Wednesday, May 25, 2016

Monday, May 23, 2016

Japan to Form New Cybersecurity Agency to Protect Its Critical Infrastructure

Japan to Form New Cybersecurity Agency to Protect Its Critical Infrastructure: Japanese officials plan to create a new agency tasked with protecting the country’s critical infrastructure prior to hosting the 2020 Tokyo Olympics.

Currently named the “Industrial Cybersecurity Promotion Agency” (ICPA), the envisaged public-private sector body would lead the development of human resources, including recruiting “white hat hackers” and conducting research.[...]

Japanese Convenience Store ATM Heist Nabs $13M

Japanese Convenience Store ATM Heist Nabs $13M: Officials are investigating the theft of 1.4 billion yen (close to $13 million) in a heist that targeted 1,400 ATM machines across Japan earlier this month.[...]

Sunday, May 22, 2016

Gang Surrenders Key to TeslaCrypt Ransomware Kingdom

Gang Surrenders Key to TeslaCrypt Ransomware Kingdom.

Eset on Wednesday announced that it has fashioned a free tool that victims of all variants of the TeslaCrypt ransomware can use to unlock affected files.

After the criminal gang behind TeslaCrypt recently abandoned support of the malicious software, an Eset analyst contacted the group anonymously, using the channel TeslaCrypt's operators offered to ransomware victims, and asked for the universal master decryption key, the company said.[....]

Flaw Puts a Billion Wireless Mice at Risk

Flaw Puts a Billion Wireless Mice at Risk.

Wireless mice and keyboards are the perfect accessories for a world in which devices increasingly are shuffling off their connection coils, but those accessories -- especially untethered rodents -- also can create new threats for those who use them.
One such threat is Mousejack. The attack exploits a vulnerability found in 80 percent of wireless mice. With US$15 worth of off-the-shelf hardware and a few lines of simple code, a wireless mouse can be turned into a hacker's portal for all kinds of mischief[...]

Thursday, May 19, 2016

5 tips for better enterprise security.

Do your security policies and procedures actually promote better security, or is your company only looking for known malware and ignoring the human factor? It’s a tricky balancing act that trips up many organizations.

$7.5M Healthcare Data Breach Settlement for St. Joseph Health

$7.5M Healthcare Data Breach Settlement for St. Joseph Health...

The settlement revolved around a healthcare data breach from 2012 where PHI was made available via internet search engines.





Wednesday, May 18, 2016

Breach at Nulled.io Hacker Forum Exposes Over 500K Registered Users

Breach at Nulled.io Hacker Forum Exposes Over 500K Registered Users: A popular underground hacker forum used by cybercriminals to trade and purchase leaked data, stolen credentials and software cracks was recently breached.

Security Slice: The Zero-Day Arms Race

Security Slice: The Zero-Day Arms Race: According to a recent report by Symantec, attacks exploiting previously unknown (or zero-day) software vulnerabilities more than doubled last year.

Tuesday, May 17, 2016

Sun Tzu

Sun Tzu: In the second installment of our two-part article series, we will explore a high-level theme running through the thoughts of Sun Tzu in his Art of War.

Malware Links Bangladesh Bank Heist to Sony Hack, Find Researchers

Malware Links Bangladesh Bank Heist to Sony Hack, Find Researchers: Researchers have linked malware behind a heist at the Bangladesh Bank earlier this year to malicious software used in the 2014 Sony hack.

Friday, May 13, 2016

Adobe Patches Yet Another Flash Zero Day

Adobe Patches Yet Another Flash Zero Day: Adobe Patches Yet Another Flash Zero Day. Question marks raised again about software’s usefulness to the enterprise.

Banks on High Alert as Swift Reveals Second Attack

Banks on High Alert as Swift Reveals Second Attack: Banks on High Alert as Swift Reveals Second Attack. Bangladesh Bank hackers suspected of follow-up raid.

Brits Shun Brands Following Breaches

Brits Shun Brands Following Breaches: Brits Shun Brands Following Breaches. FireEye study finds data loss can have serious impact on customer loyalty.

LinkedIn users targeted by hacking group

LinkedIn users targeted by hacking group with fake job offers https://t.co/mPKKLqzF5k via @SiliconANGLE