11 May 2016

Homeland Security warns of hackers exploiting SAP security flaw

“Homeland Security has warned that hackers are exploiting a security vulnerability in SAP business software — a flaw that dates back to 2010. The department’s Computer Emergency Readiness Team (CERT) sent an alert on Wednesday warning that at least 36 unnamed organizations are running misconfigured or outdated software, which could

Read More
11 May 2016

Facebook releases Open Source version of Capture the Flag hacking competition software

“Although news reports about security bugs are now commonplace, it’s not always obvious how people find these flaws and how you can develop the skills needed to find and protect against malicious exploits. Today, Facebook hopes to make security education easier and more accessible, especially for students, with the release

Read More
11 May 2016

Hackers can impersonate victims and reply to WhatsApp and Telegram chats

“WhatsApp and Telegram, both the messaging services that claim to offer end-to-end encryption for chats, can witness hackers logging into user chats and even replying on their behalf, according to a new research. The vulnerability mainly stems from the Signaling System 7 (SS7), which is an international telecommunications standard that

Read More
10 May 2016

Congressional IT desk warns representatives of ransomware threats

“The technology service desk at the House of Representatives has sent out an email warning your state representatives to be careful which links they follow from their email inboxes” Source: Congressional IT desk warns representatives of ransomware threats

Read More
10 May 2016

Business email hack almost costs Washington casino $1,000,000.00 – other casinos at risk

Want more insight? This content is restricted to OODA Network members only. Members get access to all site content plus access to exclusive reports and events. Please consider becoming a member. For more information please click here. Thanks! Already a member?  Sign in to your account.

Read More
10 May 2016

IBM trains Watson to be a cyber security cop

“Computing giant IBM has always had big plans for its brainy thinking computer named Watson. Since Watson beat human players at the TV game show ‘Jeopardy’ in 2011, the company has given Watson a varied series of job assignments: Cancer researcher, fitness coach, customer service rep. It has even learned

Read More
10 May 2016

Syrian hacker extradited to the United States from Germany

“An alleged hacker with the Syrian Electronic Army, a group that supports the Syrian government, has been extradited to the United States from Germany on charges of conspiracy linked to a hacking-related extortion scheme, U.S. officials said Monday.” Source: Syrian hacker extradited to the United States from Germany – The

Read More
09 May 2016

How a security pro’s ill-advised hack of a Florida elections site backfired

“A Florida man has been slapped with felony criminal hacking charges after gaining unauthorized access to poorly secured computer systems belonging to a Florida county elections supervisor. David Michael Levin, 31, of Estero, Florida, was charged with three counts of unauthorized access to a computer, network, or electronic device and

Read More
09 May 2016

Nuclear Reactors, Materials, and Waste Sector Cyberdependencies

The Department of Homeland Security Office of Cyber and Infrastructure Analysis (DHS OCIA) produces cyberdependency papers to address emerging risks to critical infrastructure and provide increased awareness of the threats, vulnerabilities, and consequences of those risks to the Homeland. This note informs infrastructure and cybersecurity analysts about the potential consequences

Read More
09 May 2016

Countering Cyberattacks, Shootings with Big Data

“An adversary has spent months executing a cyberattack on an unnamed part of the nation’s critical infrastructure, after years of planning. Now, the disruption to daily American life is reaching its climax. First, there is a distributed denial of service, or DDoS,’ attack that masks a massive theft of data crucial

Read More