Cyber Attacks, Threats, and Vulnerabilities
Jihadist cyber-attack on Cabinet was entirely avoidable, say experts (SC Magazine) The news that top government ministers may have been hacked by the Cyber-Caliphate has set alarm bells ringing among security experts
Kremlin website became target of massive cyber attack on election day (Trend News Agency) Russian president's official website was targeted by a massive hacker attack during country-wide local elections, but the Kremlin's cyber defenses managed to cope with the situation, spokesman Dmitry Peskov said on Monday
Cisco router attacks duck cyber defenses, hit four countries (Reuters) Security researchers say they have uncovered previously unknown attacks on routers which direct traffic around the Internet, allowing hackers to harvest vast amounts of data while going undetected by existing cyber security defenses
Cisco routers vulnerable to new attack, cyber firm FireEye says (Reuters) Security researchers say they have uncovered previously unknown attacks on the core devices used to route traffic around the Internet, allowing hackers to harvest vast amounts of data while going undetected by existing cybersecurity defences
Windows XP still running on a third of business, public sector PCs in some Eastern European countries (ZDNet) Security company Bitdefenders says many of its clients in Ukraine, Hungary, and Romania continue to rely on the outdated operating system
IT Security Stories to Watch: CVS Confirms Data Breach (MSPMentor) CVS has confirmed its photo website, CVSphoto.com, was breached this summer
Travel apps riddled with security flaws (CSO) The top 10 travel apps in the iOS and Android app stores are all riddled with security flaws, according to a new report from Bluebox Security
Online extortionists reset Android PINs, take data on virtual drives hostage (Lumension Blog) In the last few years extortion has hit computer users, big time
Heartbleed is far from dead. 200,000+ vulnerable devices on the internet (Graham Cluley) Remember Heartbleed? Of course you do. After all, it was the first serious security vulnerability to have a really cool logo
Most DDoS attacks hiding something more sinister, Neustar warns (ComputerWeekly) Smaller DDoS attacks can be more dangerous than a powerful attack that knocks a company offline but does not install malware or steal data, warns Neustar
New malware can make ATMs not give users' card back (Help Net Security) A new type of malware that can be used to compromise ATMs independently of who their manufacturer is, and can make the machine steal card data but also the cards themselves, has been spotted by FireEye researchers
Tracking Bluetooth Skimmers in Mexico, Part II (KrebsOnSecurity) I spent four days last week in Mexico, tracking the damage wrought by an organized crime ring that is bribing ATM technicians to place Bluetooth skimmers inside of cash machines in and around the tourist areas of Cancun
Researchers find backdoor bug in NASA rovers' real-time OS (Help Net Security) A critical, remotely exploitable vulnerability in VxWorks, the world's most popular real-time operating system (RTOS), can be exploited by attackers to gain backdoor access to the systems using it
Smartwatch sensors can be used to eavesdrop on the keys you're typing (Naked Security) Researchers have shown that a smartwatch's motion sensors can be used to detect what keys you're pressing with your left hand (or whatever hand the watch is on) and thus guess at the words you're typing
Study names the five most hackable vehicles (Computerworld via CSO) Intel creates Automotive Security Review Board to look into vehicle cyber threats
Survey: Many agencies suffer frequent insider hacking attempts (Federal Times) In the realm of cybersecurity, insider threats are one of the most potentially dangerous forms of network compromise. As agencies purchase and develop tools to track where their employees go on the network and what they are accessing, a new report shows almost half were targeted by insiders over the last 12 months
Targeted Attacks versus APTs: What's The Difference? (TrendLabs Security Intelligence Blog) A few weeks ago I appeared on the RedZone podcast hosted by Bill Murphy, where I talked about (among other topics) the differences between targeted attacks and what our competitors called Advanced Persistent Threats (APTs)
Security Patches, Mitigations, and Software Updates
New Debian Releases Fix PHP, VirtualBox Bugs (Threatpost) The maintainers of Debian have released new versions of the operating system to fix several vulnerabilities, including a number of bugs in PHP and an unspecified flaw in Oracle's VirtualBox application
Tor security improves as .onion becomes a special-use domain name (Help Net Security) The .onion domain has been officially designated by the Internet Assigned Numbers Authority (IANA) as a special-use domain name. The move, initiated by the Internet Engineering Task Force (IETF), is meant to make the use of Tor safer
