British man accused of hacking into US government systems
http://www.bbc.co.uk/news/technology-24712214
Excerpt:
“A 28-year-old British man has been arrested on suspicion of hacking into US military and US government computer systems. Lauri Love, arrested in Suffolk under the Computer Misuse Act, has been released on bail until next February.â€
Â
Syrian Hackers Target Obama's Twitter, Facebook Posts
Â
Fran Berkman
http://mashable.com/2013/10/28/syrian-electronic-army-obama/
Excerpt:
“The pro-Assad group Syrian Electronic Army claims it hacked the Twitter and Facebook accounts of U.S. President Barack Obama.â€
Â
7 Eastern Europeans Indicted in Multimillion-Dollar eBay Fraud Scheme
Â
Kim Zetter
http://www.wired.com/threatlevel/2013/10/romanians-indicted-cyber-fraud
Excerpt:
“Six Romanians and one Albanian have been indicted on allegations that they operated a multimillion-dollar cyber fraud scheme selling nonexistent cars, boats and other high-value items through eBay and other sites.â€
Â
U.N. nuclear agency says malware infected some computers
Â
Vienna
http://uk.reuters.com/article/2013/10/22/uk-nuclear-iaea-malware-idUKBRE99L08Q20131022
Excerpt:
“Malicious software infected some U.N. nuclear agency computers over the past few months but no data in its network has been compromisedâ€
Â
Tales from the Crypto Community: The NSA Hurt Cybersecurity. Now It Should Come Clean.
Â
Nadia Heninger and J. Alex Halderman
Excerpt:
“Of all of the revelations about the NSA that have come to light in recent months, two stand out as the most worrisome and surprising to cybersecurity experts. The first is that the NSA has worked to weaken the international cryptographic standards that define how computers secure communications and data. The second is that the NSA has deliberately introduced backdoors into security-critical software and hardware. If the NSA has indeed engaged in such activities, it has risked the computer security of the United States (and the world) as much as any malicious attacks have to date.â€
Â
In cyberarms race, North Korea emerging as a power, not a pushover
Â
Mark Clayton
Excerpt:
“Often dismissed as a laggard in the global cyberarms race, North Korea has long been seen as a chronic cyber-superpower wannabe. Its poverty, minimal Internet access, and paucity of malicious software to its credit together have indicated that the "hermit kingdom" has just not yet arrived.â€
Â
China no longer top source of cyber attacks
Warwick Ashford
http://www.computerweekly.com/news/2240207541/China-no-longer-top-source-of-cyber-attacks
Excerpt:
“Indonesia has overtaken China as the top source of cyber attacks, according to the latest study of internet traffic from content delivery firm Akamai. According to the firm’s State of the internet report, Indonesia’s share of observed attack traffic in the second quarter of 2013 increased to 38%, pushing China into second place with a 33% share.â€
Â
New Hacker Threat -- Targeting You Through Your Kids
David Kennedy
http://www.huffingtonpost.com/david-kennedy/new-hacker-threat_b_4101584.html
Excerpt:
“As adults get better at avoiding suspicious websites and fake email attachments, some hackers are shifting their strategy to go after a family's weakest link -- kids. With a growing number of kid-friendly websites, online games and mobile apps now on the market, children are becoming important consumers of online content -- and a perfect target for hackers.â€
Â
Mexico condemns US over alleged NSA hacking of ex-president's emails
Â
http://www.theguardian.com/world/2013/oct/21/mexico-condemns-us-nsa-hacking-presidents-emails
Excerpt:
“Mexico has criticised the United States over new allegations of spying after a German magazine reported that the US National Security Agency (NSA) had hacked Felipe Calderon's public email account while he was president.â€
Â
Laundering Money Online: a review of cybercriminals’ methods
Â
Jean-Loup Richet
http://arxiv.org/ftp/arxiv/papers/1310/1310.2368.pdf
Excerpt:
“Money laundering is a critical step in the cyber crime process which is experiencing some changes as hackers and their criminal colleagues continually alter and optimize payment mechanisms.â€
Â
Top web firms urge more transparency over UK requests for user data
Â
Rowena Mason
Excerpt:
“Britain needs to have a full public debate about the scale of internet surveillance to give confidence that state powers are not being abused, the world's five biggest internet companies have told MPs.â€
Â
'Project SHINE' Illuminates Sad State Of SCADA/ICS Security On The Net
Â
Kelly Jackson Higgins
