Top CyberSecurity News For 21st June 2016

  1. Iran Arrests Suspect in Hacking of State-Run WebsitesFrom ABCNews. Iran’s semi-official Tasnim news agency says authorities have arrested a suspect in the hacking of several websites of state-run organizations. It quotes the Revolutionary Guard on Saturday as saying its cybercrimes unit arrested the hacker, who referred to himself online as the “Mafia Hacking Team.” It says he hacked into the websites of the Iranian postal service, universities and other government-run organizations. It did not give a motive or say if any information was stolen.

Top CyberSecurity News For 3rd May 2016

  1. US Republican party shuns electronic ballots at open convention. From Politico. The 2016 Republican presidential campaign has been the definition of an instantaneous digital race, complete with micro-targeted Facebook ads, Twitter tirades and ephemeral Snapchat videos. But the biggest moment of the entire GOP contest, at the party’s national convention in Cleveland, is shaping up to be a decidedly low-tech affair.

  2. ISIS hacking division release names and personal details of dozens of American soldiers urging lone wolf attacks. From Daily Mail. ISIS hackers have released the names and personal details of dozens of American military personnel urging supporters to assassinate them. The ‘hit list’ which was published on social media, claimed to include the details of American servicemen who had operated drones responsible for the coalition airstrikes.
  3. Iranian Hacker Arrested for Stealing American Airlines Air Miles Worth $260,000 From Softpedia. Miami police revealed details about a criminal case from 2015 during which officers arrested an Iranian national studying in the US for stealing reward air miles from American Airlines customers worth $260,000. The suspect’s name is Milad Avadzavani, a former Florida International University student, who was arrested last year and is preparing to face trial this summer.
  4. Cybersecurity Professionals Are Using Misdirection To Combat HackingFrom Motherboard. Today, there are many honeypot security programs available with which cybersecurity teams can deploy to draw hackers’ attention wherever they wish it to go. As programming has progressed, honeypots and honeynets have become increasingly etherealized; several virtual machines may all be hosted on a single physical box. But the honeypot approach has its drawbacks. Scalability is the biggest concern–virtual or not, someone has to keep an eye on these systems and corral hackers, and IT teams typically have their hands full managing the regular networks.

  5. What is a firewall? From Palo Alto Networks. A firewall is a network security device that grants or rejects network access to traffic flows between an untrusted zone (e.g., the Internet) and a trusted zone (e.g., a private or corporate network). The firewall acts as the demarcation point or “traffic cop” in the network, as all communication should flow through it and it is where traffic is granted or rejected access. Firewalls enforce access controls through a positive control model, which states that only traffic defined in the firewall policy is allowed onto the network; all other traffic is denied (known as “default deny”).

Top CyberSecurity News For 30th April 2016

  1. Windows GodMode Abused by Malware. From Softpedia. Security researchers at McAfee Labs have come across a new malware family that is abusing a secret Easter Egg in Microsoft Windows called “GodMode.” GodMode consists of a piece of code that Microsoft left inside Windows since Vista that allows users to create a folder, give it a specific name, and automatically transforming it into a container that lists all the shortcuts to all the Control Panel settings. Nobody knows how GodMode panels came to be, but most likely they were used by Microsoft’s staff for debugging purposes.

  2. Group Helping Canada Research How Not to Get Hacked Was Itself HackedFrom ViceNews.  A Canadian non-profit group that has been working with the federal government to research how companies can guard against cyber crimes was itself defaced by an infamous hacker that supports the Islamic State. The attack, claimed by “Don-2”, who has already hacked and defaced a websites from China and India, targeted the Information and Communications Technology Council of Canada and appears to have vandalized the site with messages denouncing Canada’s expansion into the Middle East, including in “Shubra” an area in Egypt. Canadian peacekeepers are currently stationed in the Sinai.

  3. Cyber security Bill nears implementationFrom ITWeb. The South African Government’s highly-criticised national Cyber Crimes and Cyber Security Bill (cyber security Bill) will “shortly be taken through the Parliamentary process ahead of implementation”.This is the word from minister in the State Security Agency (SSA), David Mahlobo, who delivered his budget vote speech this week, and said the cyber security Bill had been completed and presented to Cabinet.

  4. Iran expands cyber warfare forces, attacks critical Western infrastructure. From Debka. Amid Iran’s recent demonstration of its military capabilities including the test-firing of ballistic missiles, which have drawn harsh criticism in the West and resulted in economic sanctions, a group of cyber warfare experts under the direct command of Iran’s Revolutionary Guard Corps has significantly increased its operations in recent months. The fingerprints of the hacker organization that calls itself “Rocket Kitten”, whose IP addresses lead directly to Iranian army command, were discovered again on Tuesday, this time within the computer control system of one of the most sensitive infrastructure facilities in Central Europe.
  5. Cybersecurity Is Top Concern of IEEE Members. From DesignNews. A new survey of hot technologies from IEEE Computer Society members and non-members from technology companies finds that cybersecurity ranked number one among all industry segments. Fully, 56% to 58% of respondents said cybersecurity is having the greatest impact on their industry.