Cyber Trends
The brave new world of cyber insurance (FCW) Perimeter defenses have been penetrated the world over, and the modern cybersecurity conversation is all about how to mitigate the damage once your organization is inevitably breached
Emerging risks, mitigation focus of Guy Carpenter report (Business Insurance) A new report identifies cyber, technology, longevity and casualty catastrophe as four main emerging risks and discusses how insurers can use modeling and analytics to manage them
Kaspersky Lab: Businesses report losing up to half a million US dollars due to a security breach (BizTechAfrica) A worldwide survey of more than 5500 companies in 26 countries
137 major incidents disrupted EU telephony and Internet access in 2014 (Help Net Security) ENISA publishes its Annual Incidents report which gives the aggregated analysis of the security incidents causing severe outages in 2014
Marketplace
UK groups rush to profit from cyber security concerns (Financial Times) This summer, companies ranging from adultery website Ashley Madison to carmaker Fiat Chrysler and retailer Dixons Carphone have been hit by cyber attacks
Cisco leads security appliance market in Q2: IDC (Infotech Lead) Cisco continued to lead the security appliance market in the second quarter of 2015, International Data Corporation said Monday
Symantec: Partners can expect unified security strategy (TechTarget) In the wake of the Veritas buyout, Symantec aims to appeal to channel partners with a unified security strategy and stronger cloud focus
As Security Booms, Onapsis Gets Cash to Stop Corporate Cyber Attacks (Xconomy) Another day, another cybersecurity company to have on your radar — especially if you are concerned about things like corporate espionage, financial fraud, and international hackers stealing your intellectual property
Keith Alexander-led IronNet Cybersecurity raises $7.5 million (Baltimore Business Journal) IronNet Cybersecurity Inc., a Fulton-based firm led by former National Security Aagency Director Keith Alexander, has raised $7.5 million in equity
Flexera Software Acquires Secunia, Adding Software Vulnerability Management Solutions That Reduce Cybersecurity Risks (RealWire) Flexera Software, the leading provider of next-generation software licensing, compliance, security and installation solutions for application producers and enterprises, announced today the acquisition of Secunia, a leading provider of Software Vulnerability Management solutions that protect organizations against cybersecurity risks
Government contractor SRA Companies withdraws IPO; acquired by CSC in $1.4 billion deal (Nasdaq) SRA Companies, an IT services contractor for US health, civil and national security agencies, withdrew its plans for an initial public offering on Monday. The company originally filed in July for an IPO that we estimated could have raised $300 million
General Electric (GE) Forms GE Digital; Will Integrate Software Center, IT Teams, Wurldtech (StreetInsider) General Electric (NYSE: GE) announced the creation of GE Digital, a transformative move that brings together all of the digital capabilities from across the company into one organization
ThreatTrack Security Appoints Alan Rizek Chief Financial Officer (PRNewswire) Veteran technology CFO brings extensive financial and operational leadership to ThreatTrack
Products, Services, and Solutions
Microsoft throws crypto foes an untouchable elliptic curveball (Register) Redmond's new, free, crypto library dubbed FourQ leaves P-256 swinging and missing
LexisNexis Managed Technology Services Obtains Updated Cybersecurity Certification (Legaltech News) The business has been awarded International Quality System Standard ISO 27001:2013 certification
Gemalto launches IoT tamper-resistant component (StockMarketWire) Digital security Gemalto is introducing the Cinterion Secure Element, a tamper-resistant component embedded in industrial Internet of Things (IoT) solutions to enable advanced digital security and lifecycle management
Unicon and Duo Security Collaborate to Develop Multifactor Authentication Extension for Shibboleth 3.x IDP (Benzinga) Unicon, Inc., a leading IT consulting, services, and support provider specializing in open source for the education technology market, today announced that it has collaborated with Duo Security, a leading provider of two-factor authentication solutions for higher education institutions, in the development of a multifactor authentication solution for the newly released Shibboleth 3.x IDP. The extension was developed on behalf of Unicon clients, including major universities. It has been donated back to the open source community, making it available for all universities and colleges to implement to add an extra layer of security for protection of applications and resources
