cyber Security Hall of Fame and the Federal Business Council) The CyberMaryland Conference is an annual two-day event presented jointly by The National Cyber Security Hall of Fame and Federal Business Council (FBC) in conjunction with academia, government and private industry organizations
CyberMaryland Day Two(The CyberWire) CyberMaryland 2015's second and final day featured presentations by, and discussions with, innovators in the field of cyber security. We were able to speak at length with five of those innovators. But the day opened with the launch of LifeJourney's and NSA's Day of Cyber educational initiative.
About the NSA Day of Cyber(NSA Day of Cyber) The NSA Day of Cyber is designed to raise the "national IQ" for STEM and CyberScience education paths. NSA is sponsoring the program to introduce and inspire the more than 40 million students in schools and colleges to pursue STEM careers to build the skills that will open up their future and connect them to this in-demand digital workforce
Another teenager arrested in connection with TalkTalk hack(Graham Cluley) The hack of telecoms firm TalkTalk dominated the headlines in the United Kingdom last week as the company struggled to respond to accusations that it had dropped the ball (it was the third data breach impacting TalkTalk customers in the last 12 months) and gave customers some poor advice
The top threat vector for mobile devices? Prn(Help Net Security) As mobile devices become more deeply woven into the fabric of our personal and work lives, cyber criminals are taking increasingly vicious and disturbingly personal shots at us, according to Blue Coat Systems
Dridex Returns to Haunt Financial Institutions(Credit Union Times) Less than a month after being dismantled, the notorious Dridex malware, which has been responsible for $30 million in bank fraud losses in the United Kingdom and more than $10 million in losses in the U.S., re-emerged
Mozilla SeaMonkey Multiple Vulnerabilities(Secunia) A weakness and some vulnerabilities have been reported in Mozilla SeaMonkey, where one has an unknown impact and the others can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, disclose certain information, and compromise a user's system
Sniffly Websites Could Snaffle Browsing Data(Team Cymru) A proof of concept for an interesting new intelligence gathering technique has surfaced recently. Researcher Yan Zhu presented the procedure (some language may offend), known as Sniffly*, at ToorCon 2015
Sony BMG Rootkit Scandal: 10 Years Later(Network World via CSO) Object lessons from infamous 2005 Sony BMG rootkit security/privacy incident are many — and Sony's still paying a price for its ham-handed DRM overreach today
Nonprofits Face Costly Cyberthreats(BizTech) As the frequency and cost of data breaches increase, nonprofits need to assess their security controls and address vulnerabilities
Most are unaware of the seriousness of medical data theft(Help Net Security) Most remain unaware of their vulnerability to medical data theft, and the fact that it can be far more damaging than credit card or social security number compromise, according to Vormetric and Wakefield Research
Imperva +17.9% on results/guidance; PANW, CYBR, PFPT, CUDA also up(Seeking Alpha) Imperva (NYSE:IMPV) beat Q3 estimates and forecast Q4 revenue of $66M-$68M and EPS of $0.10-$0.16, above a consensus of $62.3M and -$0.06. Moreover, on the earnings call (transcript), the Web app firewall and database security software vendor set initial 2016 revenue growth guidance of "at least 25%," above a 24% consensus
Elcomsoft Phone Breaker 5.0 Adds Over-the-Air Acquisition of iOS 9 Devices(PRNewswire) ElcomSoft updates Elcomsoft Phone Breaker, adding support for over-the-air acquisition of Apple devices running iOS 9. Version 5.0 can download iCloud backups and iCloud Drive files saved by devices running the latest version of Apple's mobile OS, and becomes industry's first cloud acquisition tool for iOS 9
Top 20 Android Security Apps(eSecurity Planet) As Android devices continue to surge in popularity, the recently disclosed Stagefright vulnerability, affecting 950 million devices, served as a strong reminder of how crucial it is to keep a close eye on security, particularly if your Android phone or tablet holds sensitive information
Geneva Internet Plaform(DiploFoundation) The Geneva Internet Platform (GIP), an initiative of the Swiss authorities operated by Diplo Foundation, in partnership with the Internet Society is launching the GIP Digital Watch, an online observatory of digital policies
Technologies, Techniques, and Standards
NFA Adopts Interpretive Notice Regarding Information Systems Security Programs — Cybersecurity(National Futures Association) The Commodity Futures Trading Commission (CFTC) recently approved NFA's Interpretive Notice to NFA Compliance Rules 2-9, 2-36 and 2-49 entitled Information Systems Security Programs, which requires Member firms to adopt and enforce written policies and procedures to secure customer data and access to their electronic systems (Cybersecurity Interpretive Notice)
New Freedom of Information Act Request Documents Released by ODNI(IC on the Record) The Office of the Director of National Intelligence is one of seven federal agencies participating in a pilot program to make records requested via the Freedom of Information Act more readily available to the public, as reflected in the recently released Third National Action Plan for Open Government
Rogers: We don't need cyber privateers(C4ISR & Networks) Tapping the private sector to help with offensive and defensive measures isn't new for America's military but we have to be very careful when it comes to the cyber domain, warned Adm. Mike Rogers, director of the National Security Agency and commander of U.S. Cyber Command
U.S. court will not halt NSA phone spy program before ban(Reuters) A U.S. appeals court on Thursday refused to immediately halt the government's bulk collection of millions of Americans' phone records during a "transition" period to a new federal scheme that bans the controversial anti-terrorism surveillance
US DOJ admits that Stingrays can be used to intercept call and SMS content(Help Net Security) After a battling the US Department of Justice in a court for two and a half years, the American Civil Liberties Union of Northern California has emerged victorious and has been given access to documents that spell out the details about the US federal government's use of Stingrays surveillance devices
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Newly Noted Events
California Cybersecurity Task Force Quarterly Meeting(Walnut Creek, California, USA, January 20, 2015) The California Cyber Security Task Force serves as an advisory body to California's senior government administration in matters pertaining to Cyber Security. Quarterly Cybersecurity Task Force meetings...
