Iran accused of hacking into U.S. Navy computers

Stephen Lawson

http://www.computerworld.com/s/article/9242784/Iran_accused_of_hacking_into_U.S._Navy_computers

Excerpt:

“Hackers backed by Iran have penetrated an unclassified U.S. Navy network in one of the most serious incidents of cybercrime yet by the Middle East nation”

 


Two youngsters arrested for different DDoS attacks

 

Zeljka Zorz

http://www.net-security.org/secworld.php?id=15674

Excerpt:

“Following the massive DDoS attack against anti-spam outfit Spamhaus earlier this year, a 35-year-old Dutch citizen believed to be Sven Kamphuis, the owner and manager of Dutch hosting firm Cyberbunker, was arrested in Spain because he was suspected of having participated in the attack.”

 

 


Data broker databases breached, stolen info used by ID theft service

 

Zeljka Zorz

http://www.net-security.org/secworld.php?id=15645

Excerpt:

“Stolen users information is regularly sold and bought online by cyber crooks and attackers, and many services have sprung up to meet the demand for information that can be used to compromise online accounts and facilitate identity theft.”

 


Websites of energy sector companies compromised in watering hole attack

 

Zeljka Zorz

http://www.net-security.org/secworld.php?id=15618

Excerpt:

“The websites of nearly a dozen energy sector companies have been compromised to serve as so-called "watering holes", where visitors would be served with malware or from which they would be redirected to other web pages where the same thing would happen.”

 


USB "condom" protects from mobile device juice jacking

 

Zeljka Zorz

http://www.net-security.org/secworld.php?id=15597

Excerpt:

“A group of Georgia Tech researchers has created quite a stir at this year's Black Hat conference when they showcased chargers capable of installing malware on iPhones, and have brought attention to a type of attack that is likely to become more frequent as mobile devices continue their market conquest: "juice jacking".”

 


Medical identity theft affects 1.84 million U.S. victims

 

http://www.net-security.org/secworld.php?id=15569

Excerpt:

“Medical identity theft is a national healthcare issue with life-threatening and hefty financial consequences. According to the 2013 Survey on Medical Identity Theft conducted by Ponemon Institute, medical identity theft and "family fraud" are on the rise; with the number of victims affected by medical identity theft up nearly 20 percent within the last year.”

 


NSA says illegal data collection was caused by too complex tech

 

Zeljka Zorz

http://www.net-security.org/secworld.php?id=15563

Excerpt:

“NSA's repeated claims about having its surveillance apparatus under control have taken another hit after the agency has been legally forced to publish a huge batch of previously classified documents.”

 


How important is penetration testing?

 

http://www.net-security.org/secworld.php?id=15536

Excerpt:

“With cyber attacks becoming the norm, it is more important than ever before to undertake regular vulnerability scans and penetration testing to identify vulnerabilities and ensure on a regular basis that the cyber controls are working.”

 


Protect yourself and don't regret using social media

 

http://www.net-security.org/secworld.php?id=15526

Excerpt:

“Those who have ruined their reputations and damaged their careers after posting inappropriate material on social networks include politicians, movie and sports stars as well as teachers, police officers and even fast food restaurant employees.”

 


Replacing passwords and PINs with your heartbeat

 

Zeljka Zorz

http://www.net-security.org/secworld.php?id=15514

Excerpt:

“The latest innovation in this field comes from Canadian startup Bionym, whose team created Nymi, a bracelet / wristband containing an ECG (electrocardiogram) sensor that "reads" the unique heartbeat pattern of the wearer and uses it to authenticate into a variety of electronic devices (cars, computers, smartphones, TVs, etc.)”

 


AT&T's massive call detail record database accessible to DEA agents

 

Zeljka Zorz

http://www.net-security.org/secworld.php?id=15506

Excerpt:

“Since 2007, AT&T employees have been working side by side with US Drug Enforcement Administration and local law enforcement agents, helping them access electronic call detail records (CDRs) for suspect individuals - details contained in a vast database that contains data that goes back to 1987, the NYT has revealed.”

