19 Feb 2015

Every Cyber Attacker is an Insider

I recently witnessed the CIO of a publicly traded company dismissing the results of a successful red team to the Board of Directors by stating that the “the test wasn’t realistic as the red team had insider access.” The “insider” access in this instance was a network connection with no

Read More
19 Feb 2015

JPMorgan Hires Cyberwarriors to Repel Data Thieves, Foreign Powers

“Convinced that it faces threats from governments in China, Iran, and Russia, and that the U.S. government isn’t doing enough to help, JPMorgan has built a vast security operation and staffed it increasingly with ex-military officers. Soon after joining the bank in early 2014, Cummings helped hire Gregory Rattray—like Cummings,

Read More
19 Feb 2015

Lenovo PCs ship with man-in-the-middle adware that breaks HTTPS connections

“Lenovo is selling computers that come preinstalled with adware that hijacks encrypted Web sessions and may make users vulnerable to HTTPS man-in-the-middle attacks that are trivial for attackers to carry out, security researchers said. The critical threat is present on Lenovo PCs that have adware from a company called Superfish

Read More
19 Feb 2015

Lawmakers Debut Bill to Require Search Warrants for Email Snooping

“House and Senate lawmakers are expected to reintroduce bipartisan legislation on Wednesday that would require law enforcement to obtain a search warrant before accessing the content of private emails.” Source: Lawmakers Debut Bill to Require Search Warrants for Email Snooping – Nextgov.com

Read More
19 Feb 2015

Justice, DHS Quarantine Smartphones Returning from Abroad

“Officials at the departments of Justice and Homeland Security typically expect employees’ smartphones will be bugged when they travel overseas. So, they are experimenting with various ways to neutralize foreign spy gear.” Source: Justice, DHS Quarantine Smartphones Returning from Abroad – Nextgov.com

Read More
18 Feb 2015

America Already Has a Manhattan Project for Developing Cyber Attacks

“On Monday, we finally learned the truth of it. America already has a computer security Manhattan Project. We’ve had it since at least 2001. Like the original, it has been highly classified, spawned huge technological advances in secret, and drawn some of the best minds in the country. We didn’t

Read More
17 Feb 2015

Arabic Threat Group Attacking Thousands of Victims Globally

“Threat actors with Arabic roots are targeting multiple high profile organizations and individuals from Middle Eastern countries, according to a new report from Kaspersky Lab. The attack group, dubbed ‘Desert Falcons’ by the security firm, appears to be the first known Arabic cyber-espionage group to develop and run full-scale cyber-espionage

Read More
17 Feb 2015

The Pentagon is building an app store for cyberoperations

“Here’s why this is a big deal: Protecting its networks from computer attacks is as important to the military as defending the country’s air, land, sea, and space. The director of national intelligence has listed a potential compromise of online systems and theft of information as the No. 1 threat to

Read More
17 Feb 2015

Malware infected as many Android devices as Windows laptops in 2014

“A new report published by Alcatel-Lucent’s Motive Security Labs division says that no less than 16 million mobile devices were hit by malware last year, ZDNet reports, which is an increase of 25% compared to 2013 — comparatively, last year malware infections rose by 20% across the board. The company says the

Read More
17 Feb 2015

Japan Sees 25 billion Cyberattacks in 2014

“More than 25 billion cyberattacks on the Japanese government and other bodies were logged in 2014, an agency said Tuesday, with 40 percent of them traced to China. The National Institute of Information and Communications Technology (NICT), which has a network of a quarter of a million sensors, said there

Read More