http://www.darkreading.com/vulnerability/project-shine-illuminates-sad-state-of-s/240162739
Excerpt:
“A global Internet-scanning project focused on finding SCADA/ICS equipment and systems accessible via the public Internet is discovering some 2,000 to 8,000 new exposed devices each day.â€
Â
NSA collects millions of e-mail address books globally
Â
Barton Gellman and Ashkan Soltani
Excerpt:
“The National Security Agency is harvesting hundreds of millions of contact lists from personal e-mail and instant messaging accounts around the world, many of them belonging to Americans, according to senior intelligence officials and top-secret documents provided by former NSA contractor Edward Snowden.â€
Â
Â
Hackers target patient records
James Fielding
http://www.express.co.uk/news/uk/434636/Hackers-target-patient-records
Excerpt:
“They frequently target the rich and powerful who they see as having most to lose, according to Professor Carsten Maple, a member of the Information Assurance Advisory Council. His warning came as the Sunday Express reveals that on average one patient a day has their medical records and personal data either lost or stolen.â€
Â
BlackHole Exploit Kit Author Reportedly Arrested in Russia
Â
Eduard Kovacs
Excerpt:
“Rumor has it that Paunch, the author of the notorious BlackHole exploit kit, and his partners have been arrested in Russia. Maarten Boone, security analyst at Dutch IT security company Fox-IT, was the first to break the news on Twitter. So far, there aren’t any additional detailsâ€
Â
The FBI busted Silk Road, but not the 'dark web' behind it
Â
Adrianne Jeffries
http://mobile.theverge.com/2013/10/2/4795502/the-fbi-busted-silk-road-but-not-the-dark-web-behind-it
Excerpt:
“Silk Road, the underground website where dealers sold illegal drugs, was supposed to be safe. The site was nestled deep in the dark web, accessible only through the anonymizing network Tor. All transactions were done in the anonymizing virtual currency Bitcoin. Its owner-operator, Dread Pirate Roberts, was said to be a criminal mastermind and technical wunderkind who never left a trail. It was all very hackerish and clandestine.â€
Â
U.S. indicts 13 alleged members of Anonymous in DDoS attacks
Â
Steven Musil
Excerpt:
“A federal grand jury has indicted 13 alleged members of the hacktivist collective Anonymous in connection with online attacks targeting financial institutions, trade groups, and government entities.â€
Â
FBI brings down Silk Road underground market
Â
Adam Greenberg, Reporter
http://www.scmagazine.com/fbi-brings-down-silk-road-underground-market/article/314691/
Excerpt:
“The Federal Bureau of Investigation's (FBI) shutdown this week of Silk Road – a black market existing on the Deep Web and accessible through the Tor network – also led to the arrest of its 29-year-old operator, Ross Ulbricht, also known as Dread Pirate Roberts, DPR, or Silk Road.â€
Â
Tor and the Silk Road takedown
Â
Arma
https://blog.torproject.org/blog/tor-and-silk-road-takedown
Excerpt:
“In this case we've been watching carefully to try to learn if there are any flaws with Tor that we need to correct. So far, nothing about this case makes us think that there are new ways to compromise Tor (the software or the network). The FBI says that their suspect made mistakes in operational security, and was found through actual detective work. Remember: Tor does not anonymize individuals when they use their legal name on a public forum, use a VPN with logs that are subject to a subpoena, or provide personal information to other services.â€
Â
Iranian cyber warfare commander shot dead in suspected assassination
Â
Damien McElroy, and Ahmad Vahdat
Excerpt:
“The head of Iran’s cyber warfare programme has been shot dead, triggering further accusations that outside powers are carrying out targeted assassinations of key figures in the country’s security apparatus.â€
Â
Silent Circle ditches NIST cryptographic standards to thwart NSA spying
Â
Lucian Constantin
Excerpt:
“The U.S. National Security Agency's reported efforts to weaken encryption standards have prompted an encrypted communications company to move away from cryptographic algorithms sanctioned by the U.S. National Institute of Standards and Technology (NIST).â€
Â
Could the EU cyber security directive cost companies billions?
Â
http://www.net-security.org/secworld.php?id=15694
Excerpt:
“Many of the world’s largest enterprises are not prepared for the new European Union Directive on cyber security, which states that organizations that do not have suitable IT security in place to protect their digital assets will face extremely heavy fiscal penalties.â€