Malware creation breaks all records! 160,000 new samples every day


“Malware creation has broken all records during this period, with a figure of more than 15 million new samples, and more than 160,000 new samples appearing every day, according to Panda Security.”


Dissecting April's malicious spam


“Malicious attachments in April came disguised as e-greetings and notifications about faxes. In the case of the former, alleged Easter greetings turned out to be the Fareit.aonw Trojan with fairly limited functionality: it didn't try to steal any passwords, but did download and launch a far more dangerous Zbot Trojan-Spy designed to attack servers and steal personal data.”


Data brokers collect info on nearly every U.S. consumer


“In a report issued on the data broker industry, the Federal Trade Commission finds that data brokers operate with a fundamental lack of transparency. The Commission recommends that Congress consider enacting legislation to make data broker practices more visible to consumers and to give consumers greater control over the immense amounts of personal information about them collected and shared by data brokers.


Employee behaviors expose organizations to insider threat


“A third of UK professionals are likely to consider risky behaviors that endanger or undermine data protection.The research was conducted by OnePoll and based on surveying 1000 UK employees who have access to customer data at work. The results suggest a lack of awareness of basic data protection policies and worrying behaviours such as snooping on sensitive personal information and sharing work login details with colleagues.”


Netizen Report: Thai Military Blocks Over 100 Websites Under Martial Law


Netizen Report Team


“Global Voices Advocacy's Netizen Report offers an international snapshot of challenges, victories, and emerging trends in Internet rights around the world. This week's report begins in Thailand, where the army, now in the second week of its “coup without a coup,” has ordered Internet service providers to “monitor and stop any information dissemination that could breed disorder within the Kingdom or would negatively impact the stability of the state and the morale of the people.” In meetings with Thailand’s largest newspapers and 108 ISPs, the military generals requested their “cooperation” in culling unfavorable coverage of the coup from the Internet.”


The Coup and the Information War in Thailand


Aim Sinpeng


“There is an information war on in Thailand. Beyond the martial law and the coup d'etat that the military had declared, there is censorship. The military shut down cable, radio stations, and some TV stations and instructed those on social media to be “very careful” — all before declaring a coup.”


DDoS attacks: Criminals get stealthier


Jag Bains


“There is a lot of media hype surrounding volumetric style DDoS attacks recently where the focus has been on large Gb/sec attacks, sometimes up to 400 Gb/sec. In reality, these are very rare and these big and dumb style attacks make one wonder if they are just being used as a distraction to take up resources and divert IT operations' efforts in the wrong place so that hackers can get into websites unnoticed. Bottom line is that DDoS attacks are a serious security threat that evolve every day, much like the sophistication of the criminals that launch the attacks.”


LulzSec Sabu Gets Time Served


Andy Greenberg


“Hector Monsegur spent the last three years as a model law enforcement informant, quietly drawing out his fellow hackers and directly aiding in the arrest of members of the LulzSec hacking crew and Anonymous hacker Jeremy Hammond. His hard work was rewarded Tuesday, when a judge sentenced him to time served and released him.”


WeChat App being used to disguise banking Trojan




“There is a new banking Trojan that is disguised as the popular messaging app WeChat. This banking Trojan is being used by cyber criminals to harvest the financial data of Android users in China.”


AFP arrests man over Melbourne IT hack


Allie Coyne,afp-arrests-man-over-melbourne-it-hack.aspx


“The Australian Federal Police has arrested two men over an alleged hacking campaign which targeted local corporate and government websites, one of whom the agency claims was involved in the 2012 attack on domain name registrar Melbourne IT.”


Anonymous attempts attack on US .mil domain


Juha Saarinen,anonymous-attempts-attack-on-us-mil-domain.aspx


“Unknown hacktivists attempted to disrupt the operation of United States armed forces webservers yesterday by launching what is thought to be a denial of service attack against hosts in the .mil top-level domain.”


Internet Accessible control systems At risk


“Is your control system accessible directly from the Internet? Do you use remote access features to log into your control system network? Are you unsure of the security measures that protect your remote access services? If your answer was yes to any or all these questions, you are at increased risk of cyber attacks including scanning, probes, brute force attempts and unauthorized access to your control environment.“


10 BYOD policy guidelines for a secure work environment


Kenneth Hess


“Bring your own device (BYOD) is no longer simply a buzzword or a new trend; it’s reality. And in that reality, almost half of all employees use their own devices to access corporate assets such as network drives, documents, printers, web proxies, social media sites, and personal cloud services. Malware, viruses, theft, unsecured devices, jailbroken devices, and a lack of control put corporate data, intellectual property, and client information at risk. The answer to this problem is to create, to manage, and to enforce BYOD policy guidelines to secure your work environment.”


Why Banks Struggle to Fight Check Fraud


Tracy Kitten


“A $15 million check-kiting scheme that flew under the radar of leading banking institutions for more than three years illustrates that check fraud continues to be one of the banking industry's greatest pain points. Last week, federal authorities in California arrested 14 of the 15 individuals charged for roles they allegedly played in the check-kiting and account bust-out scheme that ran from February 2010 to October 2013.”