Hackito Ergo Sum(Paris, France, October 29 - 30, 2015) No commercial content, no vendor talk. First time presenters welcome. Highly technical talks only. Bonus point for offensive and weird ideas. Areas and domains: systems hacking & security, network hacking,...
NICE 2015 Conference and Expo(San Diego, California, USA, November 3 - 4, 2015) Cybersecurity has emerged as one of the leading creators of jobs and opportunity for all economic sectors. The demand for cybersecurity positions in both the public and private sector is large and growing,...
Inside Data Science 2015(Monterey, California, USA, November 3 - 4, 2015) At the Inside Data Science 2015 Conference (IDS2015) our focus is not on the storage or volume of data, but rather the importance of what you do with it. To synchronize the processing, exploitation and...
4th International Internet-of-Things Expo(Santa Clara, California, USA, November 3 - 5, 2015) With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Santa Clara. Learn what is going on, contribute to the discussions, and...
RSA Conference 2015 Abu Dhabi(Abu Dhabi, United Arab Emirates, November 4 - 5, 2015) Join your fellow information security professionals at RSA Conference 2015 Abu Dhabi, where we'll be discussing security issues from a global perspective
ICMC (the International Cryptographic Module Conference)(Washington, D.C., USA, November 4 - 6, 2015) ICMC core focus includes cryptographic modules, FIPS 140-2, ISO/IEC 19790 and cryptographic algorithms. Specialists from all over the world gather in Washington to discuss about commercial cryptography...
After the Shift: Securing Tomorrow's Payment Technology(Washington, DC, USA, November 5, 2015) From encryption to tokenization, what does the future hold for keeping consumer data safe? Policymakers, industry leaders, and technology experts will explore the cutting edge of cyber technology and discuss...
2nd Annual Journal of Law and Cyber Warfare Conference(New York, New York, USA, November 5, 2015) The 2015 symposium speakers represent an unparalleled group of cyber security experts with a wide variety of industry expertise and knowledge. Attendees will hear from experts on cybersecurity and cyber...
Start with Security(Austin, Texas, USA, November 5, 2015) This one-day conference will continue the FTC's work to provide companies with practical tips and strategies for implementing effective data security. Aimed at start-ups and developers, this event will...
University of Phoenix® Technology Conference(Arlington, Virginia, USA, November 7, 2015) At the University of Phoenix® Technology Conference 2015, a free event hosted by the University of Phoenix College of Information Systems and Technology, you will be introduced to cyber security,...
Cyber³ Conference: Crafting Security in a less Secure World(Nago City, Okinawa, Japan, November 7 - 8, 2015) An international conference on cyber security hosted by the Government of Japan with the support of the World Economic Forum. At this conference, multi-stakeholders, including policymakers, business leaders,...
FedCyber 2015(Tyson's Corner, Virginia, USA, November 10, 2015) This conference, orchestrated by cyber practitioners Matt Devost and Bob Gourley, is designed to advance the state of cyber defense. The FedCyber.com Threat Expo will bring together thought leaders who...
First International Conference on Anti-Cybercrime (ICACC-2015)(Riyadh, Saudi Arabia, November 10 - 12, 2015) Al Imam Mohammad Ibn Saud Islamic University is organizing this international conference to establish a forum where discussions on vital issues related to anti-cybercrime can occur. This conference will...
Black Hat Europe(Amsterdam, the Netherlands, November 10 - 13, 2015) Black Hat prides itself with being "the most technical and relevant global information security event series in the world." For the past 16 years, the Black Hat events have given their attendees the opportunity...
Pen Test Hackfest Summit & Training(Alexandria, Virgina, USA, November 16 - 23, 2015) SANS Pen Test Hackfest Training Event and Summit is coming back to Washington DC, bigger and better than ever! The Hackfest is an ideal way to learn offensive techniques so you can better defend your environment.
Cybersecurity, the SEC and Compliance(New York, New York, USA, November 18, 2015) The recent SEC CyberSecurity Examination Initiative focuses on information safeguards for financial services organizations. Are you prepared? Please join us for a panel discussion on what cybersecurity...
CyberCon 2015(Pentagon City, Virginia, USA, November 18, 2015) CyberCon 2015 is the forum for dialogue on strategy and innovation to secure federal and defense networks, as well as private sector networks that hold their sensitive data
Internet-of-Things World Forum 2015(London, England, UK, November 18 - 19, 2015) This conference features speakers from leading IoT companies and their customers. Learn how the Internet-of-Things is creating new markets for products, services, and solutions
2015 U.S. Cyber Crime Conference(National Harbor, Maryland, USA, November 14, 2015) The 2015 U.S. Cyber Crime Conference (Formerly the DoD Cyber Crime Conference) has brought world-class forensics and incident response training combined with outstanding community networking for over 15...
DefCamp6(Bucharest, Romania, November 19 - 20, 2015) Why DefCamp? Because it's the most important conference on Hacking & Information Security in Central Eastern Europe, bringing hands-on talks about the latest research and practices from the INFOSEC field,...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.