Cyber security collaboration gives way to up-to-date risk model (Business Insurance) Two cyber security risk providers will collaborate with AIR Worldwide Corp., a Boston-based catastrophe risk modeling software provider, to an up-to-date cyber risk model for insurers, AIR said in a Monday news release
Comodo launches Windows 10 Antivirus Software (Security Newsdesk) Comodo Internet Security suite is all set to defend Windows 10 PC users from Malware, Viruses and Zero-Day Attacks
LogRhythm Extends Threat Analytics Suite with Endpoint Module (Integration Developer News) Security intelligence firm LogRhythm is looking to help IT more quickly detect intruders with its latest offering Endpoint Threat Analytics Module
AVG Business Launches Managed Workplace 9.2 for its Channel Partners, Adding Premium Remote Control to its RMM Platform (PRNewswire) Partners with ISL Online to provide an integrated remote access solution from one platform at no additional cost
Spirent adds Robust PNT Test Framework to evaluate security issues (Telecom Lead) Telecom network testing firm Spirent Communications has launched its Robust PNT Test Framework that evaluates GPS and GNSS security vulnerabilities for Positioning, Navigation and Timing (PNT) systems
Blue Coat enriches support portal and search infrastructure (Knowledge Management World) To improve its search experience and its customer, partner and employee support portal, Blue Coat Systems, an enterprise security company, has enlisted the help of the Google Search Appliance (GSA), and Search Technologies
SentinelOne Receives Top Score in SC Magazine Review of Endpoint Security Products (BusinessWire) Next generation endpoint protection vendor receives perfect five star rating for completeness of platform
Invincea Receives Five-Star Rating From SC Magazine, Recommended for Advanced Endpoint Protection (MarketWatch) Perfect score follows company's recent selection to 2015 CRN Emerging Vendors List
DeviceLock® Endpoint DLP Software Achieves SC Magazine 5-Star "Recommended" Rating (Digital Journal) DeviceLock, Inc., a worldwide leader in endpoint data leak prevention (DLP) software, today announced that SC Magazine has designated the DeviceLock Endpoint DLP Suite a perfect 5-Star rating across all measured criteria as well as earning their prestigious "Recommended" endorsement for the Endpoint Security category
Darktrace wins major US award (Cambridge News) Darktrace, the Cambridge company set up to keep digital raiders at bay, was presented with a Gold Stevie Award in the New Product and Technology category at the 13th annual American Business Awards ceremony in San Francisco this month
Technologies, Techniques, and Standards
12 Questions About Security That Boards Must Ask (Baseline) With the ever-growing number of data breaches companies face, a corporate board must elevate its presence as a watchdog to ensure enterprisewide accountability in the interest of cyber-security
REVIEW: Threat Intelligence could turn the tide against cybercriminals (Network World) In recent reviews, we looked at the advancements in endpoint security, including new ways companies are employing technology like virtual machines to get a leg up on potential attackers
Design and Innovation
AVG Releases One-Page Privacy Policy and Challenges Industry to Follow (MarketWatch) Updated one-page policy for AVG's apps designed to be simpler, shorter, and easier to understand
Research and Development
DARPA Protecting Software From Reverse Engineering Through Obfuscation (Threatpost) Researchers with a DARPA-led team are looking into new ways to combat reverse engineering by using obfuscation to tidy up shoddy commercial and government security
Intel Creates Automotive Security Review Board to Promote Vehicular Cybersecurity Research (Legaltech News) Security experts will be given access to Intel's smart-car development platform, most impactful findings will win a new car
Academia
Colleges vie to entice students with NSA cyber program (FedScoop) Fourteen colleges are now designated National Centers of Academic Excellence in Cyber Operations by the National Security Agency, a rigorous program started in 2012
Legislation, Policy, and Regulation
Obama Won't Sanction China for Cyber Spying… Yet (Daily Beast) The White House is reportedly holding off on sanctions against Chinese companies for cyber spying on American corporations, at least until President Xi Jinping completes his stateside visit
Cyberthreat Posed by China and Iran Confounds White House (New York Times) A question from a member of the Pentagon's new cyberwarfare unit the other day prompted President Obama to voice his frustration about America's seeming inability to deter a growing wave of computer attacks, and to vow to confront the increasingly aggressive adversaries who are perpetrating them