Carder sentenced to 20 years in prison


Zeljka Zorz


“Member of Organization That Operated Online Marketplace for Stolen Personal Information Sentenced to 20 Years in Prison. A Phoenix man convicted after a jury trial last December of conspiracy and racketeering offenses for his involvement in a sophisticated cybercrime organization was sentenced today to serve 20 years in prison.”


Anti-gangster law invoked to score stiff sentence against two-bit cyberthief


Dan Goodin


“Federal prosecutors have secured an unusually stiff sentence against a low-level identity thief by invoking the same law used to target bosses of the Gambino crime family and Los Angeles street gangs.”


Saudi Government to Recruit Ethical Hackers


Eduard Kovacs


“The Saudi Arabian Ministry of Interior’s National Information Center wants to recruit hackers to help protect the country’s networks. According to the Saudi Gazette, the National Information Center’s representatives say recruits will be trained to “transform their abilities into productive energy.”


Customers of BlackShades RAT reportedly being raided by FB


Sabari Selvan


“FBI is reportedly executing international raids with the help of local law enforcement.  Several users of 'BlackShades' in HackForums have reported that their house is being raided by FBI.  The authorities have seized computer, external Hard disk and other computer equipments”


12 Arrested in Vishing Case


Jeffrey Roman


“Belgian and Dutch judicial and law enforcement authorities have disrupted a voice-phishing scheme that collected millions of euros from Belgian victims and banks.”


This is the children’s book that the president of Estonia made his staff read


Leo Mirani


“Robert M. Lee is an expert on a topic few people have heard of and even fewer understand: supervisory control and data acquisition (SCADA).”


SCADA AND ME: A Children’s Book For Security Policy Makers


Anthony M Freed


“The first children’s book to address SCADA/ICS security (Supervisory Control and Data Acquisition/Industrial Control Systems) has caught the attention of both industry and government, and may turn out to be one of the more influential articulations on the subject of protecting systems that govern critical infrastructure.”

NSA allegedly puts backdoors on American-made network devices


Zeljka Zorz


“Glenn Greenwald's new book titled No Place to Hide is out today. Aside from telling the story of how he worked with NSA whistleblower Edward Snowden and journalist Laura Poitras to make public the mind-blowing extent of mass US surveillance, the book also includes a number of revelations and documents that have not been previously shared with the public.”


Despite hearing about Heartbleed, 47% have not changed their passwords


“In light of the recent Heartbleed bug, LifeLock announced survey results that reveal consumers’ behavior and attitudes surrounding the security flaw.”


Arrests in international voice-phishing case


“Belgian and Dutch judicial and law enforcement authorities, supported by the European Cybercrime Centre (EC3) at Europol and Eurojust, have concluded an operation resulting in the arrest of 12 members of an organized crime group and the seizure of EUR 15,000 in cash and important digital evidence in a voice-phishing case”


Phishers Cast Wider Net, Now Asking for Multiple Emails


Abigail Villarin


“From a security perspective, phishing attempts are pretty much old hat. In most cases, phishing attempts or attacks focus on getting one particular credential, such as those for credit cards or user accounts. We are now seeing cybercriminals attempt to get more credentials by using phishing pages that allow for multiple email logins.”


Proactively Hardening Systems Against Intrusion: Configuration Hardening


Michael Thelander


“But what does this state of “being hardened” mean in the context of information systems? What do we mean when we talk about “hardening systems” to repel exploits and withstand intrusions? Much of this is captured in three simple concepts:

• Ensure a system’s security configurations are appropriately set, given the job it needs to do

• Ensure operating system software, firmware  and applications are updated to stay ahead of exploits that attack flaws in the underlying code

• Ensure this process runs continually, leveraging and employing as much automation as possible”


Alleged members of hacking Team Digi7al arrested for violating government networks




“Alleged members of the hacking Team Digi7al were arrested by NCIS and charged for Hacking more than 30 government and private sites.”


Phone 'tilt' sensors can be used to track you


Tim Ring


“A team of US researchers has revealed that attackers can use smartphone and tablet 'tilt' and 'swipe' motion sensors - which cannot be blocked - to secretly track users.”


What Not To Do In a Cyberattack


Kelly Jackson Higgins


“Detecting an attack can be difficult enough, but the chances of a quick cleanup and lockdown in the aftermath of an incident dramatically diminish if there's no official incident response plan and no incident response (IR) point person or team in place.”


The FBI’s war on Anonymous


Kevin Townsend


“The FBI announced yesterday “additional attempted computer hacking charges and 18 counts of cyberstalking” for Fidel Salinas. That now brings the total charges to 44 – each of which carries a maximum of 10 years in prison. This alleged hacker is now facing 440 years in prison.”


Kali Linux website hacked by The GreaT Team


Sabari Selvan


“When it comes to Security, No ONE is 100% Secure.  Even the world most popular Security-related Linux provider Kali is no exception to this fact. Earlier Today, a Libyan Hackers group "The GreaT Team(TGT)" have breached the mailing list subdomain of Kali website(”