Anonymous hits Turkish police sites and a Tanzanian telecom provider. Nothing new from them on the ISIS front, but ISIS itself is having cash flow problems that are tripping up its information ops narrative: you can't be a caliphate if you're not capable of ruling, and delivering basic services.
Apple says it will not comply with a court order to help the FBI unlock one of the San Bernardino shooter's iPhone 5C. Apparently Apple would be technically capable of delivering the requested assistance because it's an older phone. This wouldn't be the case if it were a later model.
ENISA reaches essentially the same conclusion on encryption backdoors the recent Harvard study did: they weaken defenses without offering a compensating payoff in improved intelligence.
Symantec warns that Dridex, the credential-stealing Trojan that afflicts bank customers, is now the most dangerous bit of financial malware.
Palo Alto Networks finds a newly virulent form of ransomware, "Locky," that spreads through malicious macros in Microsoft Office documents. (This is also the typical vector for Dridex.)
Glibc, the GNU C library implicated in last year's GHOST bug affecting Linux systems, has another critical flaw. A patch is out, and admins would do well to apply it as soon as possible.
Analysts look for a round of cyber-sector consolidation in 2016.
Dark Reading names "twenty startups to watch:" ZeroFOX, Twistlock, Threat Quotient, Tenable, Synack, Sentinel One, Pindrop Security, Menlo Security, Malwarebytes, LookingGlass, Illumio, HackerOne, Fireglass, Exabeam, Digital Shadows, Cynet, Cymmetria, Cybereason, Argus Cybersecurity, and Appthority.
Today's issue includes events affecting Australia, Belgium, China, European Union, France, India, Iran, Iraq, New Zealand, Nigeria, Pakistan, Syria, Tanzania, Turkey, United Kingdom, United States.
ON THE PODCAST
In today's Daily Podcast, we'll hear from policy and legal expert Markus Rauschecker, of the University of Maryland's Center for Health and Homeland Security, on what's at stake in Apple's resistance to a court order that would require the company to help the FBI unlock the San Bernardino jihadist's iPhone. The podcast will be up later this afternoon.
Fake SUPEE-5344 Patch Steals Payment Details(Sucuri Blog) Update 2/17: This post is not about hackers tricking webmasters into installing fake Magento security patch. It's about malware that pretends to be an applied security patch. In case you don't know, SUPEE-5344 is an official security
Is Dridex the Most Dangerous Banking Trojan?(BankInfoSecurity) Kevin Haley, a researcher at Symantec, says the moneymakers behind Dridex are successfully infecting thousands of users worldwide on a monthly basis, purely through
Report: Breaches responsible for increasing amount of collateral damage(CSO Online) 2015 was the "Year of Collateral Damage," according to a report released this morning by Hewlett Packard Enterprise. Attackers targeting companies or other organizations are not only affecting the lives of people who are customers or employees of those organizations, but also affect people who have no direct business relationships.
Smart buildings security: Who's in charge?(Help Net Security) As the Internet of Things became an accepted reality, and the security community realized that they have to get involved in securing it, days without news
It’s time the c-suite took data privacy seriously(IT Pro Portal) Data privacy and security has been one of the biggest issues in business and technology over the past decade or so. Since the 2006 Nationwide Building Society incident, when a stolen unencrypted laptop put at risk the personal data of 11 million savers, there has been a regular stream of data breaches.You only have to turn on the news or go online and you will almost inevitably see reports of these breaches, ranging from retailers to major FS organisations, and often, government departments. Just last year, telecoms provider Talk Talk reported its third data breach in the previous twelve months, with more than 150,000 customers affected after a teenager exploited a weakness in Talk Talk’s website.The type of information that is personally identifiable varies greatly from one organisation to the next. For some, it is staff records, and for others, it is customer information, transaction records, and even patient data. This is causing management at all levels to focus on their security
Baltimore-based Protenus raises $4 million(Maryland Daily Record) The Baltimore-based health tech startup Protenus has raised $4 million in Series A financing, executives announced Tuesday. Founded by a pair of Johns Hopkins medical students, the company offers p…
Wynyard Group cancels share placement(NZ Herald) Wynyard Group says a planned share placement is no longer viable and is considering other capital raising options including a rights offer.
Army Requests Info on Consortium for DoD’s C4, Cyber Platform Development(ExecutiveBiz) The U.S. Army Contracting Command has sought information on a consortium with the capability to research and develop prototypes of command, control, communications, computer and cyber platforms for the Defense Department. The service branch said in a FedBizOpps notice posted Feb. 3 the consortium will build prototypes under the “other transaction” agreement in order to reduce DoD’s dependence...
The threat from within(iTWire) Regardless of how good your end-point security may be all security companies agree that the human element is the weakest link. Most cyberattacks rely...
Wombat Security Launches PhishAlarm Analyzer(Marketwire) Wombat Security Technologies (Wombat) today announced the launch of PhishAlarm Analyzer, a software-based e-mail phishing triage solution that uses machine learning to check emails against multiple security sources to identify and prioritize reported phishing emails for incident response teams. Quick identification and categorization...
The Great EMV Fake-Out: No Chip For You!(KrebsOnSecurity) Many banks are now issuing customers more secure chip-based credit cards, and most retailers now have card terminals in their checkout lanes that can handle the "dip" of chip-card transactions (as opposed to the usual swipe of the card's magnetic stripe)
Navy Finalizes Eight Cybersecurity Standards, Now Available to Industry(CHIPS) To ensure critical warfighting capabilities can operate, fight and win in a contested cyber environment, the Navy has finalized the first eight in a series of more than two dozen planned foundational cybersecurity standards that govern the vast majority of the sea services' systems and programs
Digital health app reviews: Time to get it right(FierceMobileHealthcare) There are many challenges in mHealth, but one of the most important hasn't gotten necessary attention: the need for a verifiable methodology to evaluate and assess the growing wave of mHealth apps. An accredited and trustworthy evaluation is a win-win for everyone: developers, app sellers, consumers, clinicians and providers. Its top of mind this week, in part due to a new study.
Service Academy CyberStakes Proves Worth as Learning Tool(US Department of Defense) Three years into a program for building cyber proficiency in service academy midshipmen and cadets, the annual CyberStakes competition has proven its worth as an important learning tool for these high-tech skills, a senior Defense Department official said
EU ISP Talks: Let’s Make the Most of It!(TrendLabs Security Intelligence Blog) The Internet has no borders, countries do. And that’s what makes it so difficult for law enforcement to chase cybercriminals. Trend Micro works with these bodies for years and we see how painful and long these processes are, once the cybercriminal is somewhere else. We not only work close with local police but also with Europol and INTERPOL, which helps when it comes to international crime. They do a great job, but the bad guys clearly have an advantage as their flexibility and speed makes it easy for them to jump around in cyberspace and build up systems everywhere. And pretty often, they go to countries where cybercrime is not a crime or chasing them is low priority.
Safeguarding cybersecurity(The Washington Times) Anyone who has locked the front door and hidden the key under a flowerpot has dealt with the dilemma of how to maintain both security and access. It’s the quandary facing cybersecurity professionals who must guard the wall around personal online data while managing the demands of law enforcement agencies.
Katie Moussouris on the Latest Wassenaar Arrangement Rules(Threatpost) Threatpost editor Mike Mimoso talks to HackerOne chief policy officer Katie Moussouris about the U.S. implementation of the Wassenaar Arrangement rules and where things stand close to seven months after the initial draft was pulled off the table for a rewrite.
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.