(ISC)2 Congress 2013: East European Cybercriminals More of a Threat than East Asian
“Eastern European cybercriminals pose a greater threat than East Asian cybercriminals, claimed Tom Kellermann, VP of cybersecurity at Trend Micro. “ Source: Infosecurity – (ISC)2 Congress 2013: East European Cybercriminals More of a Threat than East Asian
22 Hours: Average Time It Takes Malware Distributors To Exploit News
“Cybercriminals continue to respond with lightning speed when they see an opportunity to exploit a national or global news story to spread malware. In fact, the Research Team of Eleven, leading German e-mail security provider, now sees instances of criminals inventing ‘breaking news’ that appears to relate to high-profile current
China’s ‘mini-Hong Kong’ eyes Internet access, shrugs off Shanghai threat
“A planned economic zone in southern China will allow full internet freedom, similar to what will be allowed in a proposed free trade zone in Shanghai, a senior official behind the project said on Thursday. China tightly controls the internet through a so-called Great Firewall, routinely deleting online postings and
Data Broker Giants Hacked by ID Theft Service
“An identity theft service that sells Social Security numbers, birth records, credit and background reports on millions of Americans has infiltrated computers at some of America’s largest consumer and business data aggregators, according to a seven-month investigation by KrebsOnSecurity.” Source: Data Broker Giants Hacked by ID Theft Service — Krebs
Cybercriminals Use Reveton Ransomware for Bitcoin Mining
“Security researchers have come across a new version of the Reveton ransomware that’s designed to help cybercriminals make a profit by engaging in Bitcoin mining.” Source: Cybercriminals Use Reveton Ransomware for Bitcoin Mining
Future cyber attacks could attack medical implants – or wage “psychological war” in virtual reality, Europol warns
“New hi-tech cyber attacks could threaten energy supplies, ‘wearable’ computers – and even medical implants, according to a study conducted by Europol’s European Cybercrime Centre (EC3) and the International Cyber Security Protection Alliance (ICSPA). Attacks in ‘virtual reality’ or ‘augmented reality’ could even be tailored to cause ‘psychological harm to
U.S. military’s battlefield network in Afghanistan vulnerable to hackers
“The Pentagon’s main battlefield intelligence network in Afghanistan is vulnerable to hackers. The U.S. command in Kabul will cut it off from the military’s classified data files unless the Army fixes the defects in 60 days, according to an official memo.” Source: U.S. military’s battlefield network in Afghanistan vulnerable to
Facebook, other banned sites to be open in China free trade zone
“Facebook, Twitter and other websites deemed sensitive and blocked by the Chinese government will be accessible in a planned free-trade zone (FTZ) in Shanghai, the South China Morning Post reported on Tuesday.” Source: Facebook, other banned sites to be open in China free trade zone: report | Reuters
Operational Levels of Cyber Intelligence
Cyber intelligence is a complex, as yet undefined, multifaceted approach to framing, thinking about, and reacting to cyber adversarial activity. Many discussions emphasize the complexity of the cyber operational domain, the speed in which activity and operations take place, and the supposed inherent advantage of the attacker. By beginning to
Hacking U.S. Secrets, China Pushes for Drones
“For almost two years, hackers based in Shanghai went after one foreign defense contractor after another, at least 20 in all. Their target, according to an American cybersecurity company that monitored the attacks, was the technology behind the United States’ clear lead in military drones.” Source:Hacking U.S. Secrets, China Pushes