 


Microsoft and Google continue to press US government over transparency

 

Zeljka Zorz

http://www.net-security.org/secworld.php?id=15499

Excerpt:

“Brad Smith, Microsoft’s general counsel, announced that Google and Microsoft are tired of waiting for the US government to allow them to publish sufficient data relating to Foreign Intelligence Surveillance Act (FISA) orders.”

 


 

 

Taiwan bids to bolster security with free malware database

Phil Muncaster

http://www.theregister.co.uk/2013/09/02/taiwan_malware_knowledge_database_free/

Excerpt:

“Taiwan’s National Centre for High-Performance Computing (NCHC) has launched what it claims to be the world’s first free malware database designed to help businesses, academics and researchers better identify and defend against criminally-coded attacks.”

 


 

Barclays Bank computer theft: Eight held over £1.3m haul

http://www.bbc.co.uk/news/uk-england-24172305

Excerpt:

“Eight men have been arrested in connection with a £1.3m theft by a gang who took control of a Barclays Bank computer. The money was transferred from the branch in Swiss Cottage in north London in April, a Met Police spokesman said.”

 


 

Snowden disclosures prompt warning on widely used computer security formula

Joseph Menn

http://in.reuters.com/article/2013/09/20/usa-security-snowden-rsa-idINDEE98J02G20130920?

Excerpt:

“In the latest fallout from Edward Snowden's intelligence disclosures, a major U.S. computer security company warned thousands of customers on Thursday to stop using software that relies on a weak mathematical formula developed by the National Security Agency.”

 


Gang held over 'audacious plot' to take over Santander UK computers

 

Matt Scuffham

http://uk.reuters.com/article/2013/09/13/uk-santander-arrests-idUKBRE98C08A20130913

Excerpt:

“British police said on Friday they had smashed an "audacious" and sophisticated plot to take control of the bank Santander UK's computer systems and steal millions of pounds. Detectives, who described the plot as the most significant case of its kind, said they had arrested 12 men who had allegedly fitted a device in a Santander branch in southeast London capable of transmitting the entire desktop contents of the bank computer.”

 


 

Hacker cracks Vodafone Germany, steals data of 2 million customers

John Leyden

http://www.theregister.co.uk/2013/09/12/vodafone_germany_breach

Excerpt:

A hack on a Vodafone Germany server has exposed the personal details – including banking information – of two million of its customers. Hackers accessed names, addresses, bank account numbers and dates of birth. Phone numbers, credit card details and passwords are thought to be safe, but the leaked information is still pretty extensive and ample fodder for follow-up phishing attacks.”

 


 

Yahoo CEO Marissa Mayer on NSA data requests: ‘You don’t comply, it’s treason’

Dominic Rushe, The Guardian

http://www.rawstory.com/rs/2013/09/11/yahoo-ceo-marissa-mayer-on-nsa-data-requests-you-dont-comply-its-treason/

Excerpt:

“Mark Zuckerberg joins Mayer in hitting back at critics of tech companies, saying US government did ‘bad job’ of balancing people’s privacy and duty to protect. Marissa Mayer, the CEO of Yahoo, and Mark Zuckerberg of Facebook struck back on Wednesday at critics who have charged tech companies with doing too little to fight off NSA surveillance. Mayer said executives faced jail if they revealed government secrets.”

 


 

Privacy Scandal: NSA Can Spy on Smart Phone Data

http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html

Excerpt:

“The United States' National Security Agency intelligence-gathering operation is capable of accessing user data from smart phones from all leading manufacturers. Top secret NSA documents that SPIEGEL has seen explicitly note that the NSA can tap into such information on Apple iPhones, BlackBerry devices and Google's Android mobile operating system.”

 


 

PM 'orders smartphone crackdown' over spying

Ben McPartland

http://www.thelocal.fr/20130910/pm-orders-smartphone-crackdown-over-spying

Excerpt:

“France’s Prime Minister Jean-Marc Ayrault has banned government ministers and their staff from using their smartphones and tablets to transmit sensitive information, according to a media report on Tuesday. The move is apparently motivated by fears they could be spied on.”