Bad News: Cyber Norms Probably Won't Constrain Cyber Conflict (Council on Foreign Relations) The U.S. government has put the promotion of its cyber norms at the forefront of its cyber diplomacy with the hopes that it will constrain pervasive cyberattacks. Past experience with norm promotion efforts provide insight on whether the United States is likely to be successful. Unfortunately, the future is bleak
Microsoft-NATO Team Aims to Address Cyber Threats Through Gov't Security Program (ExecutiveBiz) Microsoft and NATO's Communications and Information Agency have signed an agreement to promote partnerships and transparency among government agencies and help them protect their computer infrastructure from potential cyber threats
4 hard-earned lessons about cyber ops (Foreign Policy) Integrating cyber effects into traditional military operations is an emerging and potentially high payoff field
A Cybersecurity Bill Light on Security, Heavy on Corporate Protection (Foreign Policy) Congress is poised to pass legislation that would hand businesses legal immunity for sharing cyber-intelligence with the government. Privacy activists call it a surveillance bill. Security experts call it a half-measure
PSC: OMB's Cybersecurity Acquisition Guidance Lacks Uniformity (ExecutiveGov) The Professional Services Council has called on the Office of Management and Budget to revise or withdraw the agency's draft guidance entitled "Improving Cybersecurity Protections in Federal Acquisitions"
Contractors urge OMB to pull cybersecurity acquisition guidance (FedScoop) Advice to agencies "too little, too late and too flexible," says the Professional Services Council
How the intelligence community can move toward a more predictable acquisitions system (FedScoop) Officials said they want industry to weigh in on how to improve the solicitations they officer
FTC says data and privacy are top security concerns (CSO) Enterprises need to address privacy issues when dealing with security issues
New cyber threat center to hit initial stride in October (Federal News Radio) Just in time for cybersecurity awareness month in October, the White House will launch the initial operating capability of the cyber threat intelligence integration center (CTIIC)
How OPM hopes to cultivate cyber talent (FCW) Feds are becoming eligible for retirement in waves, and cybersecurity skills are in desperately short supply
A deeper dive into Energy's cyber defenses (Federal News Radio) The Energy Department's cybersecurity is awful — well, at least that's what many people believe based on the recent USA Today story
State has second thoughts about cyber playbook (Federal News Radio) The State Department's idea of creating a series of cyber playbooks got "86'ed" rather quickly
Five predictions for cybersecurity's role in the 2016 presidential race (Christian Science Monitor Passcode) There might be more than 400 days before Election Day, but the 2016 presidential campaign is well under way
Litigation, Investigation, and Law Enforcement
Tech company: No indication that Clinton's e-mail server was 'wiped' (Washington Post) The company that managed Hillary Rodham Clinton's private e-mail server said it has "no knowledge of the server being wiped," the strongest indication to date that tens of thousands of e-mails that Clinton has said were deleted could be recovered
Homeland Security Shuts Down Library's TOR Node Citing "Situational Awareness" (TechCrunch) In a move that is sure to end well for the Department Of Homeland Security and the police in Lebanon, New Hampshire, officials have asked a New Hampshire public library to shut down its TOR node to prevent terrorism and other mean, nasty things
Public library shelves plans to become part of Tor (Naked Security) The Kilton Public Library in the US town of West Lebanon, New Hampshire is only 5 years old, and its modern sensibilities show: for one thing, it brags about sustainable technologies such as ground source heat pumps and radiant floor slabs throughout
Traders pay $30m to settle newswire hacking case (IDG via CSO) Two defendants settle after a multi-million dollar asset freeze
State looked into hacking software (Des Moines Register) A computer expert with Iowa's executive branch inquired about the cost of Italian-made hacking software used by intelligence and police agencies worldwide to monitor communications, a leaked email shows, but didn't buy the product
Omani on trial for spreading rumours that harmed UAE (The National) An Omani man who is on trial at the Federal Supreme Court for publishing harmful material on social media has claimed he is mentally ill
Dad sues Facebook after 11-year-old shared photos and messages with men (Naked Security) The father of a young girl has sued Facebook for failing to enforce its age restriction policy after claiming his daughter was exposed to sexual predators when she signed up for an account at age 11