Looking for an introduction to AI for security professionals?
Your wait is over. A new book is out from the Cylance data science team, covering artificial intelligence and machine learning techniques in practical situations to improve the security professional’s ability to thrive in a data driven world. Whether you are reviewing logs or analyzing malware, being able to derive meaningful results and improve productivity is key. Order your free copy today.
January 2, 2018.
By The CyberWire Staff
Current, growing unrest in Iran seems driven significantly by Instagram and (especially) the secure messaging app Telegram. Authorities in the Islamic Republic are cracking down on Internet use generally even as the nation's leadership shows signs of hesitancy, acknowledging that some allegations of corruption may have at least a partial point. (Those who recall the "Green" protests after the disputed 2009 elections will remember the role Twitter played in sustaining dissent, a false dawn of hope for both Iranian reform and positive grassroots social media interactions.) Iran's Passive Defense Organization's head spoke about the country's cyber defenses as a guarantor of "security and independence" against US aggression, but Iran's capabilities seem likelier to be used domestically.
ISIS, now effectively without a territory to call a Caliphate, returns to its roots and claims responsibility online for the December 27th St. Petersburg bombing. Russian President Putin has promised a quick and ruthless response to future acts of terror. Policymakers in the UK mull approaches to defending against ISIS cyber attacks; the model from which they're starting is the British response to IRA terror in the late 20th Century.
Ukrainian security service SBU lays out the results of its investigation into Russian cyber operations against Ukraine.
A Wichita man was killed by police in a swatting that arose from an unusually pointless (even by the feckless standards of online gaming) dispute among Call of Duty players. He was not only innocent, but completely uninvolved. The alleged swatter has been arrested in Los Angeles.
Today's issue includes events affecting Australia, China, Egypt, France, Iran, Iraq, Israel, Japan, Democratic Peoples Republic of Korea, Nigeria, Russia, Slovenia, Syria, Ukraine, United Kingdom, United States, and Vietnam.
Whether you're focused on IT or national security, exploits and data loss incidents put your mission at risk. Your current tools assess and analyze content after it's breached your network - they all work right of boom. It's only a matter of time until boom happens to you. Don't let it. getleftofboom.com
Islamic State claims its men planted bomb at St. Petersburg supermarket(FDD's Long War Journal) The Islamic State has claimed responsibility for the Dec. 27 bombing at a supermarket in St. Petersburg, Russia. The city has been targeted by jihadists several times this year. The US claimed earlier this month that another major plot inside St. Petersburg had been thwarted.
10 Security Predictions For 2018(CRN) Solution providers will have to contend with an array of security-related challenges in 2018 ranging from GDPR compliance and ransomware to an expanding perimeter and securing sensor-enabled devices. Here's how we think they'll do it.
Fraudulent scams expected to rocket in 2018(The Independent) 2017 felt like the year of the scam. Around 2 million online fraud incidents were reported in 2017, according to new data from the Public Accounts Committee. And with only 20 per cent of crimes actually reported, even this stark figure is just the tip of the iceberg. It’s not just online fraud that’s growing. In 2017 Action Fraud, the national fraud and cybercrime reporting centre, issued warnings about cold calls from fake bailiffs, timeshare fraud, and even scams by post.
Smart lock maker Otto suspends operations(TechCrunch) Otto showed the world its digital lock in August. Four months later, the company has suspended operations. Hardware is hard. It’s a cliche for a reason...
Maryland ﬁrm that recycles equipment expands globally(Concord Monitor) A Maryland-based company that goes by the name Data Killers and uses a fleet of shredder trucks to chop up discarded computer equipment has embarked on a national expansion that more than doubles its U.S. employee count and creates a new partnership with interests as far away as Thailand.
In Army Cyber, Policy Meets Reality(SIGNAL Magazine) Field reports are having greater and faster influence on the issuance of directives, and intelligence is now a major player in determining cyber policy.
Diving into the Definition and Workings of Cryptoeconomics(Coinsquare Discover) Cryptoeconomics studies the design and protocols behind any system that uses economic incentives and cryptography. Cryptography proves properties of information that have occurred in the past while economic incentives, encourage people to contribute to the network. By combining cryptography and economics, cryptoeconomics allows economic interactions to occur in adversarial environments. An example of a system […]
Egypt’s Dar al-Iftaa deems Bitcoin currency as forbidden in Islam(Egypt Independent) Republican mufti Councellor Magdy Ashour issued a Fatwa (Islamic ruling) that deems the Bitcoin virtual currency as forbidden by Islam, accusing Bitcoin of being used to fund terrorism. The mufti based his fatwa on the fact that there is no guarantee on where the money is going because it is not covered by the … Continued
20 Security Tips for Safe Trading on Cryptocurrency Exchanges(InCyberDefense) While cryptocurrency is a useful way to move money from one place to another, web wallets, cryptocurrency processing systems and exchange services are all susceptible to compromise by bad actors. So crypto-traders should examine the security features of an online service before adopting a cryptocurrency exchange service. Also, it is just as important to adopt user-end security practices.
How do we decode the brain?(Futurism) Since common human movements like walking or reaching for an object use predictable patterns of brain activity, a cryptography-inspired strategy for neural decoding could make BCIs possible.
Japan, France arranging ministerial security talks in Tokyo(Japan Today) Japan and France are planning to hold security talks between their foreign and defense ministers in Tokyo this month, a Japanese government source said. The "two-plus-two" talks are likely to cover ways to increase pressure on North Korea over its nuclear and missile programs and the acceleration of negotiations toward…
FERC proposes rule to expand cyber incident reporting(Fifth Domain) The Federal Energy Regulatory Commission wants to expand cyber incident reporting requirements to include any time an adversary attempts to break into an energy company’s networks, rather than only those that compromise the company’s critical operations.
How cybercriminals became ‘The New Mafia’(Tech Wire Asia) Ransomware is emerging as the latest tool of choice for cybercriminals amid a rising trend of cybercrime attacks in recent years, data from the cybersecurity solutions provider Malwarebytes revealed recently.
How the hacking furore has unfolded(Daily Telegraph) Former foreign minister Alexander Downer has found himself at the centre of the FBI’s Russia hacking probe after it was sensationally revealed he passed on a tip about Kremlin plans to discredit Hillary Clinton.
Kansas Man Killed In ‘SWATting’ Attack(KrebsOnSecurity) A 28-year-old Kansas man was shot and killed by police officers on the evening of Dec. 28 after someone fraudulently reported a hostage situation ongoing at his home.
2018 Leadership Conference(Arlington, Virginia, USA, January 17 - 19, 2018) We invite you to join us for this unique opportunity to share information, participate in leadership training, collaborate on solutions to common problems, and network with peers from around the globe.
CYBERTACOS(Arlington, Virginia, USA, January 24, 2018) CYBERTACOS is back and becoming one of the DC metro area’s biggest cybersecurity networking events! Register today and join us for networking, food and drinks. This event includes a 45-minute meet the...
Connected Medical Device & IOT Security Summit(Baltimore, Maryland, USA, January 25 - 26, 2018) The Summit will offer practical solutions to many of the daunting security challenges facing medical device and connected health technology companies, healthcare providers, payers and patients. The program...
CyberUSA(San Antonio, Texas, USA, January 29 - 30, 2018) The CyberUSA Conference will be held in San Antonio, TX at the Henry B. Gonzalez Convention Center on Tuesday, January 30, 2018. A welcome reception will be held on the evening of Monday, January 29, 2018.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.