24 Oct 2014

The Dutch Defense Cyber Command: A New Operational Capability

“The DCC formally resides within the Royal Netherlands Army, the land forces element of the Dutch armed forces (in Dutch: ‘Commando Landstrijdkrachten’ (CLAS)), but involves officers from all military domains. The DCC is primarily tasked with defense, but will also work on offense and, to a lesser extent, intelligence. The DCC

Read More
24 Oct 2014

Hong Kong: 11 arrested over cyberattacks on 70 government websites

“Eleven people have been arrested over cyberattacks on more than 70 government websites this month after hackers warned of retaliation for the use of tear gas on democracy protesters.” Source: 11 arrested over cyberattacks on 70 government websites | South China Morning Post

Read More
24 Oct 2014

DHS investigates 24 potentially deadly cyber flaws in medical devices

“When the FDA released recommendations to manufacturers to strengthen the cybersecurity of medical devices earlier this month, the agency quoted Dr. Suzanne Schwartz as saying, ‘There is no such thing as a threat-proof medical device.’ Now, coinciding with the ‘Collaborative Approaches for Medical Device and Healthcare Cybersecurity’ public workshop, Reuters

Read More
23 Oct 2014

Russia, China prepare to sign unique cybersecurity treaty

“An unprecedented treaty on cybersecurity cooperation could be signed during Vladimir Putin’s state visit to China in November, a Russian business daily reports. Popular newspaper Kommersant quoted unnamed sources ‘close to the Kremlin’ as saying that the final text of the ‘two-sided agreement on cooperation in the field of informa”

Read More
22 Oct 2014

Staples in Northeast likely breached with ‘more to come’

“The office supply chain Staples is investigating a possible breach of credit card data, a company spokesman said Tuesday. ‘Staples is in the process of investigating a potential issue involving credit card data and has contacted law enforcement,’ said Mark Cautela, Staples’ senior public relations manager.” Source:Staples in Northeast likely

Read More
20 Oct 2014

Phone Hackers Dial and Redial to Steal Billions

“Major carriers have sophisticated fraud systems in place to catch hackers before they run up false six-figure charges, and they can afford to credit customers for millions of fraudulent charges every year. But small businesses often use local carriers, which lack such antifraud systems. And some of those carriers are

Read More
20 Oct 2014

China may be hacking every iPhone user in the country

“Chinese authorities just launched ‘a malicious attack on Apple’ that could capture user names and passwords of anyone who logs into the iCloud from anywhere in the country, the well-respected censorship watchdog GreatFire.org reports. With that information, a hacker can view users contacts, photos, messages and personal information stored in

Read More
15 Oct 2014

FBI warns U.S. businesses of cyber attacks, blames Beijing

“The U.S. Federal Bureau of Investigation warned U.S. businesses on Wednesday that hackers it believes to be backed by the Chinese government have recently launched attacks on U.S. companies. The ‘flash’ warning described tools and techniques used by the hackers and asked companies to contact federal authorities if they believe

Read More
15 Oct 2014

POODLE SSL 3.0 Attack Exploits Widely-used Web Encryption Standard

“Another Heartbleed-like vulnerability has been discovered in the decade old but still widely used Secure Sockets Layer (SSL) 3.0 cryptographic protocol that could allow an attacker to decrypt contents of encrypted connections to websites. Google’s Security Team revealed on Tuesday that the most widely used web encryption standard SSL 3.0

Read More
15 Oct 2014

Microsoft Patches 3 Zero-day Vulnerabilities actively being Exploited in the Wild

“As part of monthly patch update, Microsoft released eight security bulletins on Tuesday that address dozens of vulnerabilities including a zero-day flaw reportedly being exploited by Russian hackers to target NATO computers and a pair of zero-day Windows vulnerabilities that attackers have been exploiting to penetrate major corporations’ networks. Just

Read More