Top CyberSecurity News For September 28th 2016

  1. FBI investigating possible hack of Democratic Party staffer cell phonesFrom CNN. 

    The FBI has asked to examine the cell phones of a small number Democratic Party staffers as it investigates a possible hack, law enforcement and Democratic sources told CNN Tuesday.

    The development comes on the same day Homeland Security Secretary Jeh Johnson told lawmakers that 18 states have asked for help in warding off cyberattacks on their electronic voting systems.
Advertisements

Top CyberSecurity News For 24th August 2016

  1. FBI investigating Russian hack of New York Times reporters, othersFrom CNN.  Hackers thought to be working for Russian intelligence have carried out a series of cyber breaches targeting reporters at The New York Times and other US news organizations, according to US officials briefed on the matter. The intrusions, detected in recent months, are under investigation by the FBI and other US security agencies. Investigators so far believe that Russian intelligence is likely behind the attacks and that Russian hackers are targeting news organizations as part of a broader series of hacks that also have focused on Democratic Party organizations, the officials said.

Top CyberSecurity News For 26th May 2016

  1. Beware of keystroke loggers disguised as USB phone chargers, FBI warns. From ArsTechnica. FBI officials are warning private industry partners to be on the lookout for highly stealthy keystroke loggers that surreptitiously sniff passwords and other input typed into wireless keyboards. Always-on sniffer remotely uploads all input typed into Microsoft Wireless keyboards. The FBI’s Private Industry Notification is dated April 29, more than 15 months after whitehat hacker Samy Kamkar released a KeySweeper, a proof-of-concept attack platform that covertly logged and decrypted keystrokes from many Microsoft-branded wireless keyboards and transmitted the data over cellular networks. To lower the chances that the sniffing device might be discovered by a target, Kamkar designed it to look almost identical to USB phone chargers that are nearly ubiquitous in homes and offices.

  2. Microsoft Bans Simple Passwords That Appear in Breach ListsFrom Softpedia. 

    Following the huge debacle related to the LinkedIn data breach that came to light last week, Microsoft’s Identity Protection team has decided to ban the usage of common or simple passwords that may be easy to guess or have already appeared in breach lists. Microsoft says it has already activated this feature for regular Microsoft Account users and is holding a limited private preview for Microsoft Azure Active Directory services.

  3. Here’s how the US military is beating hackers at their own gameFrom Tech Insider.  There’s an unseen world war that has been fought for years with no clear battle lines, few rules of engagement, and no end in sight. But it’s not a shooting war; not a war where combatants have been killed or wounded — at least not yet. It’s a war that pits nations against each other for dominance in cyberspace, and the United States, like other nations employing professional hackers as “cyber soldiers,” sees it as a battlefield just like any other.

Top CyberSecurity News For 8th May 2016

  1. A look inside the Department of Homeland Security’s cyber hubFrom TheVerge. The building where the Department of Homeland Security tracks every cyber attack against the US is surprisingly bland. With its neutral exterior and circular drive, I wasn’t even sure we were at the right place until I saw our press liaison standing in the lobby. There are no signs to distinguish it from the generic office park that surrounds it, and the doorman wouldn’t even confirm if DHS had an office inside.

  2. Engineering student arrested for hacking Indian Politician Lalu Prasad’s Facebook accountFrom Times Of India. An engineering student was arrested on Tuesday for allegedly hacking the Facebook profile and email account of RJD supremo Laluprasad Yadav. The Facebook profile of Yadav was hacked by the criminals on March 13. An FIR was lodged by his son and deputy CM Tejashwi Prasad Yadav with Secretariat police station and sections 419, 420 and 506 of IPC was lodged in the case. Two investigating officers (IO), ASP Nilesh Kumar and inspector Ramashankar Singh of the cyber cell of economic offences unit (EOU) first located that the hacking was committed from mobile phone device and not a desktop or laptop.

  3. History Of TCP/IP From History Of Computers. The most popular network protocol in the world, TCP/IP proto cal suite, was designed in 1970s by 2 DARPA scientists—Vint Cerf and Bob Kahn, persons most often called the fathers of the Internet. Vinton Gray “Vint” Cerf (born June 23, 1943 in New Haven, Connecticut) obtained his B.S. in Math and Computer Science at Stanford University in 1965 and went to IBM, where he worked for some two years as a systems engineer, supporting QUIKTRAN—a system to make time-shared computing more economical and widely available for scientists, engineers and businessmen.
  4. FBI Says a Mysterious Hacking Group Has Had Access to US Govt Files for Years From VICE. The feds warned that “a group of malicious cyber actors,” whom security experts believe to be the government-sponsored hacking group known as APT6, “have compromised and stolen sensitive information from various government and commercial networks” since at least 2011, according to an FBI alert obtained by Motherboard.

  5. How is Malware Researched?From Intego. You may wonder what goes on behind the scenes between the time when researchers get malware samples and the time virus definitions magically appear on your machine. All researchers do things a little differently, but there are some basic techniques that are common to a lot of them. For instance, which technique a researcher uses as his or her first or primary method of analyzing a file will depend on a lot of things. Some might seem obvious (such as how complicated or armored is the threat or how quickly do we need to analyze this), while others might seem a bit odd (how old is the researcher?).

Top CyberSecurity News For 29th April 2016

  1. Former Tor developer created malware for the FBI to hack Tor users. From Daily Dot. How does the U.S. government beat Tor, the anonymity software used by millions of people around the world? By hiring someone with experience on the inside. A former Tor Project developer created malware for the Federal Bureau of Investigation that allowed agents to unmask users of the anonymity software.
  2. German nuclear plant infected with computer viruses, operator says. From Reuters. A nuclear power plant in Germany has been found to be infected with computer viruses, but they appear not to have posed a threat to the facility’s operations because it is isolated from the Internet, the station’s operator said on Tuesday. The Gundremmingen plant, located about 120 km (75 miles) northwest of Munich, is run by the German utility RW.

  3. Philippine central bank says foiled attempts to hack its website. From Reuters. The Philippine central bank has foiled attempts to hack its website, its governor said on Thursday amid a warning from global financial network SWIFT about recent multiple cyber fraud incidents targeting its system. SWIFT’S disclosure came as law enforcement authorities in Bangladesh and elsewhere investigated the February cyber theft of $81 million from the Bangladesh central bank account at the New York Federal Reserve Bank.

  4. Qatar National Bank investigating alleged data hack. From Reuters. Qatar National Bank, the largest lender in the Middle East and Africa by assets, is investigating an alleged security breach of data posted online this week that revealed the names and passwords of a large number of customers. A 1.5GB trove of leaked documents includes the bank details, telephone numbers and dates of birth of several journalists for satellite broadcaster Al-Jazeera, supposed members of the ruling al-Thani family and government and defense officials, Doha News website reported.

  5. How These Mormon Women Became Some of the Best Cybersecurity Hackers in the U.S. From Reuters. Sarah Cunha and Laura Wilkinson, two seniors at Brigham Young University, didn’t make it to graduation this year. Instead, the two women spent their grad weekend, April 22-24, fighting hackers and defending a network from malware attacks at the 2016 National Collegiate Cyber Defense Championship (NCCDC). The NCCDC, already in its 11th year, is the Olympics of college-level cyber defense. To qualify for one of the ten slots in the national competition, a school must first beat out all the local competition in a regional showdown.

Top Cybersecurity News For 22nd April 2016

  1. Rules For Cyberwarfare Still Unclear, Even As U.S. Engages In It. From NPR.  Who’s in charge when the U.S. wages cyberwar? “The chain of command is clear on paper,” says Susan Hennessey, who served as a lawyer at the National Security Agency until November 2015. “It’s much more difficult to understand in practice.”
  2. IBM’s Survey Of The Cybersecurity LandscapeFrom IBM.com. In 2015, 60 percent of all attacks were carried out by insiders, either ones with malicious intent or those who served as inadvertent actors. In other words, they were instigated by people you’d be likely to trust. And they can result in substantial financial and reputational losses.
  3. Boston Cybersecurity Map Shows Deep, Diverse Local Sector. From XConomy. It’s no secret that the Boston area is home to a formidable group of companies related to cybersecurity. Just how big is the local cluster? Xconomy surveyed the landscape and found 63 firms within an hour’s drive of downtown Boston, including locally based companies and outposts of firms based elsewhere.

  4. Tomorrow’s Buildings: Help! My building has been hacked. From BBC. According to Mr Billy Rios, who runs security company Whitescope, there are 50,000 buildings currently connected to the internet – including research facilities, churches and hospitals, and 2,000 of those are online with no password protection.

  5. FBI Warns Farmers About the Dangers of Hackable IoT Farm Equipment. From Softpedia. Farmers who employ Internet-connected and precision farming equipment should be very mindful of the way they configure their devices, the FBI warned in a public statement advisory at the end of March. The Bureau, together with the US Department of Agriculture (USDA), issued the note on March 31, as an alert to the growing threat of IoT security.