Cyber Attacks, Threats, and Vulnerabilities
Iranian hackers get tech support on forums (CSO) Iranian hackers are targeting Android systems using AndroRat and DroidJack
Iranian Hackers' Rising Interest in Targeting Android Systems With DroidJack, AndroRAT (Recorded Future) The latest threat intelligence from the Web shows that threat actors on Iranian hacking forums are distinctly interested in targeting Android systems using several different variants of remote access trojans (RATs)
Opinion: The shocking mediocrity of Islamic State 'hacker' Junaid Hussain (Christian Science Monitor Passcode) The Islamic State militant Junaid Hussain killed in a British drone strike displayed little technical knowhow. But even though an unskilled coder, he was more effective at spreading the militants' message over social media and ultimately proved to be an effective role model
Watch the Utterly Inane Music Video China Is Using to Promote Its New Five-Year Plan (TIME) It's probably the most twee attempt ever to champion Communist Party policies
Underwater internet cables could be the next target in tech warfare (Quartz) Underlying the internet, often literally lying under the sea, is a surprisingly vulnerable array of cables that keep the world connected
Russian Navy's "aggressive" activity near underwater cables worries US (Ars Technica) Concern subs, spy ships could cut undersea Internet links or tap them (like NSA has)
Could Russia really 'cut' the Internet? (AlJazeera) Russia's ability to cut main Internet cables is unknown, but it's done that against civilians in the past
Cyber security chief: Manipulation of data by hackers may be next threat (Pittsburgh Tribune) Computer hackers could do more damage than just stealing information they find online, the nation's top cyber security official said in Pittsburgh on Monday
Top German official infected by highly advanced spy trojan with NSA ties (Ars Technica) Containing almost superhuman engineering, "Regin" malware found on official's laptop
TalkTalk cyber-attack: boy, 15, arrested in Northern Ireland (Guardian) Metropolitan police say a 15-year-old boy has been arrested in County Antrim over the hacking of the telecoms company TalkTalk
Arrest re: TalkTalk investigation (Metropolitan Police) An arrest has been made in connection with the investigation into alleged data theft from the TalkTalk website
15-Year-Old Arrested For TalkTalk Attack (Dark Reading) U.K. police collar Northern Ireland youth for questioning, while security industry tries to make sense of confusing information out of TalkTalk CEO
TalkTalk breach: CEO dismisses encryption, 15-year-old arrested (TalkTalk breach: CEO dismisses encryption, 15-year-old arrested) There's been a lot of strange developments in the days since last week's cyberattack on UK telecom TalkTalk, in which an unknown number of customers may have had their personal data accessed
TalkTalk could face huge data breach compensation cost (ComputerWeekly) Some commentators have suggested that the future of TalkTalk could be in jeopardy, with lawyers looking at potential compensation claims of £1,000 by thousands of customers
TalkTalk's cyber attack piles on the pressure on financial targets (Reuters) Burdened with a poor reputation for customer service, facing increasingly fierce competition and under pressure to hit challenging financial targets, the cyber attack at TalkTalk (TALK.L) could not have come at a worse time for the British telecoms firm
TalkTalk hack: MPs to hold inquiry into cyber-attack (BBC) MPs are to launch an inquiry into the cyber-attack on TalkTalk that could have put customers' details at risk
Hackers release info on Obama's national security transition team (Federal Times) The slow drip of information allegedly stolen from CIA Director John Brennan's personal email account continues to find its way onto WikiLeaks, with a list of personal information about 20 members of President Obama's transition team added to the leak in the most recent post on Oct. 26
Alleged Hacker Behind John Brennan Email Breach: 'I Don't Want To Go To Jail' (Motherboard) It's been five days since a group of teenage hackers only known as "Crackas With Attitude" (CWA) claimed to have broken into the email account of CIA Director John Brennan. The hackers initially boasted about their feat on Twitter, exposing some US intelligence members personal information, before getting their accounts suspended
Dridex Returns With a Vengeance, Targeting French Users and Employing Comodo Signed Certificates (MarketWired) Resurgence of costly banking Trojan driven by weaponized Microsoft Word documents posing as receipts and performing "just-in-time" malware assembly
New Campaign Shows Dridex Active, Targeting French (Threatpost) Two weeks after authorities announced they had taken down the botnet behind the banking malware Dridex, new research suggests the threat is alive and well
Duuzer back door Trojan targets South Korea to take over computers (Symantec Connect) Backdoor.Duuzer targets South Korean organizations to gain full control of computers. The threat is linked to W32.Brambul and Backdoor.Joanap, which have also been affecting the region
Pornographic-themed Malware Hits Android Users in China, Taiwan, Japan (TrendLabs Security Intelligence Blog) Sex sells, and nowhere is that more true than the Chinese mobile landscape
Xero says it will increase security following password scare (Graham Cluley) At the end of last week, online accounting service Xero emailed customers around the world telling them that they should change their passwords after a "small number of customers" had their accounts compromised
SHA-2 encryption will make many sites inaccessible to users who can't afford newer tech (Help Net Security) A group of security researchers has recently announced that it's highly likely that effective collision attacks that would break SHA-1 encryption will be revealed by the end of 2015
U.S. military cyber security fails to make the grade (Netcraft) The United States Department of Defense is still issuing SHA-1 signed certificates for use by military agencies, despite this practice being banned by NIST for security reasons nearly two years ago
TrueCrypt Travails Continue (eSecurity Planet) Two serious bugs later, almost no one thinks it is a good idea to use TrueCrypt. But what are your options?
Researcher says Fitbit can be wirelessly hacked to infect PCs, Fitbit says not true (Computerworld) A researcher demonstrated a proof-of-concept to infect Fitbit with malware in about 10 seconds; the malware infection could then spread to a PC when the fitness tracker is plugged into it. Fitbit, which was notified about the flaw earlier this year, says it's not true
Data Debacle: One-Third of IT Professionals Not Sure What’s On Their Legacy Backup Systems (Legaltech News) Archive tapes may no longer be a cutting edge option for data storage, but they cannot be ignored in the struggle for holistic data management
Cyber Trends
2016 Predictions: The Fine Line Between Business and Personal (TrendLabs Security Intellligence Blog) Like any other year, 2015 had its mix of ups and downs in the world of security
Valuing A Data Breach Victim (TechCrunch) In the relentless world of public breach reporting, there's a fixation on the number of accounts affected; the higher the number, the larger the impact. But from a victim's perspective, does it make a difference if your information was included in a breach alongside 10,000 or 50,000,000 others?
Millennials don't even know what cybersecurity is (FCW) Today's young people are dubbed "tech-savvy" because they grew up with smartphones. Maybe the label doesn't fit
Acoustic Kitty and Zombie Home Appliances: Yesterday's Theories Shape Tomorrow's Technologies (SIGNAL) In 1967, CIA operatives needed a way to spy on a Kremlin ally and sought to capitalize on a common place nuance: feral cats
Why cybersecurity cannot be overlooked (Control Global) Effective cybersecurity requires ceaseless monitoring and evaluation of network data and traffic to identify and head off evolving intrusions and potential attacks, but improved tools are making it simpler and easier
IT admits obstacles to user mobility due to security concerns (Help Net Security) Organizations are challenged to meet demands for greater mobility as 92% of IT departments worldwide still restrict users from accessing sensitive corporate data and resources from mobile devices, according to a global survey of 900 IT decision makers by Gemalto
How long does it take for employees to be security conscious? (CSO) The U.S. Postal Services received some frustrating news in early October from the Office of the Inspector General on the effectiveness of its security awareness training program
Cyber criminals target Singapore with banking Trojans (Computerweekly) Singapore is a top target for hackers and, in the second quarter of 2015, it was the country most targeted by cyber criminals using Trojans
GCC economies should gear up to address cyber security challenges (Gulf Times) Economies have become more dependent on information and communications technology (ICT) and hence they are becoming more vulnerable to network attacks
Country Reports (Secunia) The Secunia Country Reports tell you how much vulnerable software is present on private PCs in your country, plus a few extra, interesting facts
Marketplace
Cisco To Buy Lancope For $452.5 Million (Dark Reading) Deal set to be finalized in the second quarter of 2016
Cybersecurity Stocks Have Been Crushed: 4 That Could Get Bought Out (24/7 Wall Street) Sometimes the hottest stocks on Wall Street can turn cold as ice
Check Point Software Technologies (CHKP — $80.43*) Company Update Delivers Respectable September Results/December (FBRFlash) This morning, Check Point delivered respectable 3Q15 (September) results that hit the Street's estimates on the top line while exceeding consensus on the bottom line, although missing on the all-important deferred number
Raytheon's $1 Billion DOMino Win; Does It Signal A New Era In Cyber Procurement? (Homeland Security Today) The Department of Homeland Security (DHS) recently awarded a $1 billion cybersecurity contract to Raytheon and the Office of Personnel Management (OPM) in response to the alarming OPM data breach that put a bull's eye on the need for better federal cybersecurity capabilities
EMC, Dell customers wonder what's in it for them (TechTarget) The acquisition of EMC and VMware has IT pros at Dell World wondering what the future holds for pricing, storage and support
ESET denies claims antivirus is dead as mobile malware threats rocket (V3) ESET grew out of the ashes of communist rule in Czechoslovakia, and has emerged as the central European poster child for security and technology that now spans 180 countries across the globe
Heck yeah, we're from Denver: ProtectWise (Denver Post) Welcome to our feature highlighting the numerous Colorado tech companies that make cool stuff
As Data Grows More Valuable, Marketers Seek New Ways to Secure It (Advertising Age) Outside of hacking, questions proliferate on how much to share voluntarily
Bad News is Good News For Security Budgets But Not Skills (Dark Reading) Cybersecurity is finally getting the attention — and dollars — it deserves from the C-Suite. The challenge now is finding the talent to take full advantage of these technology investments
Got a Clearance? Getting a Job Just Got Harder (Defense One) The OPM hack has slowed hiring for jobs requiring a security clearance, a recent survey shows
Healthcare struggles to recruit top cybersecurity pros (Modern Healthcare) Michael Minear, chief information officer of UC Davis Medical Center in Sacramento, Calif., has a talented security staff, and as a result, has suffered some consequences
Raytheon study finds more men then women attracted to cybersecurity career (UPI) A Raytheon NCSA global survey found a growing gap between U.S. men and women who say they would consider a career in cybersecurity
Cyber security talent shortage: Business is struggling to keep up with sophisticated criminals (City A.M.) Concerns about cyber security are growing in prominence, but companies and law enforcement agencies are still playing catch-up in their attempts to counter ever more sophisticated cyber criminals
Country's largest cyber security organisations collaborate to design cyber-security challenge (SC Magazine) In effort to find the UK's upcoming talent, country's largest cyber security organisations collaborate to design cyber-security challenge
Products, Services, and Solutions
Antivirus Software Could Be Next Big Malware Target (Tom's Guide) Antivirus software protects your computer from malware. But what if malware infects the antivirus software itself?
Cloud-based vulnerability management: Top vendors in the field (Help Net Security) With an increasingly fast-paced threat landscape threatening even the most complex network security infrastructures, vulnerability management has become essential
A New Material Promises NSA-Proof Wallpaper (Defense One) A Utah company has a new nickel-carbon material that could help the Pentagon fight off some of its most haunting threats
Symantec Introduces New Era of Advanced Threat Protection (BusinessWire) Symantec™ Advanced Threat Protection helps companies uncover, prioritize and remediate advanced threats across their control points — fast
TÜV Rheinland Introduces Threat-Centric Identity Access Management (BusinessWire) Next-Generation Enterprise Digital Security Protects Against Tomorrow's Threats
AvePoint Enhances End User Content Management with New Release of DocAve Governance Automation (PRWeb) The latest DocAve Governance Automation release features migration as a managed service, extends site information cards to hybrid environments, and harnesses the power of third-party workflows
Technologies, Techniques, and Standards
A Security Protocol for the Internet of Things (IBM Security Intelligence Blog) The Internet of Things (IoT) is growing by leaps and bounds every day. But as the IoT grows, so do the security vulnerabilities of the linked objects. A security protocol to protect IoT devices will always be needed
Someone just bought your smart home. Did they get your data, too? (ITWorld) A new checklist guides buyers and sellers through a safe move-in day
What should companies do after a wide-scale data breach? (Help Net Security) It is not always possible to prevent such attacks, however, it is possible to make them highly unlikely to succeed
3 steps to prepare for next hack or breach (Federal News Radio) The daily headlines are no longer full of news on the Office of Personnel Management (OPM) breach, and agency executives across all levels of government want to keep it that way
Cybersecurity Lessons Learned From the Ashley Madison Hack (Forbes) As you may know, Ashley Madison — a website that connects users to engage in extramarital affairs — was hacked on July 15, 2015
Design and Innovation
Dear Advertisers, this is why we use Adblockers (Check & Secure) There are a variety of reasons why one would install a strong Adblocker
Research and Development
Complex passwords not the key to securing data: IBM (SC Magazine) Companies that force employees to create complicated and hard to remember passwords are taking the wrong approach to ensure corporate security, according to a report by an IBM Security Intelligence researcher
WhatsApp collects phone numbers, call duration, and more! (Help Net Security) A recent network forensic examination of popular messaging service WhatsApp is offering new details on the data that can be collected from the app's network from its new calling feature: such as phone numbers and phone call duration, and highlights areas for future research and study
Legislation, Policy, and Regulation
EU votes for net neutrality, but against loophole-killing amendments (Ars Technica) Advocates predict rules will allow paid fast lanes
Why Europe's net neutrality plan is more controversial than US rules (Ars Technica) EU and US rules seem similar on surface, but advocates worry about loopholes
EU, U.S. Agree in Principle on New Data-Transfer Pact (Wall Street Journal) European court had struck down previous trans-Atlantic deal dubbed Safe Harbor
EU Privacy Update: 5 Stories That Will Impact U.S. Organizations with European Ties (Legaltech News) The year 2015 was an active year in the evolution of EU privacy law, and could set the stage for further issues down the line
US-China Cyber: What Now? (Cipher Brief) The U.S.-China summit has concluded and the announced results provided little good news on the cyber front, at least for us
Adm. Michael Rogers on the Prospect of a Digital Pearl Harbor (Wall Street Journal) The National Security Agency director says an attack on critical infrastructure in the U.S. is bound to happen
NSA warns of growing danger of cyber-attack by nation states (BBC) The deputy director of the US National Security Agency (NSA), Richard Ledgett, has warned of the increasing danger of destructive cyber attacks by states
How America Can Cross the Digital Security Divide (National Interest) An emerging pattern of cyber activity should serve as a major national security wake-up call for U.S. officials
Senate to battle Tuesday on controversial CISA cybersecurity bill (IDG via CSO) Critics of the bill say it is designed to collect personal data on people
Despite privacy concerns, cybersecurity bill poised for passage (AlJazeera) Tech sector, privacy advocates, security experts say CISA compromises liberties, does little to stem threat
The Many, Many, Many Flaws of CISA (Slate) The Cybersecurity Information Sharing Act gives Internet service providers perverse incentives to spy on users
HIPAA-HITECH Act: End Point Data is Your Greatest Security Risk (Legaltech News) Recent HIPAA-associated regulations now apply to organizations outside of the healthcare industry
DHS banks on data repository for cyber insurance (FCW) The Department of Homeland Security got interested in encouraging a cybersecurity insurance market about four years ago after officials realized that "regulating our way out of cyber risk was probably not going to happen," said Tom Finan, a senior cybersecurity strategist and counsel at DHS
Security specialist Ridge calls for private, government cyber cooperation (Business Insurance) The federal government is likely to look more closely at the private cyber insurance market as a way to enhance cyber security, according to former Homeland Security Secretary Tom Ridge
Young Australians need to become 'human firewall' against cyber threats: Government commissioner (Australian Broadcasting Corporation) More young Australians need to be encouraged to consider a career in cyber-security to help build a "human firewall" against online attacks, according to the Federal Government's eSafety Commissioner for Children
Army cyber warriors take to the battlefield (Defense Systems) As cyber operations become more of a presence on the battlefield, so, too, will cyber warriors
Hacked Opinions: The legalities of hacking — Jeff Schilling (CSO) James Socas, from iSheriff, talks about hacking regulation and legislation with CSO in a series of topical discussions with industry leaders and experts
Hacked Opinions: The legalities of hacking — Rodney Joffe (CSO) Rodney Joffe, from Neustar, talks about hacking regulation and legislation
Litigation, Investigation, and Law Enforcement
The Most Controversial Hacking Cases of the Past Decade (Wired) The Computer Fraud and Abuse Act, the law that's been at the heart of almost every controversial hacking case of the past decade, is in the news again this month
How Fintech Can Win On Financial Crime (TechCrunch) Juan Zarate, a former Treasury official and now adviser to Coinbase, writes in his book Treasury's War that "financial warfare…has started to form a central part of international security strategies." By understanding the financial networks underpinning drug cartels, terrorist organizations and rogue nations, U.S. law enforcement and the Treasury Department have been able to pursue more sophisticated strategies aimed at disrupting them
Germany investigates fresh US spying allegations (RTE News) German authorities have launched a probe into allegations of a new case of suspected spying linked to the US National Security Agency, German reports said today
IRS possessed Stingray cellphone surveillance gear, documents reveal (Guardian) Exclusive: Invoices reveal tax service, 13th federal agency to use secretive dragnet, upgraded device that pretends to be cellphone tower to gather metadata
Venezuela Accuses Website of Cyberterrorism (Courthouse News Service) Venezuela's central bank claims a website run by exiles is committing cyberterrorism by reporting a fraudulent bolivar-to-dollar exchange rate to destabilize